메뉴 건너뛰기




Volumn , Issue , 2012, Pages 197-210

Aiding the detection of fake accounts in large scale social online services

Author keywords

[No Author keywords available]

Indexed keywords

SYSTEMS ANALYSIS;

EID: 85015988583     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (445)

References (60)
  • 1
    • 84870452716 scopus 로고    scopus 로고
    • Apache Hadoop. http://hadoop.apache.org/.
    • Apache Hadoop
  • 2
    • 84887232333 scopus 로고    scopus 로고
    • Facebook connect. developers.facebook.com/connect.php.
    • Facebook Connect
  • 5
    • 85080686036 scopus 로고    scopus 로고
    • An Explanation of CAPTCHAs. http://www.facebook.com/note. php?note-id=36280205765, 2008.
    • (2008) An Explanation of CAPTCHAs
  • 15
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • A.-L. Barabasi and R. Albert. Emergence of Scaling in Random Networks. Science, 286:509-512, 1999.
    • (1999) Science , vol.286 , pp. 509-512
    • Barabasi, A.-L.1    Albert, R.2
  • 16
    • 0242710969 scopus 로고    scopus 로고
    • Introduction to markov chains: With special emphasis on rapid mixing
    • E. Behrends. Introduction to Markov chains: with Special Emphasis on Rapid Mixing. In Advanced Lectures in Mathematics, 2000.
    • (2000) Advanced Lectures in Mathematics
    • Behrends, E.1
  • 17
    • 84865622599 scopus 로고    scopus 로고
    • All your contacts are belong to Us: Automated identity theft attacks on social networks
    • L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In WWW, 2009.
    • (2009) WWW
    • Bilge, L.1    Strufe, T.2    Balzarotti, D.3    Kirda, E.4
  • 19
    • 84855692796 scopus 로고    scopus 로고
    • The socialbot network: "When bots socialize for fame and money
    • Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The Socialbot Network: "When Bots Socialize for Fame and Money. In ACSAC, 2011.
    • (2011) ACSAC
    • Boshmaf, Y.1    Muslukhov, I.2    Beznosov, K.3    Ripeanu, M.4
  • 21
    • 84885797269 scopus 로고    scopus 로고
    • Sybilproof reputation mechanisms
    • A. Cheng and E. Friedman. Sybilproof Reputation Mechanisms. In P2PEcon, 2005.
    • (2005) P2PEcon
    • Cheng, A.1    Friedman, E.2
  • 22
    • 33745785709 scopus 로고    scopus 로고
    • MailRank: Using ranking for spamdetection
    • P.-A. Chirita, J. Diederich, and W. Nejdl. MailRank: Using Ranking for SpamDetection. In CIKM,2005.
    • (2005) CIKM
    • Chirita, P.-A.1    Diederich, J.2    Nejdl, W.3
  • 23
    • 84887050003 scopus 로고    scopus 로고
    • SybilInfer: Detecting sybil nodes using social networks
    • G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes Using Social Networks. In NDSS, 2009.
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 24
    • 85030321143 scopus 로고    scopus 로고
    • MapReduce: Simplified data processing on large clusters
    • J. Dean and S. Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. In OSDI, 2004.
    • (2004) OSDI
    • Dean, J.1    Ghemawat, S.2
  • 26
    • 4544304744 scopus 로고    scopus 로고
    • The sybil attack
    • J. R. Douceur. The Sybil Attack. In IPTPS,2002.
    • (2002) IPTPS
    • Douceur, J.R.1
  • 27
    • 80051972853 scopus 로고    scopus 로고
    • Preventing sybil attacks by privilege attenuation: ADesign principle for social network systems
    • P. W. L. Fong. Preventing Sybil Attacks by Privilege Attenuation: ADesign Principle for Social Network Systems. In IEEES&P,2011.
    • (2011) IEEES&P
    • Fong, P.W.L.1
  • 28
  • 29
    • 78650115969 scopus 로고    scopus 로고
    • A walk in face-book: Uniform sampling of users in online social networks
    • M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou. A Walk in Face-book: Uniform Sampling of Users in Online Social Networks. In IEEE INFOCOM, 2010.
    • (2010) IEEE INFOCOM
    • Gjoka, M.1    Kurant, M.2    Butts, C.T.3    Markopoulou, A.4
  • 31
    • 0020083498 scopus 로고
    • The meaning and use of the area under a receiver operating characteristic (ROC) curve
    • J. A. Hanley and B. J. McNeil. The Meaning and Use of the Area under a Receiver Operating Characteristic (ROC) Curve. Radiology, 143, 1982.
    • (1982) Radiology , pp. 143
    • Hanley, J.A.1    McNeil, B.J.2
  • 33
    • 84880467894 scopus 로고    scopus 로고
    • The eigentrust algorithm for reputation management in P2P networks
    • S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust Algorithm for Reputation Management in P2P Networks. In WWW, 2003.
    • (2003) WWW
    • Kamvar, S.D.1    Schlosser, M.T.2    Garcia-Molina, H.3
  • 36
    • 85076766975 scopus 로고    scopus 로고
    • Whanau: A sybil-proof distributed hash table
    • C. Lesniewski-Laas and M. F. Kaashoek. Whanau: A Sybil-proof Distributed Hash Table. In NSDI, 2010.
    • (2010) NSDI
    • Lesniewski-Laas, C.1    Kaashoek, M.F.2
  • 37
    • 45749135561 scopus 로고    scopus 로고
    • Ostra: Leveraging social networks to thwart unwanted traffic
    • A. Mislove, A. Post, P. Druschel, and K. P. Gummadi. Ostra: Leveraging Social Networks to Thwart Unwanted Traffic. In NSDI, 2008.
    • (2008) NSDI
    • Mislove, A.1    Post, A.2    Druschel, P.3    Gummadi, K.P.4
  • 38
    • 84893108948 scopus 로고    scopus 로고
    • You are who you know: Inferring user profiles in online social networks
    • A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are Who You Know: Inferring User Profiles in Online Social Networks. In ACM WSDM, 2010.
    • (2010) ACM WSDM
    • Mislove, A.1    Viswanath, B.2    Gummadi, K.P.3    Druschel, P.4
  • 40
    • 79960871268 scopus 로고    scopus 로고
    • Keep your friends close: Incorporating trust into social-network-based sybil defenses
    • A. Mohaisen, N. Hopper, and Y. Kim. Keep Your Friends Close: Incorporating Trust into Social-Network-based Sybil Defenses. In INFOCOM, 2011.
    • (2011) INFOCOM
    • Mohaisen, A.1    Hopper, N.2    Kim, Y.3
  • 41
    • 84904118229 scopus 로고    scopus 로고
    • Measuring the mixing time of social graphs
    • A. Mohaisen, A. Yun, and Y. Kim. Measuring the Mixing Time of Social Graphs. In ACM IMC, 2010.
    • (2010) ACM IMC
    • Mohaisen, A.1    Yun, A.2    Kim, Y.3
  • 44
    • 84862950548 scopus 로고    scopus 로고
    • Ghostbusting facebook: Detecting and characterizing phantom profiles in online social gaming applications
    • A. Nazir, S. Raza, C.-N. Chuah, and B. Schipper. Ghostbusting Facebook: Detecting and Characterizing Phantom Profiles in Online Social Gaming Applications. In WOSN, 2010.
    • (2010) WOSN
    • Nazir, A.1    Raza, S.2    Chuah, C.-N.3    Schipper, B.4
  • 46
    • 85080797133 scopus 로고    scopus 로고
    • Bazaar: Strengthening user reputations in online marketplaces
    • A. Post, V. Shah, and A. Mislove. Bazaar: Strengthening User Reputations in Online Marketplaces. In USENIX NSDI, 2011.
    • (2011) USENIX NSDI
    • Post, A.1    Shah, V.2    Mislove, A.3
  • 47
    • 77953317298 scopus 로고    scopus 로고
    • Sybil attacks against mobile users: Friendsand foes to the rescue
    • D. Quercia and S. Hailes. Sybil Attacks Against Mobile Users: Friendsand Foes to the Rescue. In INFOCOM, 2010.
    • (2010) INFOCOM
    • Quercia, D.1    Hailes, S.2
  • 49
    • 81255135726 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • R. Sommer and V. Paxson. Outside the closed world: On using machine learning for network intrusion detection. In IEEE S&P, 2010.
    • (2010) IEEE S&P
    • Sommer, R.1    Paxson, V.2
  • 50
    • 82955161550 scopus 로고    scopus 로고
    • Suspended accounts in retrospect: An analysis of twitter spam
    • K. Thomas, C. Grier, V. Paxson, and D. Song. Suspended Accounts in Retrospect: An Analysis of Twitter Spam. In IMC, 2011.
    • (2011) IMC
    • Thomas, K.1    Grier, C.2    Paxson, V.3    Song, D.4
  • 52
  • 56
    • 45749116664 scopus 로고    scopus 로고
    • SybilLimit: A near-optimal social network defense against sybil attacks
    • H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks. InIEEES&P, 2008.
    • (2008) IEEES&P
    • Yu, H.1    Gibbons, P.2    Kaminsky, M.3    Xiao, F.4
  • 57
    • 35548992569 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. In SIGCOMM, 2006.
    • (2006) SIGCOMM
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4
  • 58
    • 70449670722 scopus 로고    scopus 로고
    • DSybil: Optimal sybil-resistance for recommendation systems
    • H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao. DSybil: Optimal Sybil-Resistance for Recommendation Systems. In IEEES&P, 2009.
    • (2009) IEEES&P
    • Yu, H.1    Shi, C.2    Kaminsky, M.3    Gibbons, P.B.4    Xiao, F.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.