On a Machine Learning Approach for the Detection of Impersonation Attacks in Social Networks
Lately the proliferation of social networks has given rise to a myriad of fraudulent strategies aimed at getting some sort of benefit from the attacked individual. Despite most of them being exclusively driven by economic interests, the so called impersonation, masquerading attack or identity fraud hinges on stealing the credentials of the victim and assuming his/her identity to get access to resources (e.g. relationships or confidential information), credit and other benefits in that person’s name. While this problem is getting particularly frequent within the teenage community, the reality is that very scarce technological approaches have been proposed in the literature to address this issue which, if not detected in time, may catastrophically unchain other fatal consequences to the impersonated person such as bullying and intimidation. In this context, this paper delves into a machine learning approach that permits to efficiently detect this kind of attacks by solely relying on connection time information of the potential victim. The manuscript will demonstrate how these learning algorithms - in particular, support vector classifiers - can be of great help to understand and detect impersonation attacks without compromising the user privacy of social networks.
KeywordsImpersonation Social Networks Support Vector Machines
Unable to display preview. Download preview PDF.
- 1.Pew Internet research on social networking, http://www.pewinternet.org/Commentary/2012/March/Pew-Internet-Social-Networking-full-detail.aspx (retrieved on April 2014)
- 2.Dasgupta, K., Singh, R., Viswanathan, B., Chakraborty, D., Mukherjea, S., Nanavati, A.A., Joshi, A.: Social Ties and Their Relevance to Churn in Mobile Telecom Networks. In: Proceedings of the 11th International Conference on Extending Database Technology, pp. 668–677 (2008)Google Scholar
- 3.Eysenbach, G.: Medicine 2.0: Social Networking, Collaboration, Participation, Apomediation, and Openness. Journal of Medical Internet Research 10(3) (2008)Google Scholar
- 4.Zeng, L., Hall, H., Pitts, M.J.: Cultivating a Community of Learners. The Potential Challenges of Social Media in Higher Education. In: Noor Al-Deen, H., Hendricks, J.A. (eds.) Social Media: Usage and Impact. Lexington Books (2011)Google Scholar
- 5.Twitter: Keeping our users secure, https://blog.twitter.com/2013/keeping-our-users-secure (retrieved on April 2014)
- 6.Martin, A., Anutthamaa, N.B., Sathyavathy, M., Saint Francois, M.M., Venkatesan, P.: A Framework for Predicting Phishing Websites Using Neural Networks. IJCSI International Journal of Computer Science Issues 8(2), 330–336 (2011)Google Scholar
- 8.Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: COMPA: Detecting Compromised Accounts on Social Networks. In: ISOC Network and Distributed System Security Symposium, NDSS (2013)Google Scholar
- 9.Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.: Towards Online Spam Filtering in Social Networks. In: ISOC Network and Distributed System Security Symposium, NDSS (2012)Google Scholar
- 11.Miyamoto, D., Hazeyama, H., Kadobayashi, Y.: A Proposal of the AdaBoost-based Detection of Phishing Sites. In: Proceedings of the Joint Workshop on Information Security (2007)Google Scholar
- 12.Zhang, Y., Hong, J., Cranor, L.: Cantina: A Content-based Approach to Detecting Phishing Web Sites. In: Proceedings of the International World Wide Web Conference, WWW (2007)Google Scholar
- 13.Liu, W., Huang, G., Liu, X., Zhang, M., Deng, X.: Detection of Phishing Web Pages based on Visual Similarity. In: Proceedings of the International World Wide Web Conference (WWW), pp. 1060–1061 (2005)Google Scholar
- 14.Borg, I., Groenen, P.: Modern Multidimensional Scaling: Theory and Applications, 2nd edn., pp. 207–212. Springer (2005)Google Scholar