CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

User’s Verification to Prevent Malicious Access in Web-based Forums

by Mahdi Taheri Tabar, Imran Ghani, Mohd Shafie Abd Latiff
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 9
Year of Publication: 2013
Authors: Mahdi Taheri Tabar, Imran Ghani, Mohd Shafie Abd Latiff
10.5120/10493-5250

Mahdi Taheri Tabar, Imran Ghani, Mohd Shafie Abd Latiff . User’s Verification to Prevent Malicious Access in Web-based Forums. International Journal of Computer Applications. 63, 9 ( February 2013), 11-16. DOI=10.5120/10493-5250

@article{ 10.5120/10493-5250,
author = { Mahdi Taheri Tabar, Imran Ghani, Mohd Shafie Abd Latiff },
title = { User’s Verification to Prevent Malicious Access in Web-based Forums },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 9 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number9/10493-5250/ },
doi = { 10.5120/10493-5250 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:13:51.616476+05:30
%A Mahdi Taheri Tabar
%A Imran Ghani
%A Mohd Shafie Abd Latiff
%T User’s Verification to Prevent Malicious Access in Web-based Forums
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 9
%P 11-16
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper aims to address the issue of malicious accounts that are created and used to imitate real users in web-based forums. In fact, form bots are used to create fake users on forums for several purposes. As a result hundreds of fake users start appearing in the forums and normally placing spam URLs. For forum administrators/managers/moderators, it is a frustrating job to keep members' list clean. In order to overcome this issue, a novel approach is proposed that would be useful in order to prevent malicious users' access and decrease rate of deception in web-based forums. We present a comparison between the proposed approach and IDology approach. The results illustrate that our proposed approach addresses the issue more efficiently as compared with IDology approach.

References
  1. Wang, Y. , Tan, T. , & K. Jain, A. (2003). Combining Face and Iris Biometrics for Identity Verification. Combining Face and Iris Biometrics for Identity Verification. to appear on Proc. AVBPA 2003.
  2. Trufina. (2011). Retrieved from www. trufina. com: http://www. trufina. com/help new/background_verification. php
  3. Sanderson, C. , & K. Paliwal, K. (2001). Robust Face Based Identity Verification. MICROELECTRONIC ENGINEERING RESEARCH CONFERENCE.
  4. Privaris. (2007). Achieving Universal Secure Identity Verification with. Virginia: Privaris.
  5. Schejbal, J. (2010). Building an authentication system under strict real-world constraints.
  6. Netidme. (n. d. ). Age and Identity Verification Services. East Kilbride,United Kingdom: Netidme.
  7. Mercuri, M. (2007). Beginning Information Cards and CardSpace: From Novice to Professional. Apress.
  8. Kimsal, M. (2007). Intro to OpenID. TriPUG.
  9. IOCS. Ltd. (2011). Electronic Identity Verification for E-Approval. London: IOCS. Ltd
  10. Gupta, J. (2007, January 29). Retrieved from www. readwriteweb. com: http://www. readwriteweb. com/archives/nobody_knows_youre_a_dog. php
  11. Weiss, T. R. (2002, December 10). Retrieved from http://www. computerworld. com: http://www. computerworld. com/s/article/76558/VeriSign_unveils_new_online_identity_verification_services
  12. Waters, J. K. (2012). Retrieved from csoonline: http://www. csoonline. com/article/205053/the-abcs-of-identity-management
  13. Acunetix Corporation. (2012, December 1). Home page. Retrieved December 1, 2012, from Acunetix Corporation Web site: http://www. acunetix. com/
  14. BBC NEWS. (2011, November 24). Technology. Retrieved December 2, 2012, from BBC NEWS: http://www. bbc. co. uk/news/technology-15869683
  15. Hindocha, N. , & Chien, E. (2003). Malicious Threats and Vulnerabilities. Cupertino: Symantec.
  16. IDology. (2009, July 21). Press-Release. Retrieved November 5, 2012, from IDology Corporation Web site: http://www. idology. com/press-release/idology-approved-as-identity-and-age-verification-provider-for-state-of-kansas.
  17. Moore, T. , & Anderson, R. (2011). Economics and Internet Security: a Survey of Recent Analytical, Empirical and Behavioral Research. Massachusetts: Harvard University.
  18. Rabkin, A. (2008). Personal knowledge questions for fallback authentication:Security questions in the era of Facebook. Pittsburgh: Symposium on Usable Privacy and Security.
Index Terms

Computer Science
Information Sciences

Keywords

Identity theft verification service identity management malicious users forums