2022
DOI: 10.1007/s13278-022-00944-2
|View full text |Cite
|
Sign up to set email alerts
|

Disrupting drive-by download networks on Twitter

Abstract: This paper tests disruption strategies in Twitter networks containing malicious URLs used in drive-by download attacks. Cybercriminals use popular events that attract a large number of Twitter users to infect and propagate malware by using trending hashtags and creating misleading tweets to lure users to malicious webpages. Due to Twitter’s 280 character restriction and automatic shortening of URLs, it is particularly susceptible to the propagation of malware involved in drive-by download attacks. Considering … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0
1

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 48 publications
0
0
0
1
Order By: Relevance
“…f. Las estrategias de disrupción obligan a las redes de ciberdelincuentes a volverse más vulnerables mediante la eliminación estratégica de usuarios maliciosos, lo que provoca éxito, en Javed et al (2022).…”
Section: Resultsunclassified
“…f. Las estrategias de disrupción obligan a las redes de ciberdelincuentes a volverse más vulnerables mediante la eliminación estratégica de usuarios maliciosos, lo que provoca éxito, en Javed et al (2022).…”
Section: Resultsunclassified