2014
DOI: 10.1109/mic.2014.81
|View full text |Cite
|
Sign up to set email alerts
|

Anti-Reconnaissance Tools: Detecting Targeted Socialbots

Abstract: Attackers employ artificial, machine-operated, social network profiles called socialbots to connect to real members of an organization, thus greatly increasing the amount of information the attacker can collect. to connect socialbots, attackers employ several strategies. the authors' approach detects socialbots by intelligently selecting organization member profiles and monitoring their activity. their study demonstrates their method's efficacyspecifically, that when an attacker knows the defense strategy bein… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(13 citation statements)
references
References 19 publications
(13 reference statements)
0
13
0
Order By: Relevance
“…The key insights behind this is that it becomes difficult for attackers to set up links to real users, and strong trusts are lacking in real OSNs, such as RenRen [47] and Facebook [5,8,12,22]. Souche [46] and Anti-Reconnaissance [31] also rely on the assumption that social network structure alone separates real users from Sybil users. Unfortunately, this was proven unrealistic since real users refuse to interact with unknown accounts [37].…”
Section: Related Workmentioning
confidence: 99%
“…The key insights behind this is that it becomes difficult for attackers to set up links to real users, and strong trusts are lacking in real OSNs, such as RenRen [47] and Facebook [5,8,12,22]. Souche [46] and Anti-Reconnaissance [31] also rely on the assumption that social network structure alone separates real users from Sybil users. Unfortunately, this was proven unrealistic since real users refuse to interact with unknown accounts [37].…”
Section: Related Workmentioning
confidence: 99%
“…Social bots are generally considered to be harmful, although some of them are benign and, in principle, innocuous or even helpful. Therefore, social bots are often the subject of research that needs to be eliminated [26], but researchers have yet to recognize their potential value as a powerful tool in social network analysis [25,27]. The social bot in our experiment is designed to imitate similarity-based relationship formation, which reflects the selective exposure of information and relationships depending on one’s preferred topics.…”
Section: Methodsmentioning
confidence: 99%
“…Honeypots technology is not new and has been popularly used in communication networks as a defensive deception to proactively deal with attackers by luring them to honeypots for preventing them from accessing a target [27]. The existing approaches using social honeypots have mainly focused on detecting social spammers, socialbots [234], or malware [107,108,145,146,147,177,208] as a passive monitoring tool. These works use some profiles of attackers to detect them based on the features collected from the social honeypots placed as fake SNS accounts (e.g., Facebook or Twitter).…”
Section: B Social Honeypotsmentioning
confidence: 99%