Proceedings of the First ACM Conference on Data and Application Security and Privacy 2011
DOI: 10.1145/1943513.1943520
|View full text |Cite
|
Sign up to set email alerts
|

Towards active detection of identity clone attacks on online social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(66 citation statements)
references
References 10 publications
0
66
0
Order By: Relevance
“…Hence, it protects only the identity of a user belonging to a given group of an OSN. In [11], the authors propose two detection schemes to discover potential faked identities in OSNs. These schemes help to resist Identity Clone Attacks (ICA), where the adversary forges the victim's identity and creates a profile with the same information and circles as friends of the victim.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, it protects only the identity of a user belonging to a given group of an OSN. In [11], the authors propose two detection schemes to discover potential faked identities in OSNs. These schemes help to resist Identity Clone Attacks (ICA), where the adversary forges the victim's identity and creates a profile with the same information and circles as friends of the victim.…”
Section: Related Workmentioning
confidence: 99%
“…Jin et al (2011) propose detection of faked identities based on attribute similarity in profiles and similarity of friend networks. When attacker creates a fake identity, the attacker may not only duplicate actual victim data but may also benefit from privacy settings.…”
Section: Fake Identity and Messaging Schemementioning
confidence: 99%
“…Forging identity attacks could be minimized if a person's identity is determined with respect to his/her contacts or whom he/she communicates in the network . Alternative methods may include analyzing activities of fake identities or their response to the validation process (Jin et al, 2011).…”
Section: Handling Fake Identitiesmentioning
confidence: 99%
“…3.1 Profile Sharing: A fascinating attribute connected with several OSNs is always to service interpersonal applications authored by third-party developers to produce added functionalities designed with top connected with users' report for OSNs [1], [5]. To supply meaningful along with beautiful solutions, these kinds of interpersonal applications ingest page capabilities, such as name, Birthday, things to do, likes and dislikes, and the like.…”
Section: Multiparty Access Control For Osns Requirements and Patmentioning
confidence: 99%