Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication 2013
DOI: 10.1145/2448556.2448615
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing and identifying cloning attacks in online social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…They designed and implemented a prototype which can be employed to investigate whether or not users have fallen victim to clone attacks. In 2013, Shan et al [126] presented the CloneSpotter which can be deployed into the OSN infrastructure and can detect cloning attacks by using users' data records, such as a user's login IP records that are available to the OSN operator.…”
Section: Academic Solutionsmentioning
confidence: 99%
“…They designed and implemented a prototype which can be employed to investigate whether or not users have fallen victim to clone attacks. In 2013, Shan et al [126] presented the CloneSpotter which can be deployed into the OSN infrastructure and can detect cloning attacks by using users' data records, such as a user's login IP records that are available to the OSN operator.…”
Section: Academic Solutionsmentioning
confidence: 99%
“…For instance, a specific tool was developed in order to determine whether the profiles of social network users have been subject to cloning attack [47]. An approach called CloneSpotter was proposed in order to detect the cloning attack on social network profiles [48]. This approach is based on the analysis of registration data of users available for social network operators.…”
Section: Protection Methods Against Threats In Social Networkmentioning
confidence: 99%
“…Most profile cloning studies utilized the user profiles [91,95,169]. To identify cloned profiles, they calculated profile similarities using various methods based on user profile attributes.…”
Section: A User Profile-based Deception Detection Mechanismsmentioning
confidence: 99%
“…The binary classifier was based on both the profile attributes similarity and friend list similarity. Shan et al [169] simulated profile cloning attacks by snowball sampling and iteration attack and then detected the attackers by a detector called 'ChoneSpotter.' The context-free detection algorithm includes the profile information and friendship connections.…”
Section: A User Profile-based Deception Detection Mechanismsmentioning
confidence: 99%