Open Access System for Information Sharing

Login Library

 

Article
Cited 47 time in webofscience Cited 57 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorLee, S-
dc.contributor.authorKim, J-
dc.date.accessioned2016-03-31T07:47:36Z-
dc.date.available2016-03-31T07:47:36Z-
dc.date.created2015-02-04-
dc.date.issued2014-12-01-
dc.identifier.issn0140-3664-
dc.identifier.other2015-OAK-0000031284-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/14018-
dc.description.abstractCybercriminals exploit a large number of ephemeral malicious accounts for conducting large-scale simple attacks such as spam distribution on online social networks. However, conventional detection schemes relying on account or message information take a considerable time to collect such information before running detection algorithms so criminals utilize their accounts until suspension and exploit others again. In this paper, we propose a new detection scheme to filter potentially malicious account groups around their creation time. Our scheme utilizes the differences between algorithmically generated account names and human-made account names to identify malicious accounts generated using the similar algorithms. For accounts created within a short period of time, we apply a clustering algorithm to group accounts sharing similar name-based features and a classification algorithm to classify malicious account clusters. As a case study, we analyze 4.7 million accounts collected from Twitter. Even though our scheme only relies on account names and their creation time, it achieves reasonable accuracy. Therefore, we can use it as a fast filter against malicious account groups to selectively conduct an in-depth analysis. (C) 2014 Elsevier B.V. All rights reserved.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE BV-
dc.relation.isPartOfCOMPUTER COMMUNICATIONS-
dc.subjectOnline social network-
dc.subjectTwitter-
dc.subjectSpam-
dc.subjectMalicious account-
dc.titleEarly filtering of ephemeral malicious accounts on Twitter-
dc.typeArticle-
dc.contributor.college정보전자융합공학부-
dc.identifier.doi10.1016/J.COMCOM.2014.08.006-
dc.author.googleLee, S-
dc.author.googleKim, J-
dc.relation.volume54-
dc.relation.startpage48-
dc.relation.lastpage57-
dc.contributor.id10074421-
dc.relation.journalCOMPUTER COMMUNICATIONS-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameJournal Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationCOMPUTER COMMUNICATIONS, v.54, pp.48 - 57-
dc.identifier.wosid000346212200003-
dc.date.tcdate2019-01-01-
dc.citation.endPage57-
dc.citation.startPage48-
dc.citation.titleCOMPUTER COMMUNICATIONS-
dc.citation.volume54-
dc.contributor.affiliatedAuthorKim, J-
dc.identifier.scopusid2-s2.0-84946240361-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc7-
dc.description.scptc9*
dc.date.scptcdate2018-05-121*
dc.type.docTypeArticle-
dc.subject.keywordAuthorOnline social network-
dc.subject.keywordAuthorTwitter-
dc.subject.keywordAuthorSpam-
dc.subject.keywordAuthorMalicious account-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

김종KIM, JONG
Dept of Computer Science & Enginrg
Read more

Views & Downloads

Browse