A Novel Approach for Protection of Accounts' Names against Hackers Combining Cluster Analysis and Chaotic Theory

03/08/2019
by   Desislav Andreev, et al.
0

The last years of the 20 th century and the beginning of the 21 th mark the facilitation trend of our real life due to the big development and progress of the computers and other intelligent devices. Algorithms based on artificial intelligence are basically a part of the software. The transmitted information by Internet or LAN arises continuously and it is expected that the protection of the data has been ensured. The aim of the present paper is to reveal false names of users' accounts as a result of hackers' attacks. The probability a given account to be either false or actual is calculated using a novel approach combining machine learning analysis (especially clusters' analysis) with chaos theory. The suspected account will be used as a pattern and by classification techniques clusters will be formed with a respective probability this name to be false. This investigation puts two main purposes: First, to determine if there exists a trend of appearance of the similar usernames, which arises during the creation of new accounts. Second, to detect the false usernames and to discriminate those from the real ones, independently of that if two types of accounts are generated with the same speed. These security systems are applied in different areas, where the security of the data in users' accounts is strictly required. For example, they can be used in on-line voting for balloting, in studying the social opinion by inquiries, in protection of the information in different user accounts of given system etc.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/01/2023

How effective is multifactor authentication at deterring cyberattacks?

This study investigates the effectiveness of multifactor authentication ...
research
09/01/2020

Characterizing Erasable Accounts in Ethereum

Being the most popular permissionless blockchain that supports smart con...
research
06/02/2022

Compromised account detection using authorship verification: a novel approach

Compromising legitimate accounts is a way of disseminating malicious con...
research
03/17/2023

BotShape: A Novel Social Bots Detection Approach via Behavioral Patterns

An essential topic in online social network security is how to accuratel...
research
05/20/2022

Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web

The ubiquity of user accounts in websites and online services makes acco...
research
06/08/2020

Thinking Taxonomically about Fake Accounts: Classification, False Dichotomies, and the Need for Nuance

It is often said that war creates a fog in which it becomes difficult to...
research
01/25/2018

Forecasting Suspicious Account Activity at Large-Scale Online Service Providers

In the face of large-scale automated social engineering attacks to large...

Please sign up or login with your details

Forgot password? Click here to reset