2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) 2018
DOI: 10.1109/asonam.2018.8508242
|View full text |Cite
|
Sign up to set email alerts
|

ProfileGen: Generation of Automatic and Realistic Artificial Profiles

Abstract: Online social networks (OSNs) are abused by cyber criminals for various malicious activities. One of the most effective approaches for detecting malicious activity in OSNs involves the use of social network honeypotsartificial profiles that are deliberately planted within OSNs in order to attract abusers. Honeypot profiles have been used in detecting spammers, potential cyber attackers, and advanced attackers. Therefore, there is a growing need for the ability to reliably generate realistic artificial honeypot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Attackers have been known to target social networks, where they are capable of gaining sensitive information from unsuspecting users, proliferating malware infections and more. As such, Paradise et al (2018) [87] presented ProfileGen, a tool that produces realistic and compelling social profiles, which function as honeypots, in that they attract the attention of attackers. The proposed system, makes use of an automated process that relies on the generation of a Markov model from collected data.…”
Section: B Network Forensic Methods For Investigating Botnetsmentioning
confidence: 99%
See 1 more Smart Citation
“…Attackers have been known to target social networks, where they are capable of gaining sensitive information from unsuspecting users, proliferating malware infections and more. As such, Paradise et al (2018) [87] presented ProfileGen, a tool that produces realistic and compelling social profiles, which function as honeypots, in that they attract the attention of attackers. The proposed system, makes use of an automated process that relies on the generation of a Markov model from collected data.…”
Section: B Network Forensic Methods For Investigating Botnetsmentioning
confidence: 99%
“…• Honeypots-[48],[62],[73],[77],[87],[87],[90]-are devices, many times simulated ones which run in a controllable virtual environment, that have been designed to appear as an appealing target to attackers and malware infections. Honeypots are generally separated into high interaction and low interaction honeypots, with the former imitating entire systems (e.g., Windows, Linux) and allowing for extended interactions and information gathering, while the latter simulates certain services available through the net, which are often targeted by attackers.…”
mentioning
confidence: 99%