2011
DOI: 10.1504/ijitst.2011.039778
|View full text |Cite
|
Sign up to set email alerts
|

Online social network profile data extraction for vulnerability analysis

Abstract: Abstract:The increase in social computing has provided the situation where large amounts of personal information are being posted online. This makes people vulnerable to social engineering attacks because their personal details are readily available. Our automated approach for personal data extraction was developed to extract personal details and top friends from MySpace profiles and place them into a repository. An online social network graph was generated from the repository data where nodes represent people… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…We will study this possibility and see its advantages compared to the failure of the server but also its disadvantages concerning the updating of the adjacency matrix after each event of addition / suppression of a node / link in the network thus the overload of the DISSEMINATION of this update. For more details of this type of OSN, they are treated by Alim et al (2011Alim et al ( , 2012.…”
Section: Discussionmentioning
confidence: 99%
“…We will study this possibility and see its advantages compared to the failure of the server but also its disadvantages concerning the updating of the adjacency matrix after each event of addition / suppression of a node / link in the network thus the overload of the DISSEMINATION of this update. For more details of this type of OSN, they are treated by Alim et al (2011Alim et al ( , 2012.…”
Section: Discussionmentioning
confidence: 99%
“…Given the amount of personal information shared on OSN, users are vulnerable to "social engineering attacks". Alim et al (2011) proposed an automated approach to extract profile data in order to assess the vulnerability of the user. Kontaxis et al (2011) developed a tool to automatically detect social network profile cloning.…”
Section: User Profilementioning
confidence: 99%
“…Inferences could be made more accurate because they are based on data coming from various sources. The user is thus more "vulnerable to social engineering attacks" (Alim et al, 2011).…”
Section: Limitations Of a Portable User Profilementioning
confidence: 99%
“…The online social networking sites have taken full advantage of the paradigm shift and have become popular in the recent years and large amount of personal data is available on these sites. Online social networking sites contain huge number of user profiles containing semi-structured personal data [34]. There are some researches which have tried to extract social networks out of the dynamic data available on social networking sites.…”
Section: Online Social Networking Sites Data Based Social Network Extmentioning
confidence: 99%
“…There are some researches which have tried to extract social networks out of the dynamic data available on social networking sites. The study in [34] extracts profile data from the deep web using the approach adopted in [35]. HTML content is parsed and a vector of tokens is produced in the Data pre-processing phase.…”
Section: Online Social Networking Sites Data Based Social Network Extmentioning
confidence: 99%