A security approach based on honeypots: Protecting Online Social network from malicious profiles

04/26/2018
by   Fatna Elmendili, et al.
0

In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for cyber criminality and attacks. It is mostly based on how users are using these sites like Twitter and others. Attackers can easily access and gather personal and sensitive users information. Users are less aware and least concerned about the security setting. And they easily become victim of identity breach. To detect malicious users or fake profiles different techniques have been proposed like our approach which is based on the use of social honeypots to discover malicious profiles in it. Inspired by security researchers who used honeypots to observe and analyze malicious activity in the networks, this method uses social honeypots to trap malicious users. The two key elements of the approach are: (1) The deployment of social honeypots for harvesting information of malicious profiles. (2) Analysis of the characteristics of these malicious profiles and those of deployed honeypots for creating classifiers that allow to filter the existing profiles and monitor the new profiles.

READ FULL TEXT

page 3

page 4

research
05/17/2016

Digital Stylometry: Linking Profiles Across Social Networks

There is an ever growing number of users with accounts on multiple socia...
research
03/07/2020

Friend Recommendation based on Hashtags Analysis

Social networks include millions of users constantly looking for new rel...
research
06/06/2020

Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?

In the last decade, Social Networks (SNs) have deeply changed many aspec...
research
12/20/2017

Inferring User Interests in Microblogging Social Networks: A Survey

With the popularity of microblogging services such as Twitter in recent ...
research
03/22/2018

Sneak into Devil's Colony- A study of Fake Profiles in Online Social Networks and the Cyber Law

Massive content about user's social, personal and professional life stor...
research
03/18/2020

Network disruption: maximizing disagreement and polarization in social networks

Recent years have seen a marked increase in the spread of misinformation...
research
03/05/2018

One-Class Adversarial Nets for Fraud Detection

Many online applications, such as online social networks or knowledge ba...

Please sign up or login with your details

Forgot password? Click here to reset