Towards Detecting Compromised Accounts on Social Networks

被引:80
|
作者
Egele, Manuel [1 ]
Stringhini, Gianluca [2 ]
Kruegel, Christopher [3 ]
Vigna, Giovanni [3 ]
机构
[1] Boston Univ, Dept Elect & Comp Engn, Boston, MA 02215 USA
[2] UCL, London, England
[3] UC Santa Barbara, Dept Comp Sci, Santa Barbara, CA USA
基金
英国工程与自然科学研究理事会;
关键词
Online social networks; cybercrime; network security;
D O I
10.1109/TDSC.2015.2479616
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Compromising social network accounts has become a profitable course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can distribute their malicious messages or disseminate fake information to a large user base. The impacts of these incidents range from a tarnished reputation to multi-billion dollar monetary losses on financial markets. In our previous work, we demonstrated how we can detect large-scale compromises (i.e., so-called campaigns) of regular online social network users. In this work, we show how we can use similar techniques to identify compromises of individual high-profile accounts. High-profile accounts frequently have one characteristic that makes this detection reliable-they show consistent behavior over time. We show that our system, were it deployed, would have been able to detect and prevent three real-world attacks against popular companies and news agencies. Furthermore, our system, in contrast to popular media, would not have fallen for a staged compromise instigated by a US restaurant chain for publicity reasons.
引用
收藏
页码:447 / 460
页数:14
相关论文
共 50 条
  • [21] Towards Exploiting Social Networks for Detecting Epidemic Outbreaks
    Di Martino S.
    Romano S.
    Bertolotto M.
    Kanhabua N.
    Mazzeo A.
    Nejdl W.
    Global Journal of Flexible Systems Management, 2017, 18 (1) : 61 - 71
  • [22] Detecting compromised nodes in wireless sensor networks
    Mathews, Mary
    Song, Min
    Shetty, Sachin
    McKenzie, Rick
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 273 - +
  • [23] On detecting compromised controller in software defined networks
    Anand, N.
    Babu, Sarath
    Manoj, B. S.
    COMPUTER NETWORKS, 2018, 137 : 107 - 118
  • [24] Detecting Fake Accounts on Social Media
    Khaled, Sarah
    El-Tazi, Neamat
    Mokhtar, Hoda M. O.
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 3672 - 3681
  • [25] Towards Detecting Fake User Accounts in Facebook
    Gupta, Aditi
    Kaushal, Rishabh
    2017 ISEA ASIA SECURITY AND PRIVACY CONFERENCE (ISEASP 2017), 2017, : 137 - 142
  • [26] Diagnosis of Compromised Accounts for Online Social Performance Profile Network
    Shahabadkar, Ramesh
    Kamath, Mukesh B.
    Shahabadkar, Krutika Ramesh
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1552 - 1557
  • [27] Evaluating Algorithms for Detection of Compromised Social Media User Accounts
    Trang, David
    Johansson, Fredrik
    Rosell, Magnus
    SECOND EUROPEAN NETWORK INTELLIGENCE CONFERENCE (ENIC 2015), 2015, : 75 - 82
  • [28] Towards Detecting Anomalous User Behavior in Online Social Networks
    Viswanath, Bimal
    Bashir, M. Ahmad
    Crovella, Mark
    Guha, Saikat
    Gummadi, Krishna P.
    Krishnamurthy, Balachander
    Mislove, Alan
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 223 - 238
  • [29] An Overview of Detecting Fake Accounts on Twitter Networks
    Oumaima, Louzar
    Ouafae, Baida
    Mariam, Ramdi
    Abdelouahid, Lyhyaoui
    ADVANCED INTELLIGENT SYSTEMS FOR SUSTAINABLE DEVELOPMENT (AI2SD'2020), VOL 1, 2022, 1417 : 1095 - 1105
  • [30] Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches
    Kaur, Ravneet
    Singh, Sarbjeet
    Kumar, Harish
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 112 : 53 - 88