Spam diffusion in a social network initiated by hacked e-mail accounts
نویسندگان
چکیده
Rumour diffusion has been widely studied in the literature. However, most prior work assumes that the rumour initiators are humans. This assumption does not hold in cyber space where some of the accounts are hacked. These hacked accounts aggressively disseminate rumours by continuously sending a large amount of messages. Our results show that when rumours are initiated by hacked accounts, the rumour diffusion dynamics are different. This work suggests that social simulations of interactions over cyber space should capture the fact that spamming accounts also participate in these interactions. The presence of these accounts can alter the simulation dynamics.
منابع مشابه
A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection
Emails are one of the fastest economic communications. Increasing email users has caused the increase of spam in recent years. As we know, spam not only damages user’s profits, time-consuming and bandwidth, but also has become as a risk to efficiency, reliability, and security of a network. Spam developers are always trying to find ways to escape the existing filters therefore new filters to de...
متن کاملDetecting Hacked Twitter Accounts by Examining Behavioural Change using Twitter Metadata
Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his image. In this paper, a classification model is described for detecting these hacked Twitter accounts by examining changing features in behaviour. We look at changes in language, source, URL, retweets, frequency and time. Our mod...
متن کاملMiracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem
The exponential growth in unsolicited commercial email, or spam, over the past several years has resulted in a degradation of e-mail as a useful medium for information interchange. Spam traffic wastes resources, drives up costs for access providers, and imposes a high social cost. Spam filtering systems often delete legitimate e-mail, resulting in a loss of e-mail as a reliable method of commun...
متن کاملDetecting Hacked Twitter Accounts based on Behavioural Change
Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his or her image. This paper describes a classification for detecting hacked Twitter accounts. The model is mainly based on features associated with behavioural change such as changes in language, source, URLs, retweets, frequency an...
متن کاملAnalyzing the Social Structure and Dynamics of E-mail and Spam in Massive Backbone Internet Traffic
E-mail is probably the most popular application on the Internet, with everyday business and personal communications dependent on it. Spam or unsolicited e-mail has been estimated to cost businesses significant amounts of money. However, our understanding of the network-level behavior of legitimate e-mail traffic and how it differs from spam traffic is limited. In this study, we have passively c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJSN
دوره 9 شماره
صفحات -
تاریخ انتشار 2014