PREVENTION OF COALITION ATTACKS IN SOCIAL NETWORK COMMUNITIES
First Claim
1. A system including instructions recorded on a non-transitory computer readable storage medium and executable by at least one processor, the system comprising:
- a report handler configured to cause the at least one processor to receive abuse reports from reporters alleging policy violations of network use policies by at least one potential victim;
a source analyzer configured to cause the at least one processor to determine at least one subset of the reporters;
a content analyzer configured to cause the at least one processor to determine a reference to the at least one potential victim in network activities of the at least one subset; and
a review requester configured to cause the at least one processor to generate a notification of a potential coalition attack against the at least one potential victim, based on the reference in the context of the at least one subset.
2 Assignments
0 Petitions
Accused Products
Abstract
A report handler may receive abuse reports from reporters alleging policy violations of network use policies by at least one potential victim, and a source analyzer may determine at least one subset of the reporters. A content analyzer may determine a reference to the at least one potential victim in network activities of the at least one subset, and a review requester may generate a notification of a potential coalition attack against the at least one potential victim, based on the reference in the context of the at least one subset.
13 Citations
20 Claims
-
1. A system including instructions recorded on a non-transitory computer readable storage medium and executable by at least one processor, the system comprising:
-
a report handler configured to cause the at least one processor to receive abuse reports from reporters alleging policy violations of network use policies by at least one potential victim; a source analyzer configured to cause the at least one processor to determine at least one subset of the reporters; a content analyzer configured to cause the at least one processor to determine a reference to the at least one potential victim in network activities of the at least one subset; and a review requester configured to cause the at least one processor to generate a notification of a potential coalition attack against the at least one potential victim, based on the reference in the context of the at least one subset. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method for causing at least one processor to execute instructions recorded on a computer-readable storage medium, the method comprising:
-
receiving abuse reports from reporters alleging policy violations of network use policies by at least one potential victim; determining at least one subset of the reporters; determining a reference to the at least one potential victim in network activities of the at least one subset; and generating a notification of a potential coalition attack against the at least one potential victim, based on the reference in the context of the at least one subset. - View Dependent Claims (15, 16)
-
-
17. A computer program product, the computer program product being tangibly embodied on a non-transitory computer-readable medium and comprising instructions that, when executed, are configured to cause at least one processor to:
-
receive abuse reports from reporters alleging policy violations of network use policies by at least one potential victim; determine at least one subset of the reporters; determine a reference to the at least one potential victim in network activities of the at least one subset; and generate a notification of a potential coalition attack against the at least one potential victim, based on the reference in the context of the at least one subset. - View Dependent Claims (18, 19, 20)
-
Specification