ผู้เขียน
Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis, Evangelos P Markatos
วันที่เผยแพร่
2011/3/21
การประชุม
2011 IEEE international conference on pervasive computing and communications workshops (PERCOM Workshops)
หน้า
295-300
ผู้เผยแพร่
IEEE
คำอธิบาย
Social networking is one of the most popular Internet activities, with millions of users from around the world. The time spent on sites like Facebook or LinkedIn is constantly increasing at an impressive rate. At the same time, users populate their online profile with a plethora of information that aims at providing a complete and accurate representation of themselves. Attackers may duplicate a user's online presence in the same or across different social networks and, therefore, fool other users into forming trusting social relations with the fake profile. By abusing that implicit trust transferred from the concept of relations in the physical world, they can launch phishing attacks, harvest sensitive user information, or cause unfavorable repercussions to the legitimate profile's owner. In this paper we propose a methodology for detecting social network profile cloning. We present the architectural design and implementation …
การอ้างอิงทั้งหมด
20112012201320142015201620172018201920202021202220232024261315132018251813109122
บทความทางวิชาการ
G Kontaxis, I Polakis, S Ioannidis, EP Markatos - 2011 IEEE international conference on pervasive …, 2011