Title
Misuse detection for information retrieval systems
Abstract
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating attacks by unknown assailants. Our approach is based on building and maintaining a profile of the behavior of the system user through tracking, or monitoring of user activity within the information retrieval system. Any new activity of the user is compared to the user profile to detect a potential misuse for the authorized user. We propose four different methods to detect misuse in information retrieval systems. Our experimental results on $2$ GB collection favorably demonstrate the validity of our approach.
Year
DOI
Venue
2003
10.1145/956863.956901
CIKM
Keywords
Field
DocType
novel approach,information retrieval system,user profile,authorized user,misuse detection,different method,user activity,system user,gb collection,potential misuse,new activity,information retrieval,clustering
Data mining,Cognitive models of information retrieval,Relevance feedback,Human–computer information retrieval,User profile,Information retrieval,Computer science,Relevance (information retrieval),Cluster analysis,Misuse detection
Conference
ISBN
Citations 
PageRank 
1-58113-723-0
17
1.52
References 
Authors
8
4
Name
Order
Citations
PageRank
Rebecca Cathey1265.08
Ling Ma2505.36
Nazli Goharian346049.93
David Grossman452534.73