Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
The Role of the Underground Economy ...
~
Thomas, Kurt.
Linked to FindBook
Google Book
Amazon
博客來
The Role of the Underground Economy in Social Network Spam and Abuse.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
The Role of the Underground Economy in Social Network Spam and Abuse./
Author:
Thomas, Kurt.
Description:
158 p.
Notes:
Source: Dissertation Abstracts International, Volume: 75-08(E), Section: B.
Contained By:
Dissertation Abstracts International75-08B(E).
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3616582
ISBN:
9781303834325
The Role of the Underground Economy in Social Network Spam and Abuse.
Thomas, Kurt.
The Role of the Underground Economy in Social Network Spam and Abuse.
- 158 p.
Source: Dissertation Abstracts International, Volume: 75-08(E), Section: B.
Thesis (Ph.D.)--University of California, Berkeley, 2013.
Online social networks have emerged as real-time communication platforms connecting billions of users around the globe. Implicit to the interactions within an online social network is the notion of trust; users create relationships with their friends and valued media outlets, in turn receiving access to content generated by each relationship. This trust however comes with a price. On the heels of the widespread adoption of online social networks, scams, phishing, and malware attacks conducted by criminals have become a regular occurrence. Such attacks exploit the trust users place in their relationships and the integrity of information found in online social networks.
ISBN: 9781303834325Subjects--Topical Terms:
626642
Computer Science.
The Role of the Underground Economy in Social Network Spam and Abuse.
LDR
:04668nam a2200337 4500
001
1967159
005
20141112080138.5
008
150210s2013 ||||||||||||||||| ||eng d
020
$a
9781303834325
035
$a
(MiAaPQ)AAI3616582
035
$a
AAI3616582
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Thomas, Kurt.
$3
2104103
245
1 4
$a
The Role of the Underground Economy in Social Network Spam and Abuse.
300
$a
158 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-08(E), Section: B.
500
$a
Adviser: Vern Paxson.
502
$a
Thesis (Ph.D.)--University of California, Berkeley, 2013.
520
$a
Online social networks have emerged as real-time communication platforms connecting billions of users around the globe. Implicit to the interactions within an online social network is the notion of trust; users create relationships with their friends and valued media outlets, in turn receiving access to content generated by each relationship. This trust however comes with a price. On the heels of the widespread adoption of online social networks, scams, phishing, and malware attacks conducted by criminals have become a regular occurrence. Such attacks exploit the trust users place in their relationships and the integrity of information found in online social networks.
520
$a
The threat criminals pose to online social networks is exacerbated by the emergence of an underground economy---a digital network of criminals who buy and sell goods that directly enable the abuse of online social networks. Such services empower other miscreants to penetrate online social networks and engage with victims, while at the same time abstracting away the complexities of circumventing existing protection mechanisms employed by online social networks to hinder spam and abuse.
520
$a
In this dissertation, we empirically analyze in both breadth and depth the range of threats currently targeting online social networks through the lens of Twitter. We map out the support infrastructure that is critical to online social network abuse, characterize the tools and techniques used to disseminate malignant content, and evaluate how such attacks ultimately realize a profit for the attackers involved. In the process, we argue that the for-profit infrastructure provided by the underground economy in the form of fake accounts and affiliate programs has become a fundamental weak point of abuse. Defenders should concentrate their efforts on disrupting these resources rather than fighting the subsequent, multifaceted abuse it enables such as scams, phishing, malware, and political attacks.
520
$a
To aid in this effort, we develop two new strategies for preventing abuse in social networks. Our first defense identifies abusive links in online social networks (or any web service) before they are distributed to recipients. At its heart, this technique identifies common HTML content generated by affiliate programs and criminal hosting infrastructure which act as a buttress for the abuse ecosystem. Our second defense relies on directly engaging with the underground economy that fuels online social network abuse to understand how millions of fake accounts are registered in an automated fashion. We leverage this understanding to detect abusive accounts at the time of their registration, preventing criminals from ever interacting with the legitimate users of online social networks.
520
$a
In summary, this dissertation provides a data-driven analysis of spam and abuse on Twitter. We demonstrate that existing solutions for protecting online social networks fail to protect the millions of users that now rely on the technology as a global communication platform, exposing users to scams, phishing, malware, and even political censorship. By adopting the solutions presented in this dissertation, online social network operators can effectively defend both the ingress points of abuse---fraudulent and compromised accounts---and the egress points of abuse---spam links that direct victims to spamvertised products, fake software, clickfraud, banking theft, and malware that converts a victim's machine into a commodity for the underground economy. Such solutions afford online social network providers an opportunity to strike at the critical infrastructure that criminals rely on in order to monetize and abuse online social networks.
590
$a
School code: 0028.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Web Studies.
$3
1026830
650
4
$a
Sociology, Criminology and Penology.
$3
1017569
690
$a
0984
690
$a
0646
690
$a
0627
710
2
$a
University of California, Berkeley.
$b
Computer Science.
$3
1043689
773
0
$t
Dissertation Abstracts International
$g
75-08B(E).
790
$a
0028
791
$a
Ph.D.
792
$a
2013
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3616582
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9262165
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login