Abstract
Lately the proliferation of social networks has given rise to a myriad of fraudulent strategies aimed at getting some sort of benefit from the attacked individual. Despite most of them being exclusively driven by economic interests, the so called impersonation, masquerading attack or identity fraud hinges on stealing the credentials of the victim and assuming his/her identity to get access to resources (e.g. relationships or confidential information), credit and other benefits in that person’s name. While this problem is getting particularly frequent within the teenage community, the reality is that very scarce technological approaches have been proposed in the literature to address this issue which, if not detected in time, may catastrophically unchain other fatal consequences to the impersonated person such as bullying and intimidation. In this context, this paper delves into a machine learning approach that permits to efficiently detect this kind of attacks by solely relying on connection time information of the potential victim. The manuscript will demonstrate how these learning algorithms - in particular, support vector classifiers - can be of great help to understand and detect impersonation attacks without compromising the user privacy of social networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Pew Internet research on social networking, http://www.pewinternet.org/Commentary/2012/March/Pew-Internet-Social-Networking-full-detail.aspx (retrieved on April 2014)
Dasgupta, K., Singh, R., Viswanathan, B., Chakraborty, D., Mukherjea, S., Nanavati, A.A., Joshi, A.: Social Ties and Their Relevance to Churn in Mobile Telecom Networks. In: Proceedings of the 11th International Conference on Extending Database Technology, pp. 668–677 (2008)
Eysenbach, G.: Medicine 2.0: Social Networking, Collaboration, Participation, Apomediation, and Openness. Journal of Medical Internet Research 10(3) (2008)
Zeng, L., Hall, H., Pitts, M.J.: Cultivating a Community of Learners. The Potential Challenges of Social Media in Higher Education. In: Noor Al-Deen, H., Hendricks, J.A. (eds.) Social Media: Usage and Impact. Lexington Books (2011)
Twitter: Keeping our users secure, https://blog.twitter.com/2013/keeping-our-users-secure (retrieved on April 2014)
Martin, A., Anutthamaa, N.B., Sathyavathy, M., Saint Francois, M.M., Venkatesan, P.: A Framework for Predicting Phishing Websites Using Neural Networks. IJCSI International Journal of Computer Science Issues 8(2), 330–336 (2011)
Salem, M.B., Stolfo, S.J.: Modeling User Search Behavior for Masquerade Detection. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 181–200. Springer, Heidelberg (2011)
Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: COMPA: Detecting Compromised Accounts on Social Networks. In: ISOC Network and Distributed System Security Symposium, NDSS (2013)
Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.: Towards Online Spam Filtering in Social Networks. In: ISOC Network and Distributed System Security Symposium, NDSS (2012)
Cortes, C., Vapnik, V.: Support-Vector Networks. Machine Learning 20(3), 273–297 (1995)
Miyamoto, D., Hazeyama, H., Kadobayashi, Y.: A Proposal of the AdaBoost-based Detection of Phishing Sites. In: Proceedings of the Joint Workshop on Information Security (2007)
Zhang, Y., Hong, J., Cranor, L.: Cantina: A Content-based Approach to Detecting Phishing Web Sites. In: Proceedings of the International World Wide Web Conference, WWW (2007)
Liu, W., Huang, G., Liu, X., Zhang, M., Deng, X.: Detection of Phishing Web Pages based on Visual Similarity. In: Proceedings of the International World Wide Web Conference (WWW), pp. 1060–1061 (2005)
Borg, I., Groenen, P.: Modern Multidimensional Scaling: Theory and Applications, 2nd edn., pp. 207–212. Springer (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Villar-Rodriguez, E., Del Ser, J., Salcedo-Sanz, S. (2015). On a Machine Learning Approach for the Detection of Impersonation Attacks in Social Networks. In: Camacho, D., Braubach, L., Venticinque, S., Badica, C. (eds) Intelligent Distributed Computing VIII. Studies in Computational Intelligence, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-319-10422-5_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-10422-5_28
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10421-8
Online ISBN: 978-3-319-10422-5
eBook Packages: EngineeringEngineering (R0)