The Internet has revolutionized our modern society. Big data is the word of the day. Companies have vast access to data on a variety of issues from billions of internet users.
We have all felt the impact of consumer personalized marketing, including advertisements on social media like Facebook, which generates advertisements based on our preferences of feed and our likes and reactions to news posts.
Various crawler and bots, which are automated, crawl through our web system and generate a large amount of information, often without our consent, which are used to profile for advertisements. Unfortunately, the ubiquity of the Internet has also led to its abuse and the rise of sophisticated cybercrimes.
Controlling cyber conflict
Online advertising is maturing with billions of dollars at stake, which opens up opportunities for adversaries to leverage the system to the detriment of consumers. Malicious advertisers are constantly devising new strategies to exploit vulnerabilities using our personalized data. With the recent developments in junk email detection, spam senders changed their targeted communication medium.
Social networks and social media websites and recommendation services such as Facebook, Google+, MySpace, Twitter, YouTube, Flickr, SoundCloud, TripAdvisor, Amazon, and so forth are the major target for spammers.
So, what can we do? Prudent Administration can thwart many of these attacks, but online advertisement system and social media data are far too large to monitor manually. So we can use the same data to create a system using machine learning and secure learning to create a robust system. Some examples are using the data to feed a learning system to train and retrain a system and these systems are continually evolving in the defense line to be more efficient and effective.
Also to detect image based spam, computer techniques using image processing can be developed to detect image based spam, natural language processing techniques can be used to detect fraudulent writing to detect plagiarism detection and authorization identification.
With use of personalized data, there is also increase in fraudulent activities and targeted cyber attacks which can be detected and decimated using the same personalized data to develop a secure system, using machine learning and secure learning, which evolves with time to create a robust and automated
system.
The writer is a software engineer at Zyoba Labs Pvt. Ltd., Kathmandu