Detecting Compromised High-Profile Accounts on Social Networks
All Social networking sites, such as Facebook and Twitter, have become increasingly popular over the last few years. Nowadays, cyber-criminals have started to exploit these sites to spread malware and to carry out scams. Previous research showed that attackers have started to compromise and abuse le...
Saved in:
Published in | 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) pp. 1 - 4 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.07.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | All Social networking sites, such as Facebook and Twitter, have become increasingly popular over the last few years. Nowadays, cyber-criminals have started to exploit these sites to spread malware and to carry out scams. Previous research showed that attackers have started to compromise and abuse legitimate accounts. High-profile legitimate accounts to spread fake information or malicious content are more advantageous to attackers, because high-profile accounts user having more followers and they react to messages coming from high-profile accounts. In this paper, we study the Behavior of user's, i.e. their usage of different type of stream features to post the message. A behavioral profile of user accurately reflects a user's message writing patterns. A behavioral profile of user capably distinguishes different users and our results shows behavioral profile of user differentiate individual users accurately and detect compromised accounts. |
---|---|
DOI: | 10.1109/ICCCNT.2018.8493851 |