DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, S | - |
dc.contributor.author | Kim, J | - |
dc.date.accessioned | 2016-03-31T07:47:36Z | - |
dc.date.available | 2016-03-31T07:47:36Z | - |
dc.date.created | 2015-02-04 | - |
dc.date.issued | 2014-12-01 | - |
dc.identifier.issn | 0140-3664 | - |
dc.identifier.other | 2015-OAK-0000031284 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/14018 | - |
dc.description.abstract | Cybercriminals exploit a large number of ephemeral malicious accounts for conducting large-scale simple attacks such as spam distribution on online social networks. However, conventional detection schemes relying on account or message information take a considerable time to collect such information before running detection algorithms so criminals utilize their accounts until suspension and exploit others again. In this paper, we propose a new detection scheme to filter potentially malicious account groups around their creation time. Our scheme utilizes the differences between algorithmically generated account names and human-made account names to identify malicious accounts generated using the similar algorithms. For accounts created within a short period of time, we apply a clustering algorithm to group accounts sharing similar name-based features and a classification algorithm to classify malicious account clusters. As a case study, we analyze 4.7 million accounts collected from Twitter. Even though our scheme only relies on account names and their creation time, it achieves reasonable accuracy. Therefore, we can use it as a fast filter against malicious account groups to selectively conduct an in-depth analysis. (C) 2014 Elsevier B.V. All rights reserved. | - |
dc.description.statementofresponsibility | X | - |
dc.language | English | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.relation.isPartOf | COMPUTER COMMUNICATIONS | - |
dc.subject | Online social network | - |
dc.subject | - | |
dc.subject | Spam | - |
dc.subject | Malicious account | - |
dc.title | Early filtering of ephemeral malicious accounts on Twitter | - |
dc.type | Article | - |
dc.contributor.college | 정보전자융합공학부 | - |
dc.identifier.doi | 10.1016/J.COMCOM.2014.08.006 | - |
dc.author.google | Lee, S | - |
dc.author.google | Kim, J | - |
dc.relation.volume | 54 | - |
dc.relation.startpage | 48 | - |
dc.relation.lastpage | 57 | - |
dc.contributor.id | 10074421 | - |
dc.relation.journal | COMPUTER COMMUNICATIONS | - |
dc.relation.index | SCI급, SCOPUS 등재논문 | - |
dc.relation.sci | SCIE | - |
dc.collections.name | Journal Papers | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | COMPUTER COMMUNICATIONS, v.54, pp.48 - 57 | - |
dc.identifier.wosid | 000346212200003 | - |
dc.date.tcdate | 2019-01-01 | - |
dc.citation.endPage | 57 | - |
dc.citation.startPage | 48 | - |
dc.citation.title | COMPUTER COMMUNICATIONS | - |
dc.citation.volume | 54 | - |
dc.contributor.affiliatedAuthor | Kim, J | - |
dc.identifier.scopusid | 2-s2.0-84946240361 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.wostc | 7 | - |
dc.description.scptc | 9 | * |
dc.date.scptcdate | 2018-05-121 | * |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Online social network | - |
dc.subject.keywordAuthor | - | |
dc.subject.keywordAuthor | Spam | - |
dc.subject.keywordAuthor | Malicious account | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.