Anti-Reconnaissance Tools: Detecting Targeted Socialbots

被引:27
作者
Paradise, Abigail [1 ]
Puzis, Rami [1 ]
Shabtai, Asaf [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Informat Syst Engn, IL-84105 Beer Sheva, Israel
关键词
reconnaissance; social network; socialbots;
D O I
10.1109/MIC.2014.81
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Attackers employ artificial, machine-operated, social network profiles called socialbots to connect to real members of an organization, thus greatly increasing the amount of information the attacker can collect. To connect socialbots, attackers employ several strategies. The authors' approach detects socialbots by intelligently selecting organization member profiles and monitoring their activity. Their study demonstrates their method's efficacy specifically, that when an attacker knows the defense strategy being deployed, the most effective attack is randomly sprayed friend requests, which eventually lead to a low number of connections.
引用
收藏
页码:11 / 19
页数:9
相关论文
共 20 条
  • [1] Acquisti A., 2013, WHY PRIVACY MATTERS
  • [2] [Anonymous], 2012, Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on
  • [3] [Anonymous], 2012, P 10 USENIX C FILE S
  • [4] Emergence of scaling in random networks
    Barabási, AL
    Albert, R
    [J]. SCIENCE, 1999, 286 (5439) : 509 - 512
  • [5] Boldi P., 2013, ARXIV13082140
  • [6] Boshmaf Y, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P93
  • [7] Danezis G., 2009, SYBILLNFER DETECTING
  • [8] Organizational Intrusion: Organization Mining using Socialbots
    Elishar, Aviad
    Fire, Michael
    Kagan, Dima
    Elovici, Yuval
    [J]. PROCEEDINGS OF THE 2012 ASE INTERNATIONAL CONFERENCE ON SOCIAL INFORMATICS (SOCIALINFORMATICS 2012), 2012, : 7 - 12
  • [9] Jeun I, 2012, COMM COM INF SC, V339, P144
  • [10] Kitti M., 2012, 79 AB CTR EC