作者: Gianluca Stringhini , Manuel Egele , Christopher Krügel , Giovanni Vigna
DOI:
关键词:
摘要: As social networking sites have risen in popularity, cyber-criminals started to exploit these spread malware and carry out scams. Previous work has extensively studied the use of fake (Sybil) accounts that attackers set up distribute spam messages (mostly contain links scam pages or drive-by download sites). Fake typically exhibit highly anomalous behavior, hence, are relatively easy detect. a response, compromise abuse legitimate accounts. Compromising is very effective, as can leverage trust relationships account owners established past. Moreover, compromised more difficult clean because network provider cannot simply delete correspond-