Hunting organization-targeted socialbots

In this paper we perform cost-effectiveness analysis of strategies for monitoring the organizational social network in order to trap the attacker's profiles. We analyze attack strategies with different levels of knowledge on the employed monitoring strategies. The results demonstrate the efficacy in detecting the less sophisticated attackers and slowing down attackers that deliberately avoid the profiles being monitored.

[1]  Lior Rokach,et al.  Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks , 2013, SBP.

[2]  Lisa Singh,et al.  Can Friends Be Trusted? Exploring Privacy in Online Social Networks , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.

[3]  Rami Puzis,et al.  TONIC: Target Oriented Network Intelligence Collection for the Social Web , 2013, AAAI.

[4]  Shanton Chang,et al.  Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats , 2010, AISM 2010.

[5]  Thomas W. McAvoy DON'T FOLLOW ME , 2009 .

[6]  Colin Tankard,et al.  Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..

[7]  Dongho Won,et al.  A Practical Study on Advanced Persistent Threats , 2012 .

[8]  Calton Pu,et al.  Social Honeypots: Making Friends With A Spammer Near You , 2008, CEAS.

[9]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[10]  Calton Pu,et al.  A social-spam detection framework , 2011, CEAS '11.

[11]  Yuval Elovici,et al.  Organizational Intrusion: Organization Mining Using Socialbots , 2012, 2012 International Conference on Social Informatics.

[12]  Yuval Elovici,et al.  Homing Socialbots: Intrusion on a specific organization's employee using Socialbots , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[13]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[14]  Oscar Serrano Serrano,et al.  Changing the game: The art of deceiving sophisticated attackers , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).

[15]  Jure Leskovec,et al.  Defining and evaluating network communities based on ground-truth , 2012, Knowledge and Information Systems.

[16]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[17]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[18]  Erdong Chen,et al.  Facebook immune system , 2011, SNS '11.

[19]  Rami Puzis,et al.  Anti-Reconnaissance Tools: Detecting Targeted Socialbots , 2014, IEEE Internet Computing.

[20]  Konstantin Beznosov,et al.  The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.

[21]  Alex Hai Wang,et al.  Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[22]  Stefan Burr,et al.  The Mathematics of networks , 1982 .