Open Access System for Information Sharing

Login Library

 

Article
Cited 47 time in webofscience Cited 57 time in scopus
Metadata Downloads

Early filtering of ephemeral malicious accounts on Twitter SCIE SCOPUS

Title
Early filtering of ephemeral malicious accounts on Twitter
Authors
Lee, SKim, J
Date Issued
2014-12-01
Publisher
ELSEVIER SCIENCE BV
Abstract
Cybercriminals exploit a large number of ephemeral malicious accounts for conducting large-scale simple attacks such as spam distribution on online social networks. However, conventional detection schemes relying on account or message information take a considerable time to collect such information before running detection algorithms so criminals utilize their accounts until suspension and exploit others again. In this paper, we propose a new detection scheme to filter potentially malicious account groups around their creation time. Our scheme utilizes the differences between algorithmically generated account names and human-made account names to identify malicious accounts generated using the similar algorithms. For accounts created within a short period of time, we apply a clustering algorithm to group accounts sharing similar name-based features and a classification algorithm to classify malicious account clusters. As a case study, we analyze 4.7 million accounts collected from Twitter. Even though our scheme only relies on account names and their creation time, it achieves reasonable accuracy. Therefore, we can use it as a fast filter against malicious account groups to selectively conduct an in-depth analysis. (C) 2014 Elsevier B.V. All rights reserved.
Keywords
Online social network; Twitter; Spam; Malicious account
URI
https://oasis.postech.ac.kr/handle/2014.oak/14018
DOI
10.1016/J.COMCOM.2014.08.006
ISSN
0140-3664
Article Type
Article
Citation
COMPUTER COMMUNICATIONS, vol. 54, page. 48 - 57, 2014-12-01
Files in This Item:
There are no files associated with this item.

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

김종KIM, JONG
Dept of Computer Science & Enginrg
Read more

Views & Downloads

Browse