Detecting Hacked Twitter Accounts based on Behavioural Change

نویسندگان

  • Meike Nauta
  • Mena B. Habib
  • Maurice van Keulen
چکیده

Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his or her image. This paper describes a classification for detecting hacked Twitter accounts. The model is mainly based on features associated with behavioural change such as changes in language, source, URLs, retweets, frequency and time. We experiment with a Twitter data set containing tweets of more than 100 Dutch users including 37 who were hacked. The model detects 99% of the malicious tweets which proves that behavioural changes can reveal a hack and that anomaly-based features perform better than regular features. Our approach can be use used by social media systems such as Twitter to automatically detect a hack of an account only a short time after the fact allowing the legitimate owner of the account to be warned or protected preventing reputational damage and annoyance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Hacked Twitter Accounts by Examining Behavioural Change using Twitter Metadata

Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his image. In this paper, a classification model is described for detecting these hacked Twitter accounts by examining changing features in behaviour. We look at changes in language, source, URL, retweets, frequency and time. Our mod...

متن کامل

A Peer-Based Approach on Analyzing Hacked Twitter Accounts

Social media has become an important part of the lives of their hundreds of millions of users. Hackers make use of the large target audience by sending malicious content, often by hijacking existing accounts. This phenomenon has caused widespread research on how to detect hacked accounts, where different approaches exist. This work sets out to analyze the possibilities of including the reaction...

متن کامل

Examination of Emergency Medicine Physicians’ and Residents’ Twitter Activities During the First Days of the COVID-19 Outbreak

Introduction: Social media has become an important element of interaction and found itself a place in every aspect of our lives. This study examined the twitter activities of emergency medicine physicians and residents (EMP&R;) about the COVID-19 outbreak. Methods: The study concentrated on Twitter, a major social media network. To identify accounts owned ...

متن کامل

Spam diffusion in a social network initiated by hacked e-mail accounts

Rumour diffusion has been widely studied in the literature. However, most prior work assumes that the rumour initiators are humans. This assumption does not hold in cyber space where some of the accounts are hacked. These hacked accounts aggressively disseminate rumours by continuously sending a large amount of messages. Our results show that when rumours are initiated by hacked accounts, the r...

متن کامل

A Model for Detecting of Persian Rumors based on the Analysis of Contextual Features in the Content of Social Networks

The rumor is a collective attempt to interpret a vague but attractive situation by using the power of words. Therefore, identifying the rumor language can be helpful in identifying it. The previous research has focused more on the contextual information to reply tweets and less on the content features of the original rumor to address the rumor detection problem. Most of the studies have been in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017