COMPA: Detecting Compromised Accounts on Social Networks.

作者: Gianluca Stringhini , Manuel Egele , Christopher Krügel , Giovanni Vigna

DOI:

关键词:

摘要: As social networking sites have risen in popularity, cyber-criminals started to exploit these spread malware and carry out scams. Previous work has extensively studied the use of fake (Sybil) accounts that attackers set up distribute spam messages (mostly contain links scam pages or drive-by download sites). Fake typically exhibit highly anomalous behavior, hence, are relatively easy detect. a response, compromise abuse legitimate accounts. Compromising is very effective, as can leverage trust relationships account owners established past. Moreover, compromised more difficult clean because network provider cannot simply delete correspond-

参考文章(16)
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, Virg ´ ilio Almeida, Detecting Spammers on Twitter ,(2010)
Chao Yang, Robert Chandler Harkreader, Guofei Gu, Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers Lecture Notes in Computer Science. pp. 318- 337 ,(2011) , 10.1007/978-3-642-23644-0_17
John C. Platt, Fast training of support vector machines using sequential minimal optimization Advances in kernel methods. pp. 185- 208 ,(1999)
J.M. Trenkle, W.B. Cavnar, N-gram-based text categorization ,(1994)
Jonghyuk Song, Sangho Lee, Jong Kim, Spam Filtering in Twitter Using Sender-Receiver Relationship Lecture Notes in Computer Science. pp. 301- 317 ,(2011) , 10.1007/978-3-642-23644-0_16
Ben Y. Zhao, Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Detecting and characterizing social spam campaigns internet measurement conference. pp. 35- 47 ,(2010) , 10.1145/1879141.1879147
Wei Xu, Fangfang Zhang, Sencun Zhu, Toward worm detection in online social networks annual computer security applications conference. pp. 11- 20 ,(2010) , 10.1145/1920261.1920264
Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna, Detecting spammers on social networks annual computer security applications conference. pp. 1- 9 ,(2010) , 10.1145/1920261.1920263
Kyumin Lee, James Caverlee, Steve Webb, Uncovering social spammers: social honeypots + machine learning international acm sigir conference on research and development in information retrieval. pp. 435- 442 ,(2010) , 10.1145/1835449.1835522
Richard Kemmerer, Christopher Kruegel, Giovanni Vigna, Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Your botnet is my botnet: analysis of a botnet takeover computer and communications security. pp. 635- 647 ,(2009) , 10.1145/1653662.1653738