{"title":"基于社会网络分析的身份盗窃检测方法","authors":"G. Kolaczek","doi":"10.1109/ACIIDS.2009.44","DOIUrl":null,"url":null,"abstract":"The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenge in security research. The main idea about method of identity theft detection described in the paper is that identity theft events are related to change of the subject’s behavior as the node of the social network (or several different networks). In consequence identity theft may be detected similarly as the other types of malicious activities by analyzing the change of observed behavior patterns.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An Approach to Identity Theft Detection Using Social Network Analysis\",\"authors\":\"G. Kolaczek\",\"doi\":\"10.1109/ACIIDS.2009.44\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenge in security research. The main idea about method of identity theft detection described in the paper is that identity theft events are related to change of the subject’s behavior as the node of the social network (or several different networks). In consequence identity theft may be detected similarly as the other types of malicious activities by analyzing the change of observed behavior patterns.\",\"PeriodicalId\":275776,\"journal\":{\"name\":\"2009 First Asian Conference on Intelligent Information and Database Systems\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 First Asian Conference on Intelligent Information and Database Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACIIDS.2009.44\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 First Asian Conference on Intelligent Information and Database Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACIIDS.2009.44","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Approach to Identity Theft Detection Using Social Network Analysis
The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenge in security research. The main idea about method of identity theft detection described in the paper is that identity theft events are related to change of the subject’s behavior as the node of the social network (or several different networks). In consequence identity theft may be detected similarly as the other types of malicious activities by analyzing the change of observed behavior patterns.