Key Challenges in Defending Against Malicious Socialbots
نویسندگان
چکیده
The ease with which we adopt online personas and relationships has created a soft spot that cyber criminals are willing to exploit. Advances in artificial intelligence make it feasible to design bots that sense, think and act cooperatively in social settings just like human beings. In the wrong hands, these bots can be used to infiltrate online communities, build up trust over time and then send personalized messages to elicit information, sway opinions and call to action. In this position paper, we observe that defending against such malicious bots raises a set of unique challenges that relate to web automation, online-offline identity binding and usable security.
منابع مشابه
Security Analysis of Malicious Socialbots on the Web
The open nature of the Web, online social networks (OSNs) in particular, makes it possible to design socialbots—automation software that controls fake accounts in a target OSN, and has the ability to perform basic activities similar to those of real users. In the wrong hands, socialbots can be used to infiltrate online communities, build up trust over time, and then engage in various malicious ...
متن کاملSecurity Analysis of Malicious Socialbots on the Web (DRAFT: May 13, 2015)
The open nature of the Web, online social networks (OSNs) in particular, makes it possible to design socialbots—automation software that controls fake accounts in a target OSN, and has the ability to perform basic activities similar to those of real users. In the wrong hands, socialbots can be used to infiltrate online communities, build up trust over time, and then engage in various malicious ...
متن کاملStrangers Intrusion Detection - Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies
Today’s social networks are plagued by numerous types of malicious profiles which can range from socialbots to sexual predators. We present a novel method for the detection of these malicious profiles by using the social network’s own topological features only. Reliance on these features alone ensures that the proposed method is generic enough to be applied on a range of social networks. The al...
متن کاملDesign and analysis of a social botnet
Online Social Networks (OSNs) have attracted millions of active users and have become an integral part of today’s Web ecosystem. Unfortunately, in the wrong hands, OSNs can be used to harvest private user data, distribute malware, control botnets, perform surveillance, spread misinformation, and even influence algorithmic trading. Usually, an adversary starts off by running an infiltration camp...
متن کاملUnderstanding and Defending Against Malicious Identities in Online Social Networks
Understanding and Defending Against Malicious Identities in Online Social Networks
متن کامل