浏览全部资源
扫码关注微信
1. 西安电子科技大学 综合业务网理论及关键技术国家重点实验室,陕西 西安710071
2. 中国科学院大学 国家计算机网络入侵防范中心,北京 100190
3. 中国科学院信息工程研究所 信息安全国家重点实验室,北京 100093
[ "吕少卿(1987-),男,山西五寨人,西安电子科技大学博士生,主要研究方向为在线社交网络安全。" ]
[ "范丹(1982-),女,河北定州人,博士,主要研究方向为网络和协议安全。" ]
[ "张玉清(1966-),男,陕西宝鸡人,博士,中国科学院大学教授、博士生导师,主要研究方向为网络与信息系统安全。" ]
网络出版日期:2015-07,
纸质出版日期:2015-07-25
移动端阅览
吕少卿, 范丹, 张玉清. 分享式Spam攻击的轻量级检测方案[J]. 通信学报, 2015,36(7):80-91.
Shao-qing LV, Dan FAN, Yu-qing ZHANG. Lightweight detection system of shared spam attacks[J]. Journal on communications, 2015, 36(7): 80-91.
吕少卿, 范丹, 张玉清. 分享式Spam攻击的轻量级检测方案[J]. 通信学报, 2015,36(7):80-91. DOI: 10.11959/j.issn.1000-436x.2015144.
Shao-qing LV, Dan FAN, Yu-qing ZHANG. Lightweight detection system of shared spam attacks[J]. Journal on communications, 2015, 36(7): 80-91. DOI: 10.11959/j.issn.1000-436x.2015144.
Spam攻击是针对社交网络最主要的攻击方式,分享式Spam攻击具有Spam内容的存储与传播分离的新特性,目前没有有效的检测方案。针对这一问题分析了其攻击过程和特征,利用分享式Spam攻击传播和存储的特征设计了轻量级迭代检测算法LIDA,通过目标筛选和内容检测2个步骤实现对分享式Spam的检测。同时,轻量级算法避免了传统算法对每个用户都做深度检测的问题,更具实用性。通过人人网的4次迭代实验,共检测到9 568个Spam账号、30 732个Spam相册以及2 626 780条Spam URL,表明所提的检测算法对于分享式Spam攻击是行之有效的。
Spam is one of the most serious attacks against online social networks (OSN).Recently a new type of spam attack occurs
which named shared spam attack.The shared spam attack can separate the storage and dissemination of spam content
making the existing detection systems no longer effective.To address this problem
an empirical analysis of the process and properties of this new spam attack is performed.A novel lightweight iterative detection algorithm (LIDA) is proposed to detect spam accounts in OSN with these properties.LIDA contains two steps:target filter and content detection.It also noteworthy that LIDA is a lightweight algorithm to infer more spam accounts by exploiting spam accounts’ sharing instead of scanning or analyzing all accounts.Experimental results in RenRen
which has successfully detected 9 568 spam accounts
30 732 spam albums and 2 626 780 spam URL in four round iterations
indicate that LIDA is effective and efficiency in detecting shared spam accounts.
FaceBook [EB/OL ] . http://en.wikipedia.org/wiki/Facebook http://en.wikipedia.org/wiki/Facebook . 2014 .
RenRen [EB/OL ] . http://en.wikipedia.org/wiki/Renren http://en.wikipedia.org/wiki/Renren . 2013 .
MICHAEL F , ROY G , YUVAL E . Online social networks:threates and solutions [J ] . IEEE Communications Surveys & Tutorials , 2013 , 11 ( 4 ): 1 - 19 .
WANG A . Don’t follow me:spam detection in twitter [A ] . International Conference on Security and Cryptography (SECRYPT) [C ] . Athens,Greece , 2010 . 142 - 151 .
HARRIS . A Study of Social Networks Scams Interactive [R ] . Public Relations Research , 2008 .
EGELE M , STRINGHINI G , KRUEGEL C . COMPA:detecting compromised account on social networks [A ] . Network & Distributed System Security Symposium [C ] . San Diego,CA,USA , 2013 .
YANG Z , WILSON C , WANG X . Uncovering social network sybils in the wild [A ] . Proceedings of the ACM SIGCOMM Conference on Internet Measurement [C ] . Berlin,Germany , 2011 . 259 - 268 .
ZHU Y , WANG X , ZHONG E . Discovering spammers in social networks [A ] . Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence [C ] . Toronto,Canada , 2012 . 171 - 177 .
STRINGHINI G , KRUEGEL C , VIGNA G . Detecting spammers on social networks [A ] . Annual Computer Security Applications Conference [C ] . Austin,Texas,USA , 2010 . 1 - 9 .
THOMAS K , MCCOY D , GRIER C . Trafficking fraudulent accounts:the role of the underground market in twitter spam and abuse [A ] . USENIX Security Conferences [C ] . Washington D C,USA , 2013 .
GAO H , HU J , WILSON C . Detecting and characterizing social spam campaigns [A ] . Proceedings of the ACM SIGCOMM Conference on Internet Measurement [C ] . New York,USA , 2010 . 35 - 47 .
LEE S , KIM J . WARNINGBIRD:detecting suspicious URLs in twitter stream [A ] . Network & Distributed System Security Symposium [C ] . San Diego,California,USA . 2012 .
THOMAS K , GRIER C , MA J . Design and evaluation of a real-time URL spam filtering service [A ] . IEEE Symposium on Security &Privacy [C ] . Oakland,California,USA , 2011 . 447 - 462 .
YANG C , HARKREADER R , GU G . Empirical evaluation and new design for fighting evolving twitter spammers [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 8 ): 1280 - 1293 .
WANG G , KONOLIGE T , WILSON C . You are how you click:clickstream analysis for sybil detection [A ] . USENIX Security Conferences [C ] . Washington D C,USA , 2013 . 241 - 256 .
YANG C , HARKREADER R , ZHANG J . Analyzing spammer’s social networks for fun and profit [A ] . Proceedings of the 21th International Conference on World Wide Web [C ] . Lyon,France , 2012 . 71 - 80 .
GRIER C , THOMAS K , PAXSON V , et al . @spam:the underground on 140 characters or less [A ] . Proceedings of the 17th ACM Conference on Computer and Communications Security [C ] . Chicago,USA , 2010 . 27 - 37 .
LUPHER A , ENGLE C , XIN R . Detecting Spam on Social Networking Sites:Related Work [R ] . University of California Berkeley , 2012 .
FLORIAN K , STROHMAIER M . Short links under attack:geographical analysis of spam in a URL shortener network [A ] . Proceedings of the 23rd ACM Conference on Hypertext and Social media [C ] . Milwaukee,WI,USA , 2012 . 83 - 88 .
Google safe browsing [EB/OL ] . https://developers.google.com/safe-browsing/ https://developers.google.com/safe-browsing/ . 2014 .
DBL-the spamhaus project [EB/OL ] . http://www.spamhaus.org/dbl/ http://www.spamhaus.org/dbl/ . 2014 .
Wepawet [EB/OL ] . http://wepawet.iseclab.org/ http://wepawet.iseclab.org/ . 2014 .
LEE K , EOFF B , CAVERLEE J . Seven months with the devils:a long-term study of content polluters on twitter [A ] . Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media [C ] . Barcelona,Spain , 2011 . 185 - 192 .
RenRen privacy statement [EB/OL ] . http://www.renren.com/siteinfo/privacy http://www.renren.com/siteinfo/privacy . 2013 .
RenRen search [EB/OL ] . http://browse.renren.com/ http://browse.renren.com/ . 2013 .
[EB/OL ] . http://ictclas.nlpir.org/ http://ictclas.nlpir.org/ , 2014 .
ZHANG J , PORRRAS P , ULLRICH J . Highly predictive blacklisting [A ] . USENIX Security Conferences [C ] . San Jose,CA,USA , 2008 .
Spam and malware protection [EB/OL ] . http://blog.bitly.com/post/263859706/spam-and-malware-protectio http://blog.bitly.com/post/263859706/spam-and-malware-protectio , 2014 .
THOMAS K , GRIER C , PAXSON V . Suspended accounts in retrospect:an analysis of twitter spam [A ] . Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference [C ] . Berlin,Germany , 2011 . 243 - 258 .
0
浏览量
966
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构