2013 IEEE 32nd International Symposium on Reliable Distributed Systems 2013
DOI: 10.1109/srds.2013.28
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Malware Propagation in Twitter

Abstract: Abstract-Malware propagation in social networks is a potential risk that has not been well-studied yet as there are no formal threat models for social networks. In this paper we investigate the vulnerability and cost of spreading malware via Twitter. Towards this end we present three specific attack scenarios targeted for Twitter and systematically analyze the cost of staging each of these attacks. Our analysis presents the first step for understanding the threats on the security of a class of social networks.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…The scenarios of misusing Twitter include impersonation [15], the creation of fake accounts (socalled "sybils") [16], phishing [17], malware distribution [18] or spamming campaigns [19]. Thomas et al [8] lay out that URLs that are posted on Twitter have a significantly higher likelihood of being followed than URIs in email spam, especially if the user account posting the link is trustworthy (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…The scenarios of misusing Twitter include impersonation [15], the creation of fake accounts (socalled "sybils") [16], phishing [17], malware distribution [18] or spamming campaigns [19]. Thomas et al [8] lay out that URLs that are posted on Twitter have a significantly higher likelihood of being followed than URIs in email spam, especially if the user account posting the link is trustworthy (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…A similar campaign has been analyzed by [44], in which spam accounts flood out political messages following the announcement of Russia's parliamentary election results. In addition, classical forms of abuse such as spam and criminal monetization exist in Twitter including phishing scams [15], spreading malware [36], and redirecting victims to reputable websites via affiliate links [45] to generate income.…”
Section: Spam In Social Networkmentioning
confidence: 99%
“…A similar campaign has been analyzed [26], in which spam accounts flood out political messages following the announcement of Russia's parliamentary election results. In addition, classical forms of abuse such as spam and criminal monetization exist in Twitter including phishing scams [6], spreading malware [22], and redirecting victims to reputable websites via affiliate links [27] to generate income.…”
Section: Spam In Social Networkmentioning
confidence: 99%