2015
DOI: 10.1002/cpe.3633
|View full text |Cite
|
Sign up to set email alerts
|

A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines

Abstract: The proliferation of social networks and their usage by a wide spectrum of user profiles has been specially notable in the last decade. A social network is frequently conceived as a strongly interlinked community of users, each featuring a compact neighborhood tightly and actively connected through different communication flows. This realm unleashes a rich substrate for a myriad of malicious activities aimed at unauthorizedly profiting from the user itself or from his/her social circle. This manuscript elabora… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…The results show a good performance in real time, however, without using any reaction and threats prevention. Villar‐Rodriguez et al propose the use of Support Vector Machine (SVM) to detect identity theft in social networks . The authors monitor user profiles based on connection time information.…”
Section: Related Workmentioning
confidence: 99%
“…The results show a good performance in real time, however, without using any reaction and threats prevention. Villar‐Rodriguez et al propose the use of Support Vector Machine (SVM) to detect identity theft in social networks . The authors monitor user profiles based on connection time information.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to that, some works have focused on finding automated ways to detect compromised and hijacked accounts, such as Egele, Stringhini, Kruegel, and Vigna (, ) and Zangerle and Specht (). More recently, some works have explored deep learning techniques to detect identity theft attacks, such as Reyns and Henson (), Wang, Yang, and Luo (), and Villar‐Rodíguez, Del Ser, Torre‐Bastida, Bilbao, and Salcedo‐Sanz (). To keep focus in this article, we mostly discuss works that tackle mass attacks.…”
Section: Knowledge‐based Defense Mechanismsmentioning
confidence: 99%
“…SMO is a WEKA implementation of the sequential minimal optimization algorithm. It is a fast version of support vector machine, which form an important class . SMO can be invoked in WEKA with four kernels.…”
Section: Empirical Studymentioning
confidence: 99%
“…Figure 3 presents the results obtained in filtering phishing emails by these kernels of BN for Dataset A of Table I as training set and Datasets B and C of Table I as validate sets. SMO is a WEKA implementation of the sequential minimal optimization algorithm. It is a fast version of support vector machine, which form an important class [52,53]. SMO can be invoked in WEKA with four kernels.…”
Section: Empirical Studymentioning
confidence: 99%