Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 2015
DOI: 10.1145/2808797.2809396
|View full text |Cite
|
Sign up to set email alerts
|

Hunting Organization-Targeted Socialbots

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Honeypots technology is not new and has been popularly used in communication networks as a defensive deception to proactively deal with attackers by luring them to honeypots for preventing them from accessing a target [27]. The existing approaches using social honeypots have mainly focused on detecting social spammers, socialbots [234], or malware [107,108,145,146,147,177,208] as a passive monitoring tool. These works use some profiles of attackers to detect them based on the features collected from the social honeypots placed as fake SNS accounts (e.g., Facebook or Twitter).…”
Section: B Social Honeypotsmentioning
confidence: 99%
See 1 more Smart Citation
“…Honeypots technology is not new and has been popularly used in communication networks as a defensive deception to proactively deal with attackers by luring them to honeypots for preventing them from accessing a target [27]. The existing approaches using social honeypots have mainly focused on detecting social spammers, socialbots [234], or malware [107,108,145,146,147,177,208] as a passive monitoring tool. These works use some profiles of attackers to detect them based on the features collected from the social honeypots placed as fake SNS accounts (e.g., Facebook or Twitter).…”
Section: B Social Honeypotsmentioning
confidence: 99%
“…Paradise et al [145,146] simulated defense account monitoring attack strategies in OSNs. The attackers sent friend requests to some community members chosen by different attacker strategies.…”
Section: B Social Honeypotsmentioning
confidence: 99%
“…Online social networks (OSNs) are abused by cyber criminals who exploit the platform to achieve various malicious goalsspreading dubious rumors, misinformation, or propaganda [1], spam and malware distribution [2], harvesting personal information about individuals [3], infiltration of organizations [4][5][6], and performing industrial espionage [7].…”
Section: Introductionmentioning
confidence: 99%
“…More recently, the new crawling technique of using socialbots [15,16,17,18,19,1] to friend the users and be able to see their private information. Boshmaf et al [15] proposed to build a large scale Socialbots system to infiltrate Facebook.…”
Section: Introductionmentioning
confidence: 99%