Towards Detecting Compromised Accounts on Social Networks

被引:80
|
作者
Egele, Manuel [1 ]
Stringhini, Gianluca [2 ]
Kruegel, Christopher [3 ]
Vigna, Giovanni [3 ]
机构
[1] Boston Univ, Dept Elect & Comp Engn, Boston, MA 02215 USA
[2] UCL, London, England
[3] UC Santa Barbara, Dept Comp Sci, Santa Barbara, CA USA
基金
英国工程与自然科学研究理事会;
关键词
Online social networks; cybercrime; network security;
D O I
10.1109/TDSC.2015.2479616
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Compromising social network accounts has become a profitable course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can distribute their malicious messages or disseminate fake information to a large user base. The impacts of these incidents range from a tarnished reputation to multi-billion dollar monetary losses on financial markets. In our previous work, we demonstrated how we can detect large-scale compromises (i.e., so-called campaigns) of regular online social network users. In this work, we show how we can use similar techniques to identify compromises of individual high-profile accounts. High-profile accounts frequently have one characteristic that makes this detection reliable-they show consistent behavior over time. We show that our system, were it deployed, would have been able to detect and prevent three real-world attacks against popular companies and news agencies. Furthermore, our system, in contrast to popular media, would not have fallen for a staged compromise instigated by a US restaurant chain for publicity reasons.
引用
收藏
页码:447 / 460
页数:14
相关论文
共 50 条
  • [41] Automatic Detection of Compromised Accounts in MMORPGs
    Oh, Jehwan
    Borbora, Zoheb Hassan
    Srivastava, Jaideep
    PROCEEDINGS OF THE 2012 ASE INTERNATIONAL CONFERENCE ON SOCIAL INFORMATICS (SOCIALINFORMATICS 2012), 2012, : 222 - 227
  • [42] The Root Causes of Compromised Accounts at the University
    Nyblom, Philip
    Wangen, Gaute
    Kianpour, Mazaher
    Ostby, Grethe
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 540 - 551
  • [43] An Intrusion Detection System for Detecting Compromised Gateways in Clustered IoT Networks
    Abhishek, Nalam Venkata
    Lim, Teng Joon
    Sikdar, Biplab
    Tandon, Anshoo
    2018 IEEE INTERNATIONAL WORKSHOP TECHNICAL COMMITTEE ON COMMUNICATIONS QUALITY AND RELIABILITY (CQR), 2018, : 25 - 30
  • [44] Detecting Abnormal Social Network Accounts with Hurst of Interest Distribution
    Wang, Xiujuan
    Sui, Yi
    Tao, Yuanrui
    Zhang, Qianqian
    Wei, Jianhua
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [45] Detecting Social Bookmark Spams using Multiple User Accounts
    Sakakura, Yuta
    Amagasa, Toshiyuki
    Kitagawa, Hiroyuki
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 1153 - 1158
  • [46] Detecting spammers on social networks
    Zheng, Xianghan
    Zeng, Zhipeng
    Chen, Zheyi
    Yu, Yuanlong
    Rong, Chunming
    NEUROCOMPUTING, 2015, 159 : 27 - 34
  • [47] Detecting social transmission in networks
    Hoppitt, William
    Boogert, Neeltje J.
    Laland, Kevin N.
    JOURNAL OF THEORETICAL BIOLOGY, 2010, 263 (04) : 544 - 555
  • [48] Detecting Spammers in Social Networks
    Altameem, Eman A.
    Aksoy, Mehmet Sabih
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (11): : 153 - 158
  • [49] Detecting Spammers on Social Networks
    Stringhini, Gianluca
    Kruegel, Christopher
    Vigna, Giovanni
    26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 1 - 9
  • [50] Analysis and Detection of Spam Accounts in Social Networks
    Liu, Chen
    Wang, Genying
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2526 - 2530