2009 4th International Conference on Malicious and Unwanted Software (MALWARE) 2009
DOI: 10.1109/malware.2009.5403023
|View full text |Cite
|
Sign up to set email alerts
|

Malware propagation in Online Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(31 citation statements)
references
References 14 publications
0
30
0
1
Order By: Relevance
“…Therefore, it is important to identify the sources of Trojans in order to analyse and remove them as early as possible. There have been many works studying the propagation of Trojans [43]- [46]. In this paper, we adopt the propagation model in [46], which is a spatialtemporal SIR model that takes into account the network topology and temporal dynamics of user activities.…”
Section: Simulations For Single Source Estimationmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, it is important to identify the sources of Trojans in order to analyse and remove them as early as possible. There have been many works studying the propagation of Trojans [43]- [46]. In this paper, we adopt the propagation model in [46], which is a spatialtemporal SIR model that takes into account the network topology and temporal dynamics of user activities.…”
Section: Simulations For Single Source Estimationmentioning
confidence: 99%
“…There have been many works studying the propagation of Trojans [43]- [46]. In this paper, we adopt the propagation model in [46], which is a spatialtemporal SIR model that takes into account the network topology and temporal dynamics of user activities. Furthermore, it considers characteristics of modern Trojans, security practices, and user behaviors.…”
Section: Simulations For Single Source Estimationmentioning
confidence: 99%
“…Their evaluation on a real-world social graph of Flickr, with two known worms, Koobface and Mikeyy, indicated that the detection system can effectively detect OSN worm propagations in early stages when less than 0.13 % of users are infected. Faghani and Saidi (2009) propose a general model of propagation of Cross Site Scripting (XSS) worms in virtual social network. They examined the effect of the friend-visiting probability in such networks on the propagation of the worms.…”
Section: Diffusion and Epidemics In Social Networkmentioning
confidence: 99%
“…Malware propagation in unconventional networks such as scale-free networks [10], [11], wireless sensor networks [12], [13], cellular networks (using Multimedia Messaging Service (MMS) and Bluetooth) [2] as well as traditional networks has been studied in [3], [14]. Worm and spammer based attacks on social networks have recently led researchers to focus on the security of online social networks using simulated topologies and user activities such as in [15]- [17]. A recent focus of researchers has been the understanding of how information flows in social networks such as Facebook and Twitter [18]- [20] who have used this information to detect spammers in online social networks.…”
Section: Comparison With Related Workmentioning
confidence: 99%