期刊文献+

分享式Spam攻击的轻量级检测方案

Lightweight detection system of shared spam attacks
下载PDF
导出
摘要 Spam攻击是针对社交网络最主要的攻击方式,分享式Spam攻击具有Spam内容的存储与传播分离的新特性,目前没有有效的检测方案。针对这一问题分析了其攻击过程和特征,利用分享式Spam攻击传播和存储的特征设计了轻量级迭代检测算法LIDA,通过目标筛选和内容检测2个步骤实现对分享式Spam的检测。同时,轻量级算法避免了传统算法对每个用户都做深度检测的问题,更具实用性。通过人人网的4次迭代实验,共检测到9 568个Spam账号、30 732个Spam相册以及2 626 780条Spam URL,表明所提的检测算法对于分享式Spam攻击是行之有效的。 Spam is one of the most serious attacks against online social networks(OSN). Recently a new type of spam attack occurs, which named shared spam attack. The shared spam attack can separate the storage and dissemination of spam content, making the existing detection systems no longer effective. To address this problem, an empirical analysis of the process and properties of this new spam attack is performed. A novel lightweight iterative detection algorithm(LIDA) is proposed to detect spam accounts in OSN with these properties. LIDA contains two steps: target filter and content detection. It also noteworthy that LIDA is a lightweight algorithm to infer more spam accounts by exploiting spam accounts' sharing instead of scanning or analyzing all accounts. Experimental results in Ren Ren, which has successfully detected 9 568 spam accounts, 30 732 spam albums and 2 626 780 spam URL in four round iterations, indicate that LIDA is effective and efficiency in detecting shared spam accounts.
出处 《通信学报》 EI CSCD 北大核心 2015年第7期80-91,共12页 Journal on Communications
基金 国家自然科学基金资助项目(61272481) 信息安全国家重点实验室开放课题基金资助项目~~
关键词 社交网络 分享式Spam Spam检测 人人网 online social networks Spam based on sharing Spam detection Ren Ren
  • 相关文献

参考文献29

  • 1FaceBook[EB/OL]. http://en.wikipedia.org/wiki/Facebook.2014.
  • 2RenRen[EB/OL]. http://en.wikipedia.org/wiki/Rertren. 2013.
  • 3MICHAEL F, ROY G, YUVAL E. Online social networks: threates and solutions[J]. IEEE Communications Surveys & Tutorials, 2013, 11(4): 1-19.
  • 4WANG A. Don't follow me: spare detection in twitter[A]. International Conference on Security and Cryptography (SECRYPT)[C]. Athens,Greece, 2010. 142-151.
  • 5HARRIS. A Study of Social Networks Scares Interactive[R]. Public Relations Research, 2008.
  • 6EGELE M, STRINGHINI G, KRUEGEL C. COMPA: detecting compromised account on social networks[A]. Network & Distributed System Security Symposium[C]. San Diego, CA, USA ,2013.
  • 7YANG Z, WILSON C, WANG X. Uncovering social network sybils in the wild[A]. Proceedings of the ACM SIGCOMM Conference on Internet Measurement[C]. Berlin, Germany, 2011. 259-268.
  • 8ZHU Y, WANG X, ZHONG E. Discovering spammers in social networks[A]. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence[C]. Toronto, Canada, 2012. 171 - 177.
  • 9STRINGH1NI G, KRUEGEL C, VIGNA G. Detecting spammers on social networks[A]. Annual Computer Security Applications Conference[C]. Austin, Texas, USA, 2010.1-9.
  • 10THOMAS K, MCCOY D, GRIER C. Trafficking fraudulent accounts: the role of the underground market in twitter spare and abuse[A]. USENIX Security Conferences[C]. Washington D C, USA, 2013.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部