期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example
1
作者 Min GAO Shutong CHEN +6 位作者 Yangbo GAO Zhenhua ZHANG Yu CHEN Yupeng LI Qiongzan YE Xin WANG Yang CHEN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第8期1077-1095,共19页
Phone number recycling(PNR)refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner.It has posed a threat to the reliability of the existing authentication solution ... Phone number recycling(PNR)refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner.It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms.Specifically,a new owner of a reassigned number can access the application account with which the number is associated,and may perform fraudulent activities.Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users.Thus,alternative solutions that depend on only the information of the applications are imperative.In this work,we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers.Our analysis on Meituan's real-world dataset shows that compromised accounts have unique statistical features and temporal patterns.Based on the observations,we propose a novel model called temporal pattern and statistical feature fusion model(TSF)to tackle the problem,which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features.Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines,demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers. 展开更多
关键词 Phone number recycling Neural networks E-COMMERCE Compromised account detection
原文传递
Detecting compromised email accounts via login behavior characterization
2
作者 Jianjun Zhao Can Yang +4 位作者 Di Wu Yaqin Cao Yuling Liu Xiang Cui Qixu Liu 《Cybersecurity》 EI CSCD 2024年第1期16-36,共21页
The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and society.Detecting compromised email accounts is more challenging than in the social network field,where ema... The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and society.Detecting compromised email accounts is more challenging than in the social network field,where email accounts have only a few interaction events(sending and receiving).To address the issue of insufficient features,we propose a novel approach to detecting compromised accounts by combining time zone differences and alternate logins to identify abnormal behavior.Based on this approach,we propose a compromised email account detection framework that relies on widely available and less sensitive login logs and does not require labels.Our framework characterizes login behaviors to identify logins that do not belong to the account owner and outputs a list of account-subnet pairs ranked by their likelihood of having abnormal login relationships.This approach reduces the number of account-subnet pairs that need to be investigated and provides a reference for investigation priority.Our evaluation demonstrates that our method can detect most email accounts that have been accessed by disclosed malicious IP addresses and outperforms similar research.Additionally,our framework has the capability to uncover undisclosed malicious IP addresses. 展开更多
关键词 Compromised account detection Mixture model Login log analysis Attribution and forensic
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部