Malicious accounts: Dark of the social networks

KS Adewole, NB Anuar, A Kamsin, KD Varathan… - Journal of Network and …, 2017 - Elsevier
Over the last few years, online social networks (OSNs), such as Facebook, Twitter and
Tuenti, have experienced exponential growth in both profile registrations and social …

Fake profile detection techniques in large-scale online social networks: A comprehensive review

D Ramalingam, V Chinnaiah - Computers & Electrical Engineering, 2018 - Elsevier
In the present era, online social networks are the most popular and rapid information
propagation applications on the Internet. People of all ages spend most of their time on …

Social network security: Issues, challenges, threats, and solutions

S Rathore, PK Sharma, V Loia, YS Jeong, JH Park - Information sciences, 2017 - Elsevier
Social networks are very popular in today's world. Millions of people use various forms of
social networks as they allow individuals to connect with friends and family, and share …

Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …

Aiding the detection of fake accounts in large scale social online services

Q Cao, M Sirivianos, X Yang, T Pregueiro - 9th USENIX symposium on …, 2012 - usenix.org
Users increasingly rely on the trustworthiness of the information exposed on Online Social
Networks (OSNs). In addition, OSN providers base their business models on the …

The socialbot network: when bots socialize for fame and money

Y Boshmaf, I Muslukhov, K Beznosov… - Proceedings of the 27th …, 2011 - dl.acm.org
Online Social Networks (OSNs) have become an integral part of today's Web. Politicians,
celebrities, revolutionists, and others use OSNs as a podium to deliver their message to …

Towards detecting anomalous user behavior in online social networks

B Viswanath, MA Bashir, M Crovella, S Guha… - 23rd usenix security …, 2014 - usenix.org
Users increasingly rely on crowdsourced information, such as reviews on Yelp and Amazon,
and liked posts and ads on Facebook. This has led to a market for blackhat promotion …

Design and analysis of a social botnet

Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu - Computer Networks, 2013 - Elsevier
Online Social Networks (OSNs) have attracted millions of active users and have become an
integral part of today's web ecosystem. Unfortunately, in the wrong hands, OSNs can be …

Sybilbelief: A semi-supervised learning approach for structure-based sybil detection

NZ Gong, M Frank, P Mittal - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Sybil attacks are a fundamental threat to the security of distributed systems. Recently, there
has been a growing interest in leveraging social networks to mitigate Sybil attacks. However …

Sok: The evolution of sybil defense via social networks

L Alvisi, A Clement, A Epasto, S Lattanzi… - … ieee symposium on …, 2013 - ieeexplore.ieee.org
Sybil attacks in which an adversary forges a potentially unbounded number of identities are
a danger to distributed systems and online social networks. The goal of sybil defense is to …