Detecting Organization-Targeted Socialbots by Monitoring Social Network Profiles (original) (raw)
References
Aichner T, Jacob F (2015) Measuring the degree of corporate social media use. Int J Mark Res 57(2):257–276 Article Google Scholar
Aiello LM, Deplano M, Schifanella R, Ruffo G (2012) People are strange when you’re a stranger: impact and influence of bots on social networks. Links 697(483,151):1–566 Google Scholar
Alpcan T, Basar T (2006) An intrusion detection game with limited observations. In: 12th Int. Symp. on Dynamic Games and Applications, Sophia Antipolis, France (Vol. 26)
An B, Kempe D, Kiekintveld C, Shieh E, Singh S, Tambe M, Vorobeychik Y (2012) Security games with limited surveillance. Ann Arbor 1001:48109 Google Scholar
Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on twitter. In: Collaboration, electronic messaging, anti-abuse and spam conference (CEAS) (Vol. 6, p. 12)
Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web (pp. 551–560). ACM
Bnaya Z, Puzis R, Stern R, Felner A (2013) Social network search as a volatile multi-armed bandit problem. HUMAN 2(2):84 Google Scholar
Boldi P, Vigna S (2013) Axioms for centrality. arXiv 1308:2140 Google Scholar
Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M (2011) Thesocialbot network: when bots socialize for fame and money. In:Proceeding of the 27th Annual Computer Security Applications Conference. 93–102
Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M (2013) Design and analysis of a social botnet. Comput Netw 57(2):556–578 Article Google Scholar
Boshmaf Y, Logothetis D, Siganos G, Lería J, Lorenzo J, Ripeanu M, Beznosov K (2016) Íntegro: leveraging victim prediction for robust fake account detection in large scale OSNs. Comput Sec 61:142–168 Article Google Scholar
Cats O, Jenelius E (2014) Dynamic vulnerability analysis of public transport networks: mitigation effects of real-time information. Network and Spatial Economics 14(3):435–463
Cao Q, Yang X, Yu J, Palow C (2014) Uncovering large groups of active malicious profiles in online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 477–488
Danezis G, Mittal P (2009) SybilInfer: Detecting Sybil Nodes using Social Networks. In: NDSS
De Choudhury M, Counts S (2013) Understanding affect in the workplace via social Media. In: Proceedings of the 2013 conference on Computer supported cooperative work (pp. 303–316). ACM
Egele M, Stringhini G, Kruegel C, Vigna G (2017) Towards detecting compromised accounts on social networks. IEEE Transactions on Dependable and Secure Computing 14(4):447–460
Elyashar A, Fire M, Kagan D, Elovici Y (2013) Homing socialbots: intrusion on a specific organization's employee using Socialbots. In: Proc. of the 2013 IEEE/ACM International Conf. on ASONAM. 1358–1365
Elyashar A, Fire M, Kagan D, Elovici Y (2014) Guided socialbots: infiltrating the social networks of specific organizations’ employees. AI Commun 29(1):87–106 Article Google Scholar
Esfahani PM, Vrakopoulou M, Margellos K, Lygeros J, Andersson G (2010) A robust policy for automatic generation control cyber attack in two area power network. In: Decision and Control (CDC), 2010 49th IEEE Conference on (pp. 5973–5978). IEEE
Fire M, Puzis R (2016) Organization mining using online social networks. Networks and Spatial Economics 16(2):545–578
Fisher RA (1921) On the probable error of a coefficient of correlation deduced from a small sample. Metron 1:3–32 Google Scholar
Freitas CA, Benevenuto F, Ghosh S, Veloso A (2014) Reverse engineering socialbot infiltration strategies in twitter. arXiv preprint arXiv: 1405.4927
Freitas C, Benevenuto F, Veloso A, Ghosh S (2016) An empirical study of socialbot infiltration strategies in the twitter social network. Soc Netw Anal Min 6(1):1–16 Article Google Scholar
Huberman BA, Romero DM, Wu F (2008) Social networks that matter: Twitter under the microscope. arXiv preprint arXiv:0812.1045
Hwang T, Pearce I, Nanis M (2012) Socialbots: voices from the fronts. Interactions 19(2):38–45 Article Google Scholar
Illenberger J, Nagel K, Flötteröd G (2013) The role of spatial interaction in social networks. Networks and Spatial Economics 13(3):255–282
Irani D, Balduzzi M, Balzarotti D, Kirda, E, Pu C (2011) Reverse social engineering attacks in online social networks. International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 55–74). Springer, Berlin, Heidelberg
Jeun I, Lee Y, Won DA (2012) A practical study on advanced persistent threats. Computer applications for security, control and system engineering. Springer, Heidelberg, pp 144–152 Book Google Scholar
Ji Y, He Y, Jiang X, Cao J, Li Q (2016) Combating the evasion mechanisms of social bots. Comput Sec 58:230–249 Article Google Scholar
Joinson AN (2008) Looking at, looking up or keeping up with people?: motives and use of facebook. In: Proceedings of the SIGCHI conference on Human Factors in Computing Systems (pp. 1027–1036). ACM
Kitti M (2012) Axioms for Centrality Scoring with Principal Eigenvectors. No. 79
Koll D, Schwarzmaier M, Li J, Li XY, Fu X (2017) Thank you for being a friend: an attacker view on online-social-network-based Sybil defenses. In Distributed Computing Systems Workshops (ICDCSW), 2017 IEEE 37th International Conference on (pp. 157-162). IEEE
Krombholz K, Merkl D, Weippl E (2012) Fake identities in social media: a case study on the sustainability of the Facebook business model. J Serv Sci Res 4(2):175–212 Article Google Scholar
Lee K, Caverlee J, Webb S (2010) Uncovering social spammers: social honeypots+ machine learning. In: Proc. of the 33rd international ACM SIGIR conf. on Research and development in information retrieval. 435–442
Lesser O, Tenenboim-Chekina L, Rokach L, Elovici Y (2013) Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks. SBP
Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE (pp. 1307–1315). IEEE
Mann I (2017) Hacking the human: social engineering techniques and security countermeasures. Routledge, London
Messias J, Schmidt L, Oliveira R, Benevenuto F (2013) You followed my bot! Transforming robots into influential users in Twitter. First Monday, Volume 18, Number 7–1 July 2013
Molok N, Chang S, Ahmad A (2010) Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats, 8th Australian Information Security Management
Mulamba D, Ray I, Ray I (2016) SybilRadar: A graph-structure based framework for sybil detection in on-line social networks. In IFIP International Information Security and Privacy Conference 179–193
Nagle F, Singh L (2009) Can Friends Be Trusted? Exploring Privacy in Online Social Networks. ASONAM, 312–315
Page L, Brin S, Motwani R, Winograd T (1999) The PageRank citation ranking: Bringing order to the web
Paradise A, Puzis R, Shabtai A (2014) Anti-reconnaissance tools: detecting targeted socialbots. IEEE Internet Comput 18(5):11–19 Article Google Scholar
Paradise A, Shabtai A, Puzis R (2015) Hunting organization-targeted Socialbots. In: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. 537–540
Paradise A, Shabtai A, Puzis R, Elyashar A, Elovici Y, Roshandel M, Peylo C (2017) Creation and Management of Social Network Honeypots for detecting targeted cyber attacks. IEEE Transactions on Computational Social Systems 4(3):65–79 Article Google Scholar
Patil S (2012) Will you be my friend?: responses to friendship requests from strangers, the 2012 ACM iConference, 634–635
Rao CR (1973) Linear statistical inference and its applications. Wiley, New York Book Google Scholar
Rashtian H, Boshmaf Y, Jaferian P, Beznosov K (2014) To Be friend Or Not? A Model of Friend Request Acceptance on Facebook. In: Symposium on Usable Privacy and Security (SOUPS)
Raymond DR, Marchany RC, Brownfield MI, Midkiff SF (2009) Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Trans Veh Technol 58(1):367–380 Article Google Scholar
Romero DM, Galuba W, Asur S, Huberman BA (2011) Influence and passivity in social media. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases (18–33). Springer, Berlin
Samama-Kachko L, Puzis R, Stern R, Felner A (2014) Extended Framework for Target Oriented Network Intelligence Collection. In Seventh Annual Symposium on Combinatorial Search
Singh N, Chatterjee M (2017) BotDefender: A Framework to Detect Bots in Online Social Media. Journal of Network Communications and Emerging Technologies (JNCET) 7(9)
Stein T, Chen E, Mangla K (2011) Facebook immune system. In: Proceedings of the 4th Workshop on Social Network Systems, p. 8
Stern RT, Samama L, Puzis R, Beja T, Bnaya Z, Felner A (2013) TONIC: Target Oriented Network Intelligence Collection for the Social Web. In: AAAI
Stringhini G, Kruegel, C, Vigna G (2010) Detecting spammers on social networks. In: Proc. of the 26th Annual Computer Security Applications Conference. 1–9
Tankard C (2011) Advanced persistent threats and how to monitor and deter them. Netw Secur 2011(8):16–19
Teixeira A, Amin S, Sandberg H, Johansson KH, Sastry SS (2010) Cyber security analysis of state estimators in electric power systems. In: Decision and Control (CDC), 2010 49th IEEE Conference on (5991–5998). IEEE
Wang AH (2010) Detecting spam bots in online social networking sites: a machine learning approach. In: IFIP Annual Conference on Data and Applications Security and Privacy. 335–342
Wang D, Irani D, Pu C (2011) A social-spam detection framework. In: 8th Annual Conference on Collaboration, Electronic messaging, Anti-Abuse and Spam. 46–54
Webb S, Caverlee J, Pu C (2008) Social Honeypots: Making Friends with a Spammer near You. In: CEAS
Wei W, Xu F, Tan CC, Li Q (2012) Sybildefender: Defend against sybil attacks in large social networks. In: INFOCOM, 2012 Proceedings IEEE, pp. 1951–1959
Xie Y, Yu F, Ke Q, Abadi M, Gillum E, Vitaldevaria K, Mao ZM (2012) Innocent by association: early recognition of legitimate users. In: Proc. of the 2012 ACM conf. on Computer and communications security. 353–364
Xue J, Yang, Z, Yang X, Wang X, Chen L, Dai Y (2013) Votetrust: Leveraging friend invitation graph to defend against social network sybils. In: INFOCOM, 2013 Proceedings IEEE. 2400–2408
Yang J, Leskovec J (2012) Defining and Evaluating Network Communities based on Ground-truth. ICDM
Yang Z, Wilson C, Wang X, Gao T, Zhao BY, Dai Y (2011) Uncovering Social Network Sybils in the Wild. arXiv preprint arXiv:1106.5321
Yu H, Kaminsky M, Gibbons PB, Flaxman AD (2006) Sybilguard: defending against sybil attacks via social networks. IEEE/ACM Trans Networking 16(3):576–589 Article Google Scholar
Yu H, Gibbons PB, Kaminsky M, Xiao F )2008) Sybillimit: A near-optimal social network defense against sybil attacks. In Security and Privacy, 2008. SP 2008. IEEE Symposium on (3–17). IEEE