Evaluating Algorithms for Detection of Compromised Social Media User Accounts

Hijacking of user accounts on Online Social Networks (OSNs) such as Twitter is increasingly used for purposes such as large-scale spam campaigns and cyber crime-related scams and phishing attacks, but also for purposes such as spreading terrorism propaganda and as part of information operations in p...

Full description

Saved in:
Bibliographic Details
Published in:2015 Second European Network Intelligence Conference pp. 75 - 82
Main Authors: Trang, David, Johansson, Fredrik, Rosell, Magnus
Format: Conference Proceeding
Language:English
Published: IEEE 01-09-2015
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Hijacking of user accounts on Online Social Networks (OSNs) such as Twitter is increasingly used for purposes such as large-scale spam campaigns and cyber crime-related scams and phishing attacks, but also for purposes such as spreading terrorism propaganda and as part of information operations in political and military conflicts. We present a novel method for evaluation of the performance of algorithms for detection of compromised social media accounts. In short, we create two artificially "hijacked accounts" by randomly selecting two genuine user accounts and after a number of successive posts switch the remaining posts between them. This allows us to create large amounts of training and/or test data, something which is not easy to find for this problem. Further, the developed method is utilized to evaluate the performance of a modified version of the existing COMPA system.
DOI:10.1109/ENIC.2015.19