skip to main content
10.1145/2567948.2577308acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
poster

Detecting in-situ identity fraud on social network services: a case study on facebook

Authors Info & Claims
Published:07 April 2014Publication History

ABSTRACT

In this paper, we propose to use a continuous authentication approach to detect the in-situ identity fraud incidents, which occur when the attackers use the same devices and IP addresses as the victims. Using Facebook as a case study, we show that it is possible to detect such incidents by analyzing SNS users' browsing behavior. Our experiment results demonstrate that the approach can achieve reasonable accuracy given a few minutes of observation time.

References

  1. Josh Constine. Facebook has users identify friends in photos to verify accounts, prevent unauthorized access. http://www.insidefacebook.com/2010/07/26/facebook-photos-verify/, 2010.Google ScholarGoogle Scholar
  2. Josh Constine. Facebook asks every user for a verified phone number to prevent security disaster. http://techcrunch.com/2012/06/14/facebook-security-tips/, 2012.Google ScholarGoogle Scholar
  3. Facebook. Removal of offline_access permission. https://developers.facebook.com/roadmap/offline-access-removal/.Google ScholarGoogle Scholar
  4. Keith Hampton. Social networking sites and our lives part 2: Who are social networking site users' http://pewinternet.org/Reports/2011/Technology-and-social-networks/Part-2/Facebook-activities.aspx, 2011.Google ScholarGoogle Scholar
  5. Ed Hansberry. Most consumers don't lock mobile phone via PIN. http://www.informationweek.com/mobility/security/most-consumers-dont-lock-mobile-phone-vi/231700155, 2011.Google ScholarGoogle Scholar
  6. Adam N Joinson. Looking at, looking up or keeping up with people?: motives and use of Facebook. In Proc. of ACM CHI 2008, pages 1027--1036, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Paul Mah. Stored passwords add to mobile security risks. http://www.itbusinessedge.com/cm/blogs/mah/stored-passwords-add-to-mobile-security-risks/?cs=47183, 2011.Google ScholarGoogle Scholar
  8. Maja Pusara and Carla E Brodley. User re-authentication via mouse movements. In Proc. of the ACM Workshop on Visualization and data mining for computer security, pages 1--8, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. SJ Shepherd. Continuous authentication by analysis of keyboard typing characteristics. In European Convention on Security and Detection, pages 111--114, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  10. Credant Technologies. Phone data makes 4.2 million* brits vulnerable to ID theft. http://www.credant.com/news-a-events/press-releases/69-phone-data-makes-42-million-brits-vulnerable-to-id-theft.html.Google ScholarGoogle Scholar
  11. Roger Yu. Lost cellphones added up fast in 2011. http://usatoday30.usatoday.com/tech/news/story/2012-03--22/lost-phones/53707448/1, 2012.Google ScholarGoogle Scholar

Index Terms

  1. Detecting in-situ identity fraud on social network services: a case study on facebook

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      WWW '14 Companion: Proceedings of the 23rd International Conference on World Wide Web
      April 2014
      1396 pages
      ISBN:9781450327459
      DOI:10.1145/2567948

      Copyright © 2014 Copyright is held by the owner/author(s)

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 April 2014

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate1,899of8,196submissions,23%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader