A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards Detecting Compromised Accounts on Social Networks
2017
IEEE Transactions on Dependable and Secure Computing
Compromising social network accounts has become a profitable course of action for cybercriminals. ...
High-profile accounts frequently have one characteristic that makes this detection reliable -they show consistent behavior over time. ...
The results show that our approach can reliably detect compromises affecting high-profile social network accounts, and can detect compromises of regular accounts, whose behavior is typically more variable ...
doi:10.1109/tdsc.2015.2479616
fatcat:fpqrpuzisbhblbfxildo24ldm4
Towards Detecting Compromised Accounts on Social Networks
[article]
2015
arXiv
pre-print
Compromising social network accounts has become a profitable course of action for cybercriminals. ...
High-profile accounts frequently have one characteristic that makes this detection reliable -- they show consistent behavior over time. ...
To detect account compromises, COMPA builds a behavioral profile for social network accounts, based on the messages sent by the account in the past. ...
arXiv:1509.03531v1
fatcat:66seuqf5h5girixsnbledylgnq
Fake Profiles Types of Online Social Networks: A Survey
2018
International Journal of Engineering & Technology
, compromised profiles, and online bots (spam-bots, chat-bots, and social-bots). ...
Today, OSNs (Online Social Networks) considered the most platforms common on the Internet. ...
Selecting profile, Computing strength of the relationship, Decision making) [6] 2014
Compromised Profile It has been using a novel approach to detect compromised user accounts in social networks, ...
doi:10.14419/ijet.v7i4.19.28071
fatcat:rr7db4eifrfdtitvdairajenoa
Compromised account detection using authorship verification: a novel approach
[article]
2022
arXiv
pre-print
Compromising legitimate accounts is a way of disseminating malicious content to a large user base in Online Social Networks (OSNs). ...
As a result, the malicious message without a user profile can be detected with satisfying accuracy. Experiments were constructed using a real-world dataset of compromised accounts on Twitter. ...
The challenges of these approaches include: the need for high profile accounts for proper detection and decreased accuracy due to dynamic user behavior. ...
arXiv:2206.03581v2
fatcat:l5rgf7ozunbh3feesvenhrwrau
Review on Detecting OSN Malicious Account and Fake Reviews in Online Promotions
2017
International Journal for Research in Applied Science and Engineering Technology
In this project we came up with a system that detect fake malicious accounts by different behavior and classification techniques like Decision trees to classify the profiles into fake or genuine classes ...
In today's world, everyone has become associated with the online social networks, it has become a popular way for users to meet and interact online. ...
Manuel Egele, et . all [1] :-In this paper, a system is presented to detect compromised user accounts in social networks. ...
doi:10.22214/ijraset.2017.10091
fatcat:zkv5vtiqejdstbqyvgp776oljy
On the threats to Cloud-based online service users (and what we can do about them)
2015
2015 International Conference on High Performance Computing & Simulation (HPCS)
ACCOUNT COMPROMISES ON ONLINE SERVICES Using fake accounts on online social networks has a limited utility for cybercriminals, mostly because such accounts do not have an established reputation and therefore ...
To detect compromised accounts on online social networks, we leverage a simple insight: users develop habits when interacting with social media, and these habits hardly change over time. ...
doi:10.1109/hpcsim.2015.7237026
dblp:conf/ieeehpcs/Stringhini15
fatcat:sjc3pz3qqraczooojbptlpab6u
Sneak into Devil's Colony- A study of Fake Profiles in Online Social Networks and the Cyber Law
[article]
2018
arXiv
pre-print
In this paper, we have studied various categories of fake profiles like compromised profiles, cloned profiles and online bots (spam-bots, social-bots, like-bots and influential-bots) on different OSN sites ...
Massive content about user's social, personal and professional life stored on Online Social Networks (OSNs) has attracted not only the attention of researchers and social analysts but also the cyber criminals ...
One more study [50] refers to them as bots which control accounts on online social networks and imitate the behavior of legitimate users. Social bots are not always problematic. ...
arXiv:1803.08810v1
fatcat:c6kqphdeyvfkfhho4lkoxl7zay
Toward Detecting Malicious Links in Online Social Networks through User Behavior
2016
2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops (WIW)
This assumption is in different studies to detect compromised profiles in OSNs, such as [15] ; however, this research will use it to detect the malicious URLs rather than compromised accounts based on ...
A compromised account on a social networking site is an interesting possible source of malicious URLs. ...
doi:10.1109/wiw.2016.014
dblp:conf/webi/AlghamdiWX16
fatcat:vryhyayn55djrk4pkesjumgd6e
Preventing malicious accounts based on mining with steganography in online
2018
International Journal of Engineering & Technology
The Online Social Networks' (OSN) users face security-privacy threats such as Profile cloning, privacy breach and malware attacks. ...
Experimental results show that the proposed technique can effectively detect and prevent creating malicious accounts in comparison with the techniques reported previously. ...
Detecting compromised accounts on social networks For detecting cloned profiles, the existing system COMPA [6] was designed which used a mechanism to detect compromised accounts on social networks. ...
doi:10.14419/ijet.v7i2.33.14848
fatcat:yp6iizpgmnh55gts2x373ggtwi
Cybersafety in Modern Online Social Networks (Dagstuhl Reports 17372)
2018
Dagstuhl Reports
These include spreading malware and spam, controlling and operating fake/compromised accounts, artificially manipulating the reputation of accounts and pages, and spreading false information as well as ...
This ultimately yields a cat-and-mouse game, mostly played on economic grounds, whereby social network operators attempt to make it more and more costly for fraudsters to evade detection, which unfortunately ...
The organizers would like to thank the Schloss Dagstuhl for the professional, productive, and enjoyable atmosphere it provides and for their invaluable support. ...
doi:10.4230/dagrep.7.9.47
dblp:journals/dagstuhl-reports/BlackburnCSS17
fatcat:wb63krif2vf7fdocbqai2ipxwe
Identification of Malicious Accounts in Facebook
2019
International Journal of Engineering and Advanced Technology
Unfortunately, spammers are also using this Facebook for their personal gain by creating fake profiles or comprising the other famous accounts. ...
This research work will help the common man in detecting malicious Facebook accounts in a great way. Related terms: Social networking, Facebook, malicious accounts ...
The system is very useful in detecting compromised Facebook accounts with better accuracy. ...
doi:10.35940/ijeat.a1228.109119
fatcat:mqbblijbvrdefkbm4tydpetw7u
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey
[article]
2020
arXiv
pre-print
As a consequence, online social deception (OSD) in SNSs has emerged as a serious threat in cyberspace, particularly for users vulnerable to such cyberattacks. ...
We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives. ...
Phishing
Account
Confidentiality
Fake Profile
Account Integrity
Profile Cloning
Attack
Authentication
Compromised
Account
Account Integrity,
Account Availability
Crowdturfing
Data Integrity ...
arXiv:2004.07678v1
fatcat:k4a6siywefb6lhkmyn67lmoqwe
User Behavior to Identify Malicious Activities in Large-Scale Social Networks
2019
International Journal for Research in Applied Science and Engineering Technology
content for the detection of user behaviors. ...
, to analyze and detect anomalous behaviors that deviate significantly from the norm in large-scale social networks. ...
to detect compromised identities in Twitter. ...
doi:10.22214/ijraset.2019.5069
fatcat:li6pdov2ozfvxmygadokxxdjbm
An Enhanced Sybil Guard to Detect Bots in Online Social Networks
2021
Journal of Cyber Security and Mobility
Such accounts are surging in wide scale and so it has become very vital to effectively detect such nodes. ...
Sybil accounts are swelling in popular social networking sites such as Twitter, Facebook etc. owing to cheap subscription and easy access to large masses. ...
Introduction Online Social Network (OSN) has become the new age favorite for individuals to meet new people, gather and disseminate information, create influences and so on. ...
doi:10.13052/jcsm2245-1439.1115
fatcat:x4fqlblys5d57ca6wwyhpefvqq
Online Social Deception and Its Countermeasures: A Survey
2020
IEEE Access
As a consequence, online social deception (OSD) in SNSs has emerged as a serious threat in cyberspace, particularly for users vulnerable to such cyberattacks. ...
We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives. ...
as social honeypots is only for detecting spammers, not to take benefits from normal users or buy compromised accounts [191] , [232] . ...
doi:10.1109/access.2020.3047337
fatcat:xw2rr2sjnrdf3nk4vfuowrkizy
« Previous
Showing results 1 — 15 out of 23,008 results