2017
DOI: 10.1109/jsyst.2015.2504102
|View full text |Cite
|
Sign up to set email alerts
|

Detecting In Situ Identity Fraud on Social Network Services: A Case Study With Facebook

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 28 publications
0
7
0
Order By: Relevance
“…Consequently, an unintended byproduct of sharing such personal content has thrived. As a result of sharing photos, hometowns, e-mail addresses, phone numbers, education and employment statuses on SNS profiles, SNSs are highly targeted by hackers (Wu, Chou, Tseng, Lee, & Chen, 2014), which makes it relatively easy to commit identity theft (Javaro & Jasinski, 2014). This type of theft can cause financial damage and huge personal trauma, for instance, by utilizing personal information to obtain access to credit cards and utility services, make false claims for medical services under stolen social security numbers (Acquisti & Gross, 2009) and evade law enforcement by masquerading under others' credentials (Javaro & Jasinski, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, an unintended byproduct of sharing such personal content has thrived. As a result of sharing photos, hometowns, e-mail addresses, phone numbers, education and employment statuses on SNS profiles, SNSs are highly targeted by hackers (Wu, Chou, Tseng, Lee, & Chen, 2014), which makes it relatively easy to commit identity theft (Javaro & Jasinski, 2014). This type of theft can cause financial damage and huge personal trauma, for instance, by utilizing personal information to obtain access to credit cards and utility services, make false claims for medical services under stolen social security numbers (Acquisti & Gross, 2009) and evade law enforcement by masquerading under others' credentials (Javaro & Jasinski, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…The way in which OSN users interact with known users, close friends, and relatives is different from how they interact with unfamiliar users in the network. People of different roles may have different intention, the age group, the sex, whether the user is a parent or a student; all these factors can be termed as role‐driven behavior . This role‐driven behavior can be used to identify compromised OSN accounts.…”
Section: Survey Of Detection Approachesmentioning
confidence: 99%
“…Although their detection algorithm appears feasible, they are limited in evaluation due to the fact that they cannot collect information about actual attacks nor can they simulate an attack on Facebook themselves. In the work of [210] they sought to circumvent these issues by having actual Facebook users participate in an experiment, browsing their own Facebook pages as well as browsing a stranger's. Given that intruders are likely to show different click behavior than legitimate users, they propose a detection scheme based on Smooth Support Vector Machines (SSVM).…”
Section: Cybersecurity Eventsmentioning
confidence: 99%
“…Research on detecting cybersecurity events mirrors work on SM seen elsewhere. The most impressive results come when SM behaviors are used to detect irregular activity representative of an account hijacking as in [210]. Behavioral markers of the type they utilize appear to be quite powerful in prediction, but wide-scale analysis of such systems cannot be done by outside researchers.…”
Section: Cybersecurity Eventsmentioning
confidence: 99%