2019
DOI: 10.1155/2019/3053418
|View full text |Cite
|
Sign up to set email alerts
|

Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users

Abstract: Online social networks have become an essential part of our daily life. While we are enjoying the benefits from the social networks, we are inevitably exposed to the security threats, especially the serious Advanced Persistent Threat (APT) attack. The attackers can launch targeted cyberattacks on a user by analyzing its personal information and social behaviors. Due to the wide variety of social engineering techniques and undetectable zero-day exploits being used by attackers, the detection techniques of intru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 14 publications
0
11
0
2
Order By: Relevance
“…Phishing email id is a co mmon practice, where the scammer sends some email pretending an official email, and employee's often get victimized by this type of attack. This attack is caused by any WhatsApp group or messenger also [17]. Phishing can be of several types depending on the nature of attacks.…”
Section: Phishing Scamsmentioning
confidence: 99%
“…Phishing email id is a co mmon practice, where the scammer sends some email pretending an official email, and employee's often get victimized by this type of attack. This attack is caused by any WhatsApp group or messenger also [17]. Phishing can be of several types depending on the nature of attacks.…”
Section: Phishing Scamsmentioning
confidence: 99%
“…Although this approach is more unpredictable than other machine learning algorithms, it is suitable for this research because it involves complex processing tasks to analyze the social media feeds, posts, and updates of a given user over a while to identify their behavior patterns [16]. Analyzing the type of feeds and commands that a user receives can help determine if they have socialemotional issues like depression and anxiety or their historical engagements with potential cyber criminals [18]. Unsupervised learning techniques are the most suitable for data categorization in this study.…”
Section: Methodsmentioning
confidence: 99%
“…However, Facebook has its limits based on its user's privacy reasons and international laws that protect users from privacy rights infringement [6]. The online social networking platforms face daily cyber threats from both external parties and the users themselves [18]. Users have been a common target for most online scammers and malicious application developers.…”
Section: Artificial Intelligence In Social Mediamentioning
confidence: 99%
See 1 more Smart Citation
“…Although this approach is more unpredictable compared to other machine learning algorithms, it is suitable for this research because it involves complex processing tasks to analyze the social media feeds, posts, and updates of a given user over a while to identify their behavior patterns [16]. Analyzing the type of feeds and posts that a user receives can help determine if they have social-emotional issues like depression and anxiety or their historical engagements with potential cybercriminals [18]. Unsupervised learning will be the most effective approach to this study because it identifies the unknown patterns in data and features that can be useful in categorization.…”
Section: Methodsmentioning
confidence: 99%