Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3090354.3090399acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdcaConference Proceedingsconference-collections
research-article

Detecting Malicious Users in Social Network via Collaborative Filtering

Published: 29 March 2017 Publication History

Abstract

As social networking sites have risen in popularity, cyber-criminals started to exploit these sites to spread malwares and to carry out scams. Previous works has extensively studied the use of fake accounts that attackers set up to distribute spam messages (mostly messages that contain links to scam pages or drive-by download sites). Fake accounts typically exhibit highly anomalous behavior, and hence, are relatively easy to detect. As a response, attackers have started to compromise and abuse legitimate accounts.
In this paper, we present a novel approach to detect malicious user's accounts in social networks. Our approach uses a collaborative filtering algorithm for detecting and identifies accounts that experience a sudden change in behavior. Since behavior changes can also be due to benign reasons (e.g., a user could switch her preferred client application or post updates at an unusual time), it is necessary to derive a way to distinguish between malicious and legitimate changes. To this end, we look for groups of accounts that all experience similar changes within a short period of time, assuming that these changes are the result of a malicious campaign that is unfolding. We developed a tool, called ABCF (Approach based on collaborative filtering). ABCF was able to identify malicious and fake accounts in online social networks.

References

[1]
Dieudonee Tchuente, Modlisation Et Drivation De Profils Utilisateurs A Partir De Rseaux Sociaux: Approche A Partir De Communauts De Rseaux K-Egocentriques, Universit De Toulouse, Le 28 Janvier 2013.
[2]
An Te Nguyen, Cocofil2: Un Nouveau Systme De Filtrage Collaboratif Bas Sur Le Modle Des Espaces De Communauts, UNIVERSIT JOSEPH FOURIER GRENOBLE I, Le 23/11/2006.
[3]
Amokrane Belloui, Lusage Des Concepts Du Web Smantique Dans Le Filtrage Dinformation Collaboratif, Institut National dInformatique Alger, 2008.
[4]
Dajana Kapusova Leconte, DEVELOPPEMENT DUN LOGICIEL DE RESEAU SOCIAL COMME SOUTIEN A UNE COMMUNAUTE DE PRATIQUES, Facult De Psychologie Et De Sciences De l'Education Universit De Genve, Juin 2008.
[5]
Cao Xiao, David Mandell Freeman and Theodore Hwa, Detecting Clusters of Fake Accounts in Online Social Networks, University of Washington and LinkedIn Corporation, 2015.
[6]
https://home.deib.polimi.it/matteucc/Clustering/tutorial_html/kmeans.html.
[7]
Detection spam comments with malicious User's behavioral characteristics, Renmin University of china, 2010.
[8]
Mr. Sulabh. S And Mr. Siva Shankar. S, Survey Paper for WARNINGBIRD: Detecting Suspicious URLs in Twitter Stream, Department of Computer Science and Engineering Nehru College of Engineering and Research Centre, Pampady, Thrissur, Kerala, 2014.
[9]
Manuel Egele* y, Gianluca Stringhini*, Christopher Kruegel*, and Giovanni Vigna, COMPA: Detecting Compromised Accounts on Social Networks, University of California, Santa Barbara, Santa Barbara, CA And Carnegie Mellon University, Pittsburgh, PA, 2015.
[10]
Damien Poirier, Des Textes Communautaires A La Recommandation, Ecole Doctorale Sciences Et Technologies- PARIS, Fvrier 2011.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
BDCA'17: Proceedings of the 2nd international Conference on Big Data, Cloud and Applications
March 2017
685 pages
ISBN:9781450348522
DOI:10.1145/3090354
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Ministère de I'enseignement supérieur: Ministère de I'enseignement supérieur

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Collaborative filtering
  2. Social network
  3. fake accounts
  4. malicious accounts

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

BDCA'17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 200
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media