期刊文献+

在线社交网络中异常帐号检测方法研究 被引量:26

Anomaly Detection in Online Social Networks
下载PDF
导出
摘要 异常帐号检测是在线社交网络安全研究的关键问题之一.攻击者通过异常帐号传播广告、钓鱼等恶意消息以及恶意关注、点赞等行为严重威胁正常用户的信息安全和社交网络的信用体系,为此有大量的研究工作来检测社交网络中异常帐号.文中回顾了近年来在线社交网络中异常帐号检测的主要成果,阐述了异常帐号在不同发展阶段的表现形式以及检测异常帐号所面临的主要挑战,重点从基于行为特征、基于内容、基于图(Graph)、无监督学习四个方面总结了异常帐号检测方案,介绍了在实验过程中数据获取、数据标识以及结果验证的主要方法,并对未来异常帐号检测的研究趋势进行了展望. Anomaly detection is increasingly becoming a focus in the field of Online Social Networks(OSNs)security.Attackers have utilized OSNs as new platforms to conduct malicious behaviors,which have seriously threatened the privacy of users and the reputation of OSNs,including sending spam,phishing and other illicit activities such as selling followers and Page Like.Many detection techniques have been specifically developed in past years for spotting anomalies in OSNs.This paper reviews important achievements in anomaly detection in recent years.First,different behaviors of anomalies are elaborated with the grand challenges to the detection.Second,we discuss the detection techniques with respect to feature-based,contentbased,graph-based and unsupervised approaches.Third,major methods of collecting datasets,labeling anomalies and validating results are introduced.Finally,we conclude the paper with an exploration of future research directions on anomaly detection in OSNs.
出处 《计算机学报》 EI CSCD 北大核心 2015年第10期2011-2027,共17页 Chinese Journal of Computers
基金 国家自然科学基金(61272481 61402434 61572460) 信息安全国家重点实验室开放课题基金(2014-12)资助~~
关键词 在线社交网络 异常帐号 异常检测 社交网络安全 检测方案 垃圾信息 社会计算 online social networks anomaly anomaly detection online social networks security detection techniques spam social computing
  • 相关文献

参考文献92

  • 1Ellison N B. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 2007, 13(1): 210-230.
  • 2Gao H, Hu J, Huang T, et al. Security issues in online social networks. IEEE Internet Computing, 2011, 15(4): 56-63.
  • 3Fire M, Goldschmidt R, Elovici Y. Online social networks: Threats and solutions survey. IEEE Communications Surveys and Tutorials, 2013, 16(4): 2019-2036.
  • 4Caviglione L, Coccoli M, Merlo A. A taxonomy-based model of security and privacy in online social networks. International Journal of Computational Science and Engineering, 20149 9(4): 325-338.
  • 5Thomas K, McCoy D, Grier C, et al. Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse//Proceedings of the 22nd USENIX Security Symposium. Washington, USA, 2013:195-210.
  • 6Huang T K, Rahman M S, Madhyastha H V, et al. An analysis of socware cascades in online social, networks// Proceedings of the 22nd International Conference on World Wide Web. Rio de Janeiro, Brazil, 2013:619-630.
  • 7Chu Z, Gianvccchio S, Wang H, et al. Who is tweeting on Twitter: Human, bot, or cyborg?//Procccdings of thc 26th Annual Computer Security Applications Conference. Austin, USA, 2010:21-30.
  • 8Kanich C, Kreibich C, Levchenko K, et al. Spamalytics: An empirical analysis of spam marketing conversion//Proceedings of the 15th ACM Conference on Computer and Communications Security. Alexandria, USA, 2008:3-14.
  • 9Stringhini G, Wang G, Egele M, et al. Follow the green: Growth and dynamics in Twitter follower markets//Proceedings of the 2013 Conference on Interne, Measurement Conference. Barcelona, Spain, 2013:163-176.
  • 10Xue J, Yang Z, Yang X, et al. VoteTrust: Leveraging friend invitation graph to defend against social network sybils //Proceedings of the 32nd IEEE International Conference on Computer Communications. Turin, Italy, 2013:2400-2408.

二级参考文献135

  • 1ZHOU Tao,FU Zhongqian,WANG Binghong.Epidemic dynamics on complex networks[J].Progress in Natural Science:Materials International,2006,16(5):452-457. 被引量:36
  • 2汪小帆,李翔,陈关荣.2012网络科学导论(北京:高等教育出版社),第161页.
  • 3Crandall D, Cosley D, Huttenlocher D, et al. Feedback effects between similarity and social influence in online communities/ /Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, USA, 2008: 160-168.
  • 4Moreno J L, Jennings H H. Who Shall Survive?: A New Approach to the Problem of Human Interrelations. Washington: Nervous and Mental Disease Publishing Coorperation , 1934.
  • 5Scott J P. Social Network Analysis: A Handbook. 2nd Edition. London: SAGE Publications, 2000.
  • 6Freeman L C. The Development of Social Network Analysis: A Study in the Sociology of Science. Vancouver: Empirical Press, 2004.
  • 7Leskovec J, Horvitz E. Planetary-scale views on a large instant-messaging network/ /Proceedings of the 17th International Conference on World Wide Web. New York, USA, 2008: 915-924.
  • 8Adamic L. Adar E. Friends and neighbors on the Web.Social Networks, 2003, 25(3): 211-230.
  • 9Park H W, Thelwall M. Hyperlink analyses of the World Wide Web: A review. Journal of Computer-Mediated Communication, 2003, 8(4).
  • 10Easley D, Kleinberg J. Networks, Crowds. and Markets: Reasoning about a Highly Connected World. New York: Cambridge University Press. 2010.

共引文献132

同被引文献164

引证文献26

二级引证文献226

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部