Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








23,008 Hits in 5.3 sec

Towards Detecting Compromised Accounts on Social Networks

Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna
2017 IEEE Transactions on Dependable and Secure Computing  
Compromising social network accounts has become a profitable course of action for cybercriminals.  ...  High-profile accounts frequently have one characteristic that makes this detection reliable -they show consistent behavior over time.  ...  The results show that our approach can reliably detect compromises affecting high-profile social network accounts, and can detect compromises of regular accounts, whose behavior is typically more variable  ... 
doi:10.1109/tdsc.2015.2479616 fatcat:fpqrpuzisbhblbfxildo24ldm4

Towards Detecting Compromised Accounts on Social Networks [article]

Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna
2015 arXiv   pre-print
Compromising social network accounts has become a profitable course of action for cybercriminals.  ...  High-profile accounts frequently have one characteristic that makes this detection reliable -- they show consistent behavior over time.  ...  To detect account compromises, COMPA builds a behavioral profile for social network accounts, based on the messages sent by the account in the past.  ... 
arXiv:1509.03531v1 fatcat:66seuqf5h5girixsnbledylgnq

Fake Profiles Types of Online Social Networks: A Survey

Rafeef Kareem, Wesam Bhaya
2018 International Journal of Engineering & Technology  
, compromised profiles, and online bots (spam-bots, chat-bots, and social-bots).  ...  Today, OSNs (Online Social Networks) considered the most platforms common on the Internet.  ...  Selecting profile, Computing strength of the relationship, Decision making) [6] 2014 Compromised Profile It has been using a novel approach to detect compromised user accounts in social networks,  ... 
doi:10.14419/ijet.v7i4.19.28071 fatcat:rr7db4eifrfdtitvdairajenoa

Compromised account detection using authorship verification: a novel approach [article]

Forough Farazmanesh, Fateme Foroutan, Amir Jalaly Bidgoly
2022 arXiv   pre-print
Compromising legitimate accounts is a way of disseminating malicious content to a large user base in Online Social Networks (OSNs).  ...  As a result, the malicious message without a user profile can be detected with satisfying accuracy. Experiments were constructed using a real-world dataset of compromised accounts on Twitter.  ...  The challenges of these approaches include: the need for high profile accounts for proper detection and decreased accuracy due to dynamic user behavior.  ... 
arXiv:2206.03581v2 fatcat:l5rgf7ozunbh3feesvenhrwrau

Review on Detecting OSN Malicious Account and Fake Reviews in Online Promotions

Prof. A. R. Gaidhani
2017 International Journal for Research in Applied Science and Engineering Technology  
In this project we came up with a system that detect fake malicious accounts by different behavior and classification techniques like Decision trees to classify the profiles into fake or genuine classes  ...  In today's world, everyone has become associated with the online social networks, it has become a popular way for users to meet and interact online.  ...  Manuel Egele, et . all [1] :-In this paper, a system is presented to detect compromised user accounts in social networks.  ... 
doi:10.22214/ijraset.2017.10091 fatcat:zkv5vtiqejdstbqyvgp776oljy

On the threats to Cloud-based online service users (and what we can do about them)

Gianluca Stringhini
2015 2015 International Conference on High Performance Computing & Simulation (HPCS)  
ACCOUNT COMPROMISES ON ONLINE SERVICES Using fake accounts on online social networks has a limited utility for cybercriminals, mostly because such accounts do not have an established reputation and therefore  ...  To detect compromised accounts on online social networks, we leverage a simple insight: users develop habits when interacting with social media, and these habits hardly change over time.  ... 
doi:10.1109/hpcsim.2015.7237026 dblp:conf/ieeehpcs/Stringhini15 fatcat:sjc3pz3qqraczooojbptlpab6u

Sneak into Devil's Colony- A study of Fake Profiles in Online Social Networks and the Cyber Law [article]

Mudasir Ahmad Wani, Suraiya Jabin, Ghulam Yazdani, Nehaluddin Ahmadd
2018 arXiv   pre-print
In this paper, we have studied various categories of fake profiles like compromised profiles, cloned profiles and online bots (spam-bots, social-bots, like-bots and influential-bots) on different OSN sites  ...  Massive content about user's social, personal and professional life stored on Online Social Networks (OSNs) has attracted not only the attention of researchers and social analysts but also the cyber criminals  ...  One more study [50] refers to them as bots which control accounts on online social networks and imitate the behavior of legitimate users. Social bots are not always problematic.  ... 
arXiv:1803.08810v1 fatcat:c6kqphdeyvfkfhho4lkoxl7zay

Toward Detecting Malicious Links in Online Social Networks through User Behavior

Bandar Alghamdi, Jason Watson, Yue Xu
2016 2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops (WIW)  
This assumption is in different studies to detect compromised profiles in OSNs, such as [15] ; however, this research will use it to detect the malicious URLs rather than compromised accounts based on  ...  A compromised account on a social networking site is an interesting possible source of malicious URLs.  ... 
doi:10.1109/wiw.2016.014 dblp:conf/webi/AlghamdiWX16 fatcat:vryhyayn55djrk4pkesjumgd6e

Preventing malicious accounts based on mining with steganography in online

Ms K. Karpaga Priyaa, Keerthipati Lahari, V Vasundhara, C Saranya
2018 International Journal of Engineering & Technology  
The Online Social Networks' (OSN) users face security-privacy threats such as Profile cloning, privacy breach and malware attacks.  ...  Experimental results show that the proposed technique can effectively detect and prevent creating malicious accounts in comparison with the techniques reported previously.  ...  Detecting compromised accounts on social networks For detecting cloned profiles, the existing system COMPA [6] was designed which used a mechanism to detect compromised accounts on social networks.  ... 
doi:10.14419/ijet.v7i2.33.14848 fatcat:yp6iizpgmnh55gts2x373ggtwi

Cybersafety in Modern Online Social Networks (Dagstuhl Reports 17372)

Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Thorsten Strufe, Marc Herbstritt
2018 Dagstuhl Reports  
These include spreading malware and spam, controlling and operating fake/compromised accounts, artificially manipulating the reputation of accounts and pages, and spreading false information as well as  ...  This ultimately yields a cat-and-mouse game, mostly played on economic grounds, whereby social network operators attempt to make it more and more costly for fraudsters to evade detection, which unfortunately  ...  The organizers would like to thank the Schloss Dagstuhl for the professional, productive, and enjoyable atmosphere it provides and for their invaluable support.  ... 
doi:10.4230/dagrep.7.9.47 dblp:journals/dagstuhl-reports/BlackburnCSS17 fatcat:wb63krif2vf7fdocbqai2ipxwe

Identification of Malicious Accounts in Facebook

2019 International Journal of Engineering and Advanced Technology  
Unfortunately, spammers are also using this Facebook for their personal gain by creating fake profiles or comprising the other famous accounts.  ...  This research work will help the common man in detecting malicious Facebook accounts in a great way. Related terms: Social networking, Facebook, malicious accounts  ...  The system is very useful in detecting compromised Facebook accounts with better accuracy.  ... 
doi:10.35940/ijeat.a1228.109119 fatcat:mqbblijbvrdefkbm4tydpetw7u

Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey [article]

Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra
2020 arXiv   pre-print
As a consequence, online social deception (OSD) in SNSs has emerged as a serious threat in cyberspace, particularly for users vulnerable to such cyberattacks.  ...  We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives.  ...  Phishing Account Confidentiality Fake Profile Account Integrity Profile Cloning Attack Authentication Compromised Account Account Integrity, Account Availability Crowdturfing Data Integrity  ... 
arXiv:2004.07678v1 fatcat:k4a6siywefb6lhkmyn67lmoqwe

User Behavior to Identify Malicious Activities in Large-Scale Social Networks

Miss. Punam A. Bane
2019 International Journal for Research in Applied Science and Engineering Technology  
content for the detection of user behaviors.  ...  , to analyze and detect anomalous behaviors that deviate significantly from the norm in large-scale social networks.  ...  to detect compromised identities in Twitter.  ... 
doi:10.22214/ijraset.2019.5069 fatcat:li6pdov2ozfvxmygadokxxdjbm

An Enhanced Sybil Guard to Detect Bots in Online Social Networks

Nisha P. Shetty, Balachandra Muniyal, Arshia Anand, Sushant Kumar
2021 Journal of Cyber Security and Mobility  
Such accounts are surging in wide scale and so it has become very vital to effectively detect such nodes.  ...  Sybil accounts are swelling in popular social networking sites such as Twitter, Facebook etc. owing to cheap subscription and easy access to large masses.  ...  Introduction Online Social Network (OSN) has become the new age favorite for individuals to meet new people, gather and disseminate information, create influences and so on.  ... 
doi:10.13052/jcsm2245-1439.1115 fatcat:x4fqlblys5d57ca6wwyhpefvqq

Online Social Deception and Its Countermeasures: A Survey

Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra
2020 IEEE Access  
As a consequence, online social deception (OSD) in SNSs has emerged as a serious threat in cyberspace, particularly for users vulnerable to such cyberattacks.  ...  We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives.  ...  as social honeypots is only for detecting spammers, not to take benefits from normal users or buy compromised accounts [191] , [232] .  ... 
doi:10.1109/access.2020.3047337 fatcat:xw2rr2sjnrdf3nk4vfuowrkizy
« Previous Showing results 1 — 15 out of 23,008 results