메뉴 건너뛰기




Volumn , Issue , 2014, Pages 129-135

Paying for likes? Understanding facebook like fraud using honeypots

Author keywords

Honeypots; Malicious activities; Online social networks

Indexed keywords

CRIME; NETWORK SECURITY;

EID: 84910115464     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2663716.2663729     Document Type: Conference Paper
Times cited : (102)

References (30)
  • 1
    • 84910140943 scopus 로고    scopus 로고
    • Facebook Ads Optimization. http://weigend.com/files/teaching/stanford/2009/homeworks/ad-optimization-final.pdf.
    • Facebook Ads Optimization
  • 4
    • 84893095820 scopus 로고    scopus 로고
    • Copy catch: Stopping group attacks by spotting lockstep behavior in social networks
    • A. Beutel, W. Xu, V. Guruswami, C. Palow, and C. Faloutsos. Copy Catch: Stopping Group Attacks by Spotting Lockstep Behavior in Social Networks. In WWW, 2013.
    • (2013) WWW
    • Beutel, A.1    Xu, W.2    Guruswami, V.3    Palow, C.4    Faloutsos, C.5
  • 5
    • 85015988583 scopus 로고    scopus 로고
    • Aiding the detection of fake accounts in large scale social online services
    • Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In NSDI, 2012.
    • (2012) NSDI
    • Cao, Q.1    Sirivianos, M.2    Yang, X.3    Pregueiro, T.4
  • 8
    • 85141046573 scopus 로고    scopus 로고
    • You are what you like! information leakage through users' interests
    • A. Chaabane, G. Acs, and M.-A. Kaafar. You Are What You Like! Information Leakage Through Users' Interests. In NDSS, 2012.
    • (2012) NDSS
    • Chaabane, A.1    Acs, G.2    Kaafar, M.-A.3
  • 9
    • 84899866845 scopus 로고    scopus 로고
    • How much is too much? Leveraging ads audience estimation to evaluate public profile uniqueness
    • T. Chen, A. Chaabane, P. U. Tournoux, M.-A. Kaafar, and R. Boreli. How Much is too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness. In PETS, 2013.
    • (2013) PETS
    • Chen, T.1    Chaabane, A.2    Tournoux, P.U.3    Kaafar, M.-A.4    Boreli, R.5
  • 10
    • 85180633166 scopus 로고    scopus 로고
    • Sybilinfer: Detecting sybil nodes using social networks
    • G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009.
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 11
    • 84866484075 scopus 로고    scopus 로고
    • Measuring and fingerprinting click-spam in ad networks
    • V. Dave, S. Guha, and Y. Zhang. Measuring and Fingerprinting Click-Spam in Ad Networks. In SIGCOMM, 2012.
    • (2012) SIGCOMM
    • Dave, V.1    Guha, S.2    Zhang, Y.3
  • 15
  • 17
    • 77956044597 scopus 로고    scopus 로고
    • Uncovering social spammers: Social honeypots + machine learning
    • K. Lee, J. Caverlee, and S. Webb. Uncovering social spammers: Social honeypots + machine learning. In SIGIR, 2010.
    • (2010) SIGIR
    • Lee, K.1    Caverlee, J.2    Webb, S.3
  • 20
    • 84910135236 scopus 로고    scopus 로고
    • February
    • D. Muller. Facebook Fraud. https://www.youtube.com/watch?v=oVfHeWTKjag, February 2014.
    • (2014) Facebook Fraud
    • Muller, D.1
  • 21
    • 84862950548 scopus 로고    scopus 로고
    • Ghost busting facebook: Detecting and characterizing phantom profiles in online social gaming applications
    • A. Nazir, S. Raza, C.-N. Chuah, and B. Schipper. Ghost busting Facebook: Detecting and Characterizing Phantom Profiles in Online Social Gaming Applications. In WOSN, 2010.
    • (2010) WOSN
    • Nazir, A.1    Raza, S.2    Chuah, C.-N.3    Schipper, B.4
  • 25
    • 82955161550 scopus 로고    scopus 로고
    • Suspended accounts in retrospect: An analysis of twitter spam
    • K. Thomas, C. Grier, V. Paxson, and D. Song. Suspended Accounts in Retrospect: An Analysis of Twitter Spam. In IMC, 2011.
    • (2011) IMC
    • Thomas, K.1    Grier, C.2    Paxson, V.3    Song, D.4
  • 26
    • 84890018962 scopus 로고    scopus 로고
    • Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse
    • K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security Symposium, 2013.
    • (2013) USENIX Security Symposium
    • Thomas, K.1    McCoy, D.2    Grier, C.3    Kolcz, A.4    Paxson, V.5
  • 27
    • 84910151063 scopus 로고    scopus 로고
    • Analyzing spammersŠ social networks for fun and profit
    • C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing SpammersŠ Social Networks for Fun and Profit. In WWW, 2012.
    • (2012) WWW
    • Yang, C.1    Harkreader, R.2    Zhang, J.3    Shin, S.4    Gu, G.5
  • 29
    • 45749116664 scopus 로고    scopus 로고
    • Sybil limit: A near-optimal social network defense against sybil attacks
    • H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybil Limit: A Near-Optimal Social Network Defense against Sybil Attacks. In IEEE Security & Privacy, 2008.
    • (2008) IEEE Security & Privacy
    • Yu, H.1    Gibbons, P.B.2    Kaminsky, M.3    Xiao, F.4
  • 30
    • 35548992569 scopus 로고    scopus 로고
    • Sybil guard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybil Guard: Defending Against Sybil Attacks via Social Networks. In SIGCOMM, 2006.
    • (2006) SIGCOMM
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.