메뉴 건너뛰기




Volumn , Issue , 2012, Pages 353-364

Innocent by association: Early recognition of legitimate users

Author keywords

Account hijacking; Legitimate user recognition; Social graph; Vouching

Indexed keywords

ACCOUNT HIJACKING; DATA SETS; LEGITIMATE USERS; ON-LINE SERVICE; SOCIAL CONNECTION; SOCIAL GRAPHS; USABILITY AND SECURITY; VOUCHING;

EID: 84869387230     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382235     Document Type: Conference Paper
Times cited : (38)

References (34)
  • 1
    • 84870648107 scopus 로고    scopus 로고
    • Cyber-Criminals Shift to Compromised Web Mail Accounts for Spam Delivery. http://www.eweek.com/c/a/Messaging-and-Collaboration/CyberCriminals-Shift-to- Compromised-Web-Mail-Accounts-for-Spam-Delivery-808933/.
  • 5
    • 84870646994 scopus 로고    scopus 로고
    • Rise in Hacked Gmail, Hotmail, and Yahoo Email. http://www.boxaid.com/ word/viruses-and-malware/rise-in-hacked-gmail-hotmailand-yahoo-email.
  • 6
    • 84870631009 scopus 로고    scopus 로고
    • Spammers Using Porn to Break Captchas. http://www.schneier.com/blog/ archives/2007/11/spammers-using.html.
  • 7
    • 84870652378 scopus 로고    scopus 로고
    • Twitter User Reputation Computed from Tweets. http://blog.tagwalk.com/ 2009/11/twitter-user-reputation-computed-from-tweets.
  • 8
    • 35348871999 scopus 로고    scopus 로고
    • Analysis of topological characteristics of huge online social networking services
    • Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong. Analysis of Topological Characteristics of Huge Online Social Networking Services. In WWW, 2007.
    • (2007) WWW
    • Ahn, Y.1    Han, S.2    Kwak, H.3    Moon, S.4    Jeong, H.5
  • 11
    • 18244405757 scopus 로고    scopus 로고
    • Leveraging social networks to fight spam
    • P. Boykin and V. P. Roychowdhury. Leveraging Social Networks to Fight Spam. IEEE Computer, 38, 2005.
    • (2005) IEEE Computer , vol.38
    • Boykin, P.1    Roychowdhury, V.P.2
  • 13
    • 85015988583 scopus 로고    scopus 로고
    • Aiding the detection of fake accounts in large scale social online services
    • Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In NSDI, 2012.
    • (2012) NSDI
    • Cao, Q.1    Sirivianos, M.2    Yang, X.3    Pregueiro, T.4
  • 15
    • 85180633166 scopus 로고    scopus 로고
    • SybilInfer: Detecting sybil nodes using social networks
    • G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009.
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 16
    • 4544304744 scopus 로고    scopus 로고
    • The sybil attack
    • J. Douceur. The Sybil Attack. In IPTPS, 2002.
    • (2002) IPTPS
    • Douceur, J.1
  • 18
    • 78650005374 scopus 로고    scopus 로고
    • @spam: The underground on 140 characters or less
    • C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: The Underground on 140 Characters or Less. In CCS, 2010.
    • (2010) CCS
    • Grier, C.1    Thomas, K.2    Paxson, V.3    Zhang, M.4
  • 19
    • 85041447270 scopus 로고    scopus 로고
    • Detecting spammers with SNARE: Spatio-temporal network-level automatic reputation engine
    • S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In USENIX Security, 2009.
    • (2009) USENIX Security
    • Hao, S.1    Syed, N.A.2    Feamster, N.3    Gray, A.G.4    Krasser, S.5
  • 22
    • 78650907130 scopus 로고    scopus 로고
    • Measuring the mixing time of social graphs
    • A. Mohaisen, A. Yun, and Y. Kim. Measuring the Mixing Time of Social Graphs. In IMC, 2010.
    • (2010) IMC
    • Mohaisen, A.1    Yun, A.2    Kim, Y.3
  • 24
    • 84880521520 scopus 로고    scopus 로고
    • Bazaar: Strengthening user reputations in online marketplaces
    • A. P. V. Shah and A. Mislove. Bazaar: Strengthening User Reputations in Online Marketplaces. In NSDI, 2011.
    • (2011) NSDI
    • Shah, A.P.V.1    Mislove, A.2
  • 25
  • 32
    • 35548992569 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. In SIGCOMM, 2006.
    • (2006) SIGCOMM
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4
  • 33
    • 70350591395 scopus 로고    scopus 로고
    • DryadLINQ: A system for general-purpose distributed data-parallel computing using a high-level language
    • Y. Yu, M. Isard, D. Fetterly, M. Budiu, U. Erlingsson, P. K. Gunda, and J. Currey. DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language. In OSDI, 2008.
    • (2008) OSDI
    • Yu, Y.1    Isard, M.2    Fetterly, D.3    Budiu, M.4    Erlingsson, U.5    Gunda, P.K.6    Currey, J.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.