首页> 外文期刊>Concurrency and computation: practice and experience >A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines
【24h】

A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines

机译:一种基于仿真攻击实例和支持向量机的社交网络身份盗窃检测机器学习新方法

获取原文
获取原文并翻译 | 示例
       

摘要

The proliferation of social networks and their usage by a wide spectrum of user profiles has been specially notable in the last decade. A social network is frequently conceived as a strongly interlinked community of users, each featuring a compact neighborhood tightly and actively connected through different communication flows. This realm unleashes a rich substrate for a myriad of malicious activities aimed at unauthorizedly profiting from the user itself or from his/her social circle. This manuscript elaborates on a practical approach for the detection of identity theft in social networks, by which the credentials of a certain user are stolen and used without permission by the attacker for its own benefit. The proposed scheme detects identity thefts by exclusively analyzing connection time traces of the account being tested in a nonintrusive manner. The manuscript formulates the detection of this attack as a binary classification problem, which is tackled by means of a support vector classifier applied over features inferred from the original connection time traces of the user. Simulation results are discussed in depth toward elucidating the potentiality of the proposed system as the first step of a more involved impersonation detection framework, also relying on connectivity patterns and elements from language processing. Copyright © 2015 John Wiley & Sons, Ltd.
机译:在过去的十年中,社交网络的激增及其在众多用户个人资料中的使用尤其引人注目。社交网络通常被认为是用户之间相互联系紧密的社区,每个社区都具有紧密的社区,并通过不同的通信流进行主动连接。这个领域为各种恶意活动释放了丰富的底物,这些恶意活动旨在从用户本身或他/她的社交圈中未经授权获利。该手稿详细介绍了一种在社交网络中检测身份盗用的实用方法,通过该方法,某些用户的凭据被盗用,未经攻击者的允许就出于自身利益使用。所提出的方案通过以非侵入性方式专门分析被测试帐户的连接时间轨迹来检测身份盗窃。该手稿将该攻击的检测公式化为二进制分类问题,可通过对从用户的原始连接时间轨迹推断出的特征应用支持向量分类器来解决。仿真结果将进行深入讨论,以阐明拟议系统作为更复杂的模拟检测框架的第一步的潜力,并且还将依赖于语言处理的连接模式和元素。版权所有©2015 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号