[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1866307.1866418acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Spectrum based fraud detection in social networks

Published: 04 October 2010 Publication History

Abstract

Social networks are vulnerable to various attacks such as spam emails, viral marketing and the such. In this paper we develop a spectrum based detection framework to discover the perpetrators of these attacks. In particular, we focus on Random Link Attacks (RLAs) in which the malicious user creates multiple false identities and interactions among those identities to later proceed to attack the regular members of the network. We show that RLA attackers can be filtered by using their spectral coordinate characteristics, which are hard to hide even after the efforts by the attackers of resembling as much as possible the rest of the network. Experimental results show that our technique is very effective in detecting those attackers and outperforms techniques previously published.

References

[1]
}}L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW '07, pages 181--190, 2007.
[2]
}}D. H. Chau, S. Pandit, and C. Faloutsos. Detecting fraudulent personalities in networks of online auctioneers. In PKDD, pages 103--114, 2006.
[3]
}}J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In Proceedings of the third international symposium on Information processing in sensor networks, pages 259--268, 2004.
[4]
}}N. Shrivastava, A. Majumder, and R. Rastogi. Mining (social) network graphs to detect random link attacks. In ICDE, pages 486--495, 2008.
[5]
}}X. Ying, X. Wu, and D. Barbara. Spectrum Based Fraud Detection in Social Networks. Technical Report, College of Computing and Informatics, UNC Charlotte, 2010.

Cited By

View all
  • (2024)Graph-Based Spectral Analysis for Detecting Cyber AttacksProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664498(1-14)Online publication date: 30-Jul-2024
  • (2012)Isolating and analyzing fraud activities in a large cellular network via voice call graph analysisProceedings of the 10th international conference on Mobile systems, applications, and services10.1145/2307636.2307660(253-266)Online publication date: 25-Jun-2012

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
October 2010
782 pages
ISBN:9781450302456
DOI:10.1145/1866307

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fraud detection
  2. social networks
  3. spectrum

Qualifiers

  • Poster

Conference

CCS '10
Sponsor:

Acceptance Rates

CCS '10 Paper Acceptance Rate 55 of 325 submissions, 17%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Graph-Based Spectral Analysis for Detecting Cyber AttacksProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664498(1-14)Online publication date: 30-Jul-2024
  • (2012)Isolating and analyzing fraud activities in a large cellular network via voice call graph analysisProceedings of the 10th international conference on Mobile systems, applications, and services10.1145/2307636.2307660(253-266)Online publication date: 25-Jun-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media