{"title":"Uncovering Social Spammers -Evaluation And Detection","authors":"Geethu Thrippathy","doi":"10.30534/IJNS/2019/24832019","DOIUrl":null,"url":null,"abstract":"For cyber criminals compromising social network accounts has turned into a beneficial strategy. Across the globe well known sites have millions of users and they suffer from a lot of security privacy and threats like profile cloning viral marketing rupture of security etc. By hijacking the control of a particular account, attackers or hackers can disperse their malicious information to an extensive client. It may affect the reputation of different organizations and leads to losses in financial markets. In this work, we show how we can utilize similar procedures to distinguish compromises of individual high profile accounts and they have one trademark that make this detection reliable. Behavioural analysis of each account has taken in order to get the normal behaviour of an account.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":"20 1","pages":""},"PeriodicalIF":1.0000,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Networks and Distributed Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30534/IJNS/2019/24832019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
For cyber criminals compromising social network accounts has turned into a beneficial strategy. Across the globe well known sites have millions of users and they suffer from a lot of security privacy and threats like profile cloning viral marketing rupture of security etc. By hijacking the control of a particular account, attackers or hackers can disperse their malicious information to an extensive client. It may affect the reputation of different organizations and leads to losses in financial markets. In this work, we show how we can utilize similar procedures to distinguish compromises of individual high profile accounts and they have one trademark that make this detection reliable. Behavioural analysis of each account has taken in order to get the normal behaviour of an account.
期刊介绍:
IJCNDS aims to improve the state-of-the-art of worldwide research in communication networks and distributed systems and to address the various methodologies, tools, techniques, algorithms and results. It is not limited to networking issues in telecommunications; network problems in other application domains such as biological networks, social networks, and chemical networks will also be considered. This feature helps in promoting interdisciplinary research in these areas.