Skip to main content

Warning of Affected Users About an Identity Leak

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 942))

Abstract

Identity theft is a typical consequence of successful cyber-attacks, which usually comprise the stealing of employee and customer data. Criminals heist identity data in order to either (mis)use the data themselves or sell collections of such data to fraudsters. The warning of the victims of identity theft is crucial to avoid or limit damage caused by identity misuse. A number of services that allow identity owners to check the status of used identities already exist. However in order to provide proactive timely warnings to victims the leaked identity data has to be on hand. In this paper we present a system for a proactive warning of victims of identity leaks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bras, T.L.: [infographic] online overload - it’s worse than you thought, July 2015. https://blog.dashlane.com/infographic-online-overload-its-worse-than-you-thought/. Accessed 27 Sept 2018

  2. Casal, J.: 1.4 billion clear text credentials discovered in a single database. A Medium Corporation - 4iQ, December 2017. https://medium.com/4iqdelvedeep/1-4-billion-clear-text-credentials-discovered-in-a-single-database-3131d0a1ae14. Accessed 27 Sept 2018

  3. Chia, J.M.: Hacked-Emails (2017). https://hacked-emails.com/. Accessed 27 Sept 2018

  4. Corp, S.: LifeLock (2018). https://www.lifelock.com/education/4-lasting-effects-of-identity-theft/. Accessed 27 Sept 2018

  5. DeBlasio, J., Savage, S., Voelker, G.M., Snoeren, A.C.: Tripwire: inferring internet site compromise. In: Proceedings of the 2017 Internet Measurement Conference, IMC 2017, pp. 341–354. ACM, New York (2017)

    Google Scholar 

  6. Graupner, H., Jaeger, D., Cheng, F., Meinel, C.: Automated parsing and interpretation of identity leaks. In: Proceedings of the ACM International Conference on Computing Frontiers, CF 2016, pp. 127–134. ACM, New York (2016)

    Google Scholar 

  7. Han, W., Li, Z., Ni, M., Gu, G., Xu, W.: Shadow attacks based on password reuses: a quantitative empirical view. IEEE Trans. Dependable Secur. Comput. 15(2), 309–320 (2016)

    Article  Google Scholar 

  8. Hasso-Plattner-Institut für Digital Engineering gGmbH: HPI Leak Checker (2017). https://sec.hpi.de/leak-checker. Accessed 27 Sept 2018

  9. Heen, O., Neumann, C.: On the privacy impacts of publicly leaked password databases. In: Polychronakis, M., Meier, M. (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 347–365. Springer International Publishing, Cham (2017)

    Chapter  Google Scholar 

  10. Hunt, T.: have i been pwned? (2017). https://haveibeenpwned.com. Accessed 27 Sept 2018

  11. Hunt, T.: Inside the massive 711 million record onliner spambot dump (2017). https://www.troyhunt.com/inside-the-massive-711-million-record-onliner-spambot-dump/. Accessed 27 Sept 2018

  12. IdentityForce, I.: IdentityForce (2018). https://www.lifelock.com/education/4-lasting-effects-of-identity-theft/. Accessed 27 Sept 2018

  13. Jaeger, D., Pelchen, C., Graupner, H., Cheng, F., Meinel, C.: Analysis of publicly leaked credentials and the long story of password (re-)use. In: Proceedings of the 11th International Conference on Passwords (PASSWORDS2016). Springer, Bochum (2016)

    Google Scholar 

  14. Johansen, A.G.: 4 lasting effects of identity theft (2018). https://lifelock.com/education/4-lasting-effects-of-identity-theft/. Accessed 27 Sept 2018

  15. Lord, N.: Uncovering password habits: are users’ password security habits improving? (infographic), September 2017. https://digitalguardian.com/blog/uncovering-password-habits-are-users-password-security-habits-improving-infographic. Accessed 27 Sept 2018

  16. Experian Ltd.: Experian (2018). https://www.experian.co.uk. Accessed 27 Sept 2018

  17. Malderle, T., Wübbeling, M., Knauer, S., Sykosch, A., Meier, M.: Gathering and analyzing identity leaks for a proactive warning of affected users. In: Proceedings of the 15th ACM International Conference on Computing Frontiers, CF 2018, pp. 208–211. ACM, New York (2018)

    Google Scholar 

  18. Malm, S.: Two suicides are linked to Ashley Madison leak: Texas police chief takes his own life just days after his email is leaked in cheating website hack (2015). https://www.lifelock.com/education/4-lasting-effects-of-identity-theft/. Accessed 27 Sept 2018

  19. Onaolapo, J., Mariconti, E., Stringhini, G.: What happens after you are pwnd: understanding the use of leaked webmail credentials in the wild. In: Proceedings of the 2016 Internet Measurement Conference, IMC 2016, pp. 65–79 (2016)

    Google Scholar 

  20. Subrayan, S., Mugilan, S., Sivanesan, B., Kalaivani, S.: Multi-factor authentication scheme for shadow attacks in social network. In: 2017 International Conference on Technical Advancements in Computers and Communications (ICTACC), pp. 36–40 (2017)

    Google Scholar 

  21. Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu, O., Eranti, V., Moscicki, A., Margolis, D., Paxson, V., Bursztein, E.: Data breaches, phishing, or malware?: Understanding the risks of stolen credentials. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 1421–1434. ACM, New York (2017)

    Google Scholar 

  22. vigilante: vigilante.pw (2017). https://vigilante.pw/. Accessed 27 Sept 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Timo Malderle .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Malderle, T., Wübbeling, M., Knauer, S., Meier, M. (2020). Warning of Affected Users About an Identity Leak. In: Madureira, A., Abraham, A., Gandhi, N., Silva, C., Antunes, M. (eds) Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018). SoCPaR 2018. Advances in Intelligent Systems and Computing, vol 942. Springer, Cham. https://doi.org/10.1007/978-3-030-17065-3_28

Download citation

Publish with us

Policies and ethics