語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The Role of the Underground Economy ...
~
Thomas, Kurt.
FindBook
Google Book
Amazon
博客來
The Role of the Underground Economy in Social Network Spam and Abuse.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
The Role of the Underground Economy in Social Network Spam and Abuse./
作者:
Thomas, Kurt.
面頁冊數:
158 p.
附註:
Source: Dissertation Abstracts International, Volume: 75-08(E), Section: B.
Contained By:
Dissertation Abstracts International75-08B(E).
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3616582
ISBN:
9781303834325
The Role of the Underground Economy in Social Network Spam and Abuse.
Thomas, Kurt.
The Role of the Underground Economy in Social Network Spam and Abuse.
- 158 p.
Source: Dissertation Abstracts International, Volume: 75-08(E), Section: B.
Thesis (Ph.D.)--University of California, Berkeley, 2013.
Online social networks have emerged as real-time communication platforms connecting billions of users around the globe. Implicit to the interactions within an online social network is the notion of trust; users create relationships with their friends and valued media outlets, in turn receiving access to content generated by each relationship. This trust however comes with a price. On the heels of the widespread adoption of online social networks, scams, phishing, and malware attacks conducted by criminals have become a regular occurrence. Such attacks exploit the trust users place in their relationships and the integrity of information found in online social networks.
ISBN: 9781303834325Subjects--Topical Terms:
626642
Computer Science.
The Role of the Underground Economy in Social Network Spam and Abuse.
LDR
:04668nam a2200337 4500
001
1967159
005
20141112080138.5
008
150210s2013 ||||||||||||||||| ||eng d
020
$a
9781303834325
035
$a
(MiAaPQ)AAI3616582
035
$a
AAI3616582
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Thomas, Kurt.
$3
2104103
245
1 4
$a
The Role of the Underground Economy in Social Network Spam and Abuse.
300
$a
158 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-08(E), Section: B.
500
$a
Adviser: Vern Paxson.
502
$a
Thesis (Ph.D.)--University of California, Berkeley, 2013.
520
$a
Online social networks have emerged as real-time communication platforms connecting billions of users around the globe. Implicit to the interactions within an online social network is the notion of trust; users create relationships with their friends and valued media outlets, in turn receiving access to content generated by each relationship. This trust however comes with a price. On the heels of the widespread adoption of online social networks, scams, phishing, and malware attacks conducted by criminals have become a regular occurrence. Such attacks exploit the trust users place in their relationships and the integrity of information found in online social networks.
520
$a
The threat criminals pose to online social networks is exacerbated by the emergence of an underground economy---a digital network of criminals who buy and sell goods that directly enable the abuse of online social networks. Such services empower other miscreants to penetrate online social networks and engage with victims, while at the same time abstracting away the complexities of circumventing existing protection mechanisms employed by online social networks to hinder spam and abuse.
520
$a
In this dissertation, we empirically analyze in both breadth and depth the range of threats currently targeting online social networks through the lens of Twitter. We map out the support infrastructure that is critical to online social network abuse, characterize the tools and techniques used to disseminate malignant content, and evaluate how such attacks ultimately realize a profit for the attackers involved. In the process, we argue that the for-profit infrastructure provided by the underground economy in the form of fake accounts and affiliate programs has become a fundamental weak point of abuse. Defenders should concentrate their efforts on disrupting these resources rather than fighting the subsequent, multifaceted abuse it enables such as scams, phishing, malware, and political attacks.
520
$a
To aid in this effort, we develop two new strategies for preventing abuse in social networks. Our first defense identifies abusive links in online social networks (or any web service) before they are distributed to recipients. At its heart, this technique identifies common HTML content generated by affiliate programs and criminal hosting infrastructure which act as a buttress for the abuse ecosystem. Our second defense relies on directly engaging with the underground economy that fuels online social network abuse to understand how millions of fake accounts are registered in an automated fashion. We leverage this understanding to detect abusive accounts at the time of their registration, preventing criminals from ever interacting with the legitimate users of online social networks.
520
$a
In summary, this dissertation provides a data-driven analysis of spam and abuse on Twitter. We demonstrate that existing solutions for protecting online social networks fail to protect the millions of users that now rely on the technology as a global communication platform, exposing users to scams, phishing, malware, and even political censorship. By adopting the solutions presented in this dissertation, online social network operators can effectively defend both the ingress points of abuse---fraudulent and compromised accounts---and the egress points of abuse---spam links that direct victims to spamvertised products, fake software, clickfraud, banking theft, and malware that converts a victim's machine into a commodity for the underground economy. Such solutions afford online social network providers an opportunity to strike at the critical infrastructure that criminals rely on in order to monetize and abuse online social networks.
590
$a
School code: 0028.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Web Studies.
$3
1026830
650
4
$a
Sociology, Criminology and Penology.
$3
1017569
690
$a
0984
690
$a
0646
690
$a
0627
710
2
$a
University of California, Berkeley.
$b
Computer Science.
$3
1043689
773
0
$t
Dissertation Abstracts International
$g
75-08B(E).
790
$a
0028
791
$a
Ph.D.
792
$a
2013
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3616582
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9262165
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入