Abstract
Identity theft is a typical consequence of successful cyber-attacks, which usually comprise the stealing of employee and customer data. Criminals heist identity data in order to either (mis)use the data themselves or sell collections of such data to fraudsters. The warning of the victims of identity theft is crucial to avoid or limit damage caused by identity misuse. A number of services that allow identity owners to check the status of used identities already exist. However in order to provide proactive timely warnings to victims the leaked identity data has to be on hand. In this paper we present a system for a proactive warning of victims of identity leaks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bras, T.L.: [infographic] online overload - it’s worse than you thought, July 2015. https://blog.dashlane.com/infographic-online-overload-its-worse-than-you-thought/. Accessed 27 Sept 2018
Casal, J.: 1.4 billion clear text credentials discovered in a single database. A Medium Corporation - 4iQ, December 2017. https://medium.com/4iqdelvedeep/1-4-billion-clear-text-credentials-discovered-in-a-single-database-3131d0a1ae14. Accessed 27 Sept 2018
Chia, J.M.: Hacked-Emails (2017). https://hacked-emails.com/. Accessed 27 Sept 2018
Corp, S.: LifeLock (2018). https://www.lifelock.com/education/4-lasting-effects-of-identity-theft/. Accessed 27 Sept 2018
DeBlasio, J., Savage, S., Voelker, G.M., Snoeren, A.C.: Tripwire: inferring internet site compromise. In: Proceedings of the 2017 Internet Measurement Conference, IMC 2017, pp. 341–354. ACM, New York (2017)
Graupner, H., Jaeger, D., Cheng, F., Meinel, C.: Automated parsing and interpretation of identity leaks. In: Proceedings of the ACM International Conference on Computing Frontiers, CF 2016, pp. 127–134. ACM, New York (2016)
Han, W., Li, Z., Ni, M., Gu, G., Xu, W.: Shadow attacks based on password reuses: a quantitative empirical view. IEEE Trans. Dependable Secur. Comput. 15(2), 309–320 (2016)
Hasso-Plattner-Institut für Digital Engineering gGmbH: HPI Leak Checker (2017). https://sec.hpi.de/leak-checker. Accessed 27 Sept 2018
Heen, O., Neumann, C.: On the privacy impacts of publicly leaked password databases. In: Polychronakis, M., Meier, M. (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 347–365. Springer International Publishing, Cham (2017)
Hunt, T.: have i been pwned? (2017). https://haveibeenpwned.com. Accessed 27 Sept 2018
Hunt, T.: Inside the massive 711 million record onliner spambot dump (2017). https://www.troyhunt.com/inside-the-massive-711-million-record-onliner-spambot-dump/. Accessed 27 Sept 2018
IdentityForce, I.: IdentityForce (2018). https://www.lifelock.com/education/4-lasting-effects-of-identity-theft/. Accessed 27 Sept 2018
Jaeger, D., Pelchen, C., Graupner, H., Cheng, F., Meinel, C.: Analysis of publicly leaked credentials and the long story of password (re-)use. In: Proceedings of the 11th International Conference on Passwords (PASSWORDS2016). Springer, Bochum (2016)
Johansen, A.G.: 4 lasting effects of identity theft (2018). https://lifelock.com/education/4-lasting-effects-of-identity-theft/. Accessed 27 Sept 2018
Lord, N.: Uncovering password habits: are users’ password security habits improving? (infographic), September 2017. https://digitalguardian.com/blog/uncovering-password-habits-are-users-password-security-habits-improving-infographic. Accessed 27 Sept 2018
Experian Ltd.: Experian (2018). https://www.experian.co.uk. Accessed 27 Sept 2018
Malderle, T., Wübbeling, M., Knauer, S., Sykosch, A., Meier, M.: Gathering and analyzing identity leaks for a proactive warning of affected users. In: Proceedings of the 15th ACM International Conference on Computing Frontiers, CF 2018, pp. 208–211. ACM, New York (2018)
Malm, S.: Two suicides are linked to Ashley Madison leak: Texas police chief takes his own life just days after his email is leaked in cheating website hack (2015). https://www.lifelock.com/education/4-lasting-effects-of-identity-theft/. Accessed 27 Sept 2018
Onaolapo, J., Mariconti, E., Stringhini, G.: What happens after you are pwnd: understanding the use of leaked webmail credentials in the wild. In: Proceedings of the 2016 Internet Measurement Conference, IMC 2016, pp. 65–79 (2016)
Subrayan, S., Mugilan, S., Sivanesan, B., Kalaivani, S.: Multi-factor authentication scheme for shadow attacks in social network. In: 2017 International Conference on Technical Advancements in Computers and Communications (ICTACC), pp. 36–40 (2017)
Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu, O., Eranti, V., Moscicki, A., Margolis, D., Paxson, V., Bursztein, E.: Data breaches, phishing, or malware?: Understanding the risks of stolen credentials. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 1421–1434. ACM, New York (2017)
vigilante: vigilante.pw (2017). https://vigilante.pw/. Accessed 27 Sept 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Malderle, T., Wübbeling, M., Knauer, S., Meier, M. (2020). Warning of Affected Users About an Identity Leak. In: Madureira, A., Abraham, A., Gandhi, N., Silva, C., Antunes, M. (eds) Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018). SoCPaR 2018. Advances in Intelligent Systems and Computing, vol 942. Springer, Cham. https://doi.org/10.1007/978-3-030-17065-3_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-17065-3_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17064-6
Online ISBN: 978-3-030-17065-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)