DOI: 10.1007/978-3-540-85886-7_10
|View full text |Cite
|
Sign up to set email alerts
|

Antisocial Networks: Turning a Social Network into a Botnet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(24 citation statements)
references
References 11 publications
0
24
0
Order By: Relevance
“…7 When a user activated the application, it displayed an image but also embedded hidden frames with inline images hosted at a designated target. Each time the user clicked within the app, it fetched the inline images without the target's awareness.…”
Section: Related Work Mmentioning
confidence: 99%
“…7 When a user activated the application, it displayed an image but also embedded hidden frames with inline images hosted at a designated target. Each time the user clicked within the app, it fetched the inline images without the target's awareness.…”
Section: Related Work Mmentioning
confidence: 99%
“…In particular, [25] served as the starting point of the present study. It should be noted that the focus of the present paper is only remotely related to the abuse of social networks for other purposes [1].…”
Section: Related Workmentioning
confidence: 99%
“…These approaches, however, might be completely useless against new (or recent) appeared botnets in which their structures are moved from centralized to decentralized (peer-to-peer) and their C&C channels are evolved from IRC or HTTP to other own developed protocols based on TCP/IP stack (e.g. turning a social network into a botnet [7]); (2) How to identify applications for network traffic? Identifying network traffic as different applications is very challenging and is still an issue yet to be solved.…”
Section: Ddosmentioning
confidence: 99%