Skip to main content
Figure 15 | EPJ Data Science

Figure 15

From: Error and attack tolerance of collective problem solving: The DARPA Shredder Challenge

Figure 15

Attacker detection through user behavior. Each dot represents a user plotted along two features: the difference in time between his/her last and first move (span, x-axis) and the total number of exploratory moves (y-axis) on a log-log scale. A move is exploratory if it does not help or hinder progress directly. Large red dots in Puzzle 4 represent reported attackers. The two outliers on the upper left of Puzzle 4 are the fictitious users used to perform the rollbacks. Note that the term ‘exploration’ supposes a genuine intention behind the move. When the move is performed by an attacker, the term ‘noise’ is more accurate as the attacker intentionally adds unnecessary information to the system.

Back to article page