메뉴 건너뛰기




Volumn , Issue , 2014, Pages 477-488

Uncovering large groups of active malicious accounts in online social networks

Author keywords

Malicious account detection; Online social networks; Scalable clustering system

Indexed keywords

MALWARE;

EID: 84910660900     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660269     Document Type: Conference Paper
Times cited : (257)

References (48)
  • 1
    • 84893083291 scopus 로고    scopus 로고
    • Better Security through Software. http://www.facebook.com/notes/facebook/better-security-through-software/248766257130, 2010.
    • (2010) Better Security Through Software
  • 3
    • 84910647281 scopus 로고    scopus 로고
    • Working Together to Keep You Secure. http://www.facebook.com/notes/facebook/working-together-to-keep-you-secure/68886667130, 2010.
    • (2010) Working Together to Keep You Secure
  • 4
    • 84870631425 scopus 로고    scopus 로고
    • Amazon EC2 Pricing. http://aws.amazon.com/ec2/pricing/, 2013.
    • (2013) Amazon EC2 Pricing
  • 5
    • 84904340086 scopus 로고    scopus 로고
    • Apache Giraph. http://giraph.apache.org/, 2013.
    • (2013) Apache Giraph
  • 6
    • 84888107606 scopus 로고    scopus 로고
    • Apache Hadoop. http://hadoop.apache.org/, 2013.
    • (2013) Apache Hadoop
  • 11
    • 84904279917 scopus 로고    scopus 로고
    • Scaling Apache Giraph to a trillion edges. https://www.facebook.com/notes/facebook-engineering/scaling-apache-giraph-to-atrillion-edges/10151617006153920, 2013.
    • (2013) Scaling Apache Giraph to A Trillion Edges
  • 13
    • 84910624800 scopus 로고    scopus 로고
    • Rate Limiting at Facebook. https://developers.facebook.com/docs/reference/ads-api/api-rate-limiting, 2014.
    • (2014) Rate Limiting at Facebook
  • 14
  • 17
    • 84865622599 scopus 로고    scopus 로고
    • All your contacts are belong to us: Automated identity theft attacks on social networks
    • L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In WWW, 2009.
    • (2009) WWW
    • Bilge, L.1    Strufe, T.2    Balzarotti, D.3    Kirda, E.4
  • 18
  • 19
    • 85015988583 scopus 로고    scopus 로고
    • Aiding the detection of fake accounts in large scale social online services
    • Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In NSDI, 2012.
    • (2012) NSDI
    • Cao, Q.1    Sirivianos, M.2    Yang, X.3    Pregueiro, T.4
  • 20
    • 84904429895 scopus 로고    scopus 로고
    • COMPA: Detecting compromised accounts on social networks
    • M. Egele, G. Stringhini, C. Krügel, and G. Vigna. COMPA: Detecting Compromised Accounts on Social Networks. In NDSS, 2013.
    • (2013) NDSS
    • Egele, M.1    Stringhini, G.2    Krügel, C.3    Vigna, G.4
  • 21
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection. In USENIX SECURITY, 2008.
    • (2008) USENIX Security
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 22
    • 85175133385 scopus 로고    scopus 로고
    • BotSniffer: Detecting botnet command and control channels in network traffic
    • G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In NDSS, 2008.
    • (2008) NDSS
    • Gu, G.1    Zhang, J.2    Lee, W.3
  • 23
    • 85041447270 scopus 로고    scopus 로고
    • Detecting spammers with snare: Spatio-temporal network-level automatic reputation engine
    • S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatio-Temporal Network-Level Automatic Reputation Engine. In USENIX SECURITY, 2009.
    • (2009) USENIX Security
    • Hao, S.1    Syed, N.A.2    Feamster, N.3    Gray, A.G.4    Krasser, S.5
  • 24
    • 84980090975 scopus 로고
    • The distribution of the flora in the alpine zone
    • P. Jaccard. The Distribution of the Flora in the Alpine Zone. New Phytologist, 11(2), 1912.
    • (1912) New Phytologist , vol.11 , Issue.2
    • Jaccard, P.1
  • 29
    • 67149084291 scopus 로고    scopus 로고
    • Clustering high-dimensional data: A survey on subspace clustering, pattern-based clustering, and correlation clustering
    • H.-P. Kriegel, P. Kröger, and A. Zimek. Clustering High-Dimensional Data: A Survey on Subspace Clustering, Pattern-Based Clustering, and Correlation Clustering. ACM Trans. Knowl. Discov. Data, 3(1), 2009.
    • (2009) ACM Trans. Knowl. Discov. Data , vol.3 , Issue.1
    • Kriegel, H.-P.1    Kröger, P.2    Zimek, A.3
  • 32
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Internet Quarantine: Requirements for Containing Self-Propagating Code. In INFOCOM, 2003.
    • (2003) INFOCOM
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 36
    • 82955161550 scopus 로고    scopus 로고
    • Suspended accounts in retrospect: An analysis of twitter spam
    • K. Thomas, C. Grier, D. Song, and V. Paxson. Suspended accounts in retrospect: An analysis of twitter spam. In IMC, 2011.
    • (2011) IMC
    • Thomas, K.1    Grier, C.2    Song, D.3    Paxson, V.4
  • 37
    • 84890018962 scopus 로고    scopus 로고
    • Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse
    • K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX SECURITY, 2013.
    • (2013) USENIX Security
    • Thomas, K.1    McCoy, D.2    Grier, C.3    Kolcz, A.4    Paxson, V.5
  • 45
    • 70449694823 scopus 로고    scopus 로고
    • SybilLimit: A near-optimal social network defense against sybil attacks
    • H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks. In IEEE S&P, 2008.
    • (2008) IEEE S&P
    • Yu, H.1    Gibbons, P.2    Kaminsky, M.3    Xiao, F.4
  • 46
    • 35548992569 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. In SIGCOMM, 2006.
    • (2006) SIGCOMM
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.