On a Machine Learning Approach for the Detection of Impersonation Attacks in Social Networks

被引:3
|
作者
Villar-Rodriguez, Esther [1 ]
Del Ser, Javier [1 ]
Salcedo-Sanz, Sancho [2 ]
机构
[1] TECNALIA, OPTIMA Unit, E-48160 Derio, Spain
[2] Univ Alcala De Henares, Madrid 28871, Spain
来源
关键词
Impersonation; Social Networks; Support Vector Machines;
D O I
10.1007/978-3-319-10422-5_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Lately the proliferation of social networks has given rise to a myriad of fraudulent strategies aimed at getting some sort of benefit from the attacked individual. Despite most of them being exclusively driven by economic interests, the so-called impersonation, masquerading attack or identity fraud hinges on stealing the credentials of the victim and assuming his/her identity to get access to resources (e.g. relationships or confidential information), credit and other benefits in that person's name. While this problem is getting particularly frequent within the teenage community, the reality is that very scarce technological approaches have been proposed in the literature to address this issue which, if not detected in time, may catastrophically unchain other fatal consequences to the impersonated person such as bullying and intimidation. In this context, this paper delves into a machine learning approach that permits to efficiently detect this kind of attacks by solely relying on connection time information of the potential victim. The manuscript will demonstrate how these learning algorithms - in particular, support vector classifiers - can be of great help to understand and detect impersonation attacks without compromising the user privacy of social networks.
引用
收藏
页码:259 / 268
页数:10
相关论文
共 50 条
  • [1] A meta-heuristic learning approach for the non-intrusive detection of impersonation attacks in social networks
    Villar-Rodriguez, Esther
    Del Ser, Javier
    Gil-Lopez, Sergio
    Nekane Bilbao, Miren
    Salcedo-Sanz, Sancho
    [J]. INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2017, 10 (02) : 109 - 118
  • [2] Detection of Security Attacks in Industrial IoT Networks: A Blockchain and Machine Learning Approach
    Vargas, Henry
    Lozano-Garzon, Carlos
    Montoya, German A.
    Donoso, Yezid
    [J]. ELECTRONICS, 2021, 10 (21)
  • [3] CDAI: a novel collaborative detection approach for impersonation attacks in vehicular ad-hoc networks
    Pougajendy, Jayashree
    Parthiban, Arun Raj Kumar
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5547 - 5562
  • [4] Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization
    Agarwal, Mayank
    Pasumarthi, Dileep
    Biswas, Santosh
    Nandi, Sukumar
    [J]. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) : 1035 - 1051
  • [5] An entropy and machine learning based approach for DDoS attacks detection in software defined networks
    Hassan, Amany I.
    Abd El Reheem, Eman
    Guirguis, Shawkat K.
    [J]. SCIENTIFIC REPORTS, 2024, 14 (01):
  • [6] Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization
    Mayank Agarwal
    Dileep Pasumarthi
    Santosh Biswas
    Sukumar Nandi
    [J]. International Journal of Machine Learning and Cybernetics, 2016, 7 : 1035 - 1051
  • [7] Detection of SQL Injection Attacks: A Machine Learning Approach
    Hasan, Musaab
    Balbahaith, Zayed
    Tarique, Mohammed
    [J]. 2019 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2019,
  • [8] Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine Learning
    Balueva, Anastasia
    Desnitsky, Vasily
    Ushakov, Igor
    [J]. INTELLIGENT DISTRIBUTED COMPUTING XIII, 2020, 868 : 350 - 355
  • [9] Phishing Attacks Detection A Machine Learning-Based Approach
    Salahdine, Fatima
    El Mrabet, Zakaria
    Kaabouch, Naima
    [J]. 2021 IEEE 12TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2021, : 250 - 255
  • [10] Using radio device fingerprinting for the detection of impersonation and Sybil attacks in wireless networks
    Sieka, Bartlomiej
    [J]. SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2006, 4357 : 179 - 192