Evaluating Algorithms for Detection of Compromised Social Media User Accounts
Hijacking of user accounts on Online Social Networks (OSNs) such as Twitter is increasingly used for purposes such as large-scale spam campaigns and cyber crime-related scams and phishing attacks, but also for purposes such as spreading terrorism propaganda and as part of information operations in p...
Saved in:
Published in: | 2015 Second European Network Intelligence Conference pp. 75 - 82 |
---|---|
Main Authors: | , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-09-2015
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Hijacking of user accounts on Online Social Networks (OSNs) such as Twitter is increasingly used for purposes such as large-scale spam campaigns and cyber crime-related scams and phishing attacks, but also for purposes such as spreading terrorism propaganda and as part of information operations in political and military conflicts. We present a novel method for evaluation of the performance of algorithms for detection of compromised social media accounts. In short, we create two artificially "hijacked accounts" by randomly selecting two genuine user accounts and after a number of successive posts switch the remaining posts between them. This allows us to create large amounts of training and/or test data, something which is not easy to find for this problem. Further, the developed method is utilized to evaluate the performance of a modified version of the existing COMPA system. |
---|---|
DOI: | 10.1109/ENIC.2015.19 |