{"title":"朋友还是假朋友?设计你的社交网络来检测欺诈性的个人资料","authors":"Husna Siddiqui, Callum Brill, Zachary Davis, Aspen Olmsted","doi":"10.1109/I-SOCIETY.2016.7854206","DOIUrl":null,"url":null,"abstract":"Social media has a tremendous impact on current culture and trends. It has revolutionized the way in which people communicate with one another. Malicious entities exploit the vulnerabilities brought upon by the availability of personal data content on these networks. Openly sharing personal information online can make a user vulnerable to threats such as identity theft, phishing attacks, and profile cloning. In this paper, we will report on our investigation of malicious threats on social networks. We will propose a simple yet effective methodology for detecting fraudulent profiles on Facebook, a social networking service.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Friend or faux? engineering your social network to detect fraudulent profiles\",\"authors\":\"Husna Siddiqui, Callum Brill, Zachary Davis, Aspen Olmsted\",\"doi\":\"10.1109/I-SOCIETY.2016.7854206\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Social media has a tremendous impact on current culture and trends. It has revolutionized the way in which people communicate with one another. Malicious entities exploit the vulnerabilities brought upon by the availability of personal data content on these networks. Openly sharing personal information online can make a user vulnerable to threats such as identity theft, phishing attacks, and profile cloning. In this paper, we will report on our investigation of malicious threats on social networks. We will propose a simple yet effective methodology for detecting fraudulent profiles on Facebook, a social networking service.\",\"PeriodicalId\":317605,\"journal\":{\"name\":\"2016 International Conference on Information Society (i-Society)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Information Society (i-Society)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I-SOCIETY.2016.7854206\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Information Society (i-Society)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SOCIETY.2016.7854206","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Friend or faux? engineering your social network to detect fraudulent profiles
Social media has a tremendous impact on current culture and trends. It has revolutionized the way in which people communicate with one another. Malicious entities exploit the vulnerabilities brought upon by the availability of personal data content on these networks. Openly sharing personal information online can make a user vulnerable to threats such as identity theft, phishing attacks, and profile cloning. In this paper, we will report on our investigation of malicious threats on social networks. We will propose a simple yet effective methodology for detecting fraudulent profiles on Facebook, a social networking service.