نتایج جستجو برای: fake websites

تعداد نتایج: 20685  

Journal: :Computer Networks 2014
Rubén Cuevas Rumín Michal Kryczka Roberto Gonzalez Ángel Cuevas Arturo Azcorra

In this paper we conduct a large scale measurement study in order to analyse the fake content publishing phenomenon in the BitTorrent Ecosystem. Our results reveal that fake content represents an important portion (35%) of those files shared in BitTorrent and just a few tens of users are responsible for 90% of this content. Furthermore, more than 99% of the analysed fake files are linked to eit...

Journal: :CoRR 2011
Michal Kryczka Rubén Cuevas Rumín Roberto Gonzalez Ángel Cuevas Arturo Azcorra

Fake content represents an important portion of those files shared in BitTorrent. In this paper we conduct a large scale measurement study in order to analyse the fake content publishing phenomenon in the BitTorrent Ecosystem. Our results reveal that a few tens of users are responsible for 90% of the fake content. Furthermore, more than 99% of the analysed fake files are linked to either malwar...

Journal: :CoRR 2013
Fatemeh Zahedi Ahmed Abbasi Yan Chen

Fake websites have emerged as a major source of online fraud, accounting for billions of dollars of loss by Internet users. We explore the process by which salient design elements could increase the use of protective tools, thus reducing the success rate of fake websites. Using the protection motivation theory, we conceptualize a model to investigate how salient design elements of detection too...

2009
Ahmed Abbasi Hsinchun Chen

F ake websites are fictional, misrepresentative sites posing as legitimate providers of information, goods, or services used to garner illegitimate revenues by deceiving search engines or exploiting unsuspecting Internet users. Fraudsters have created several types of fake websites,1 including web spam, concocted, and spoof sites, as Figure 1 shows. Web spam sites attempt to deceive search engi...

2010
Kiran Kumar Venkata Ponnam

Web 2.0 applications and websites towards social news, gaming and networking are particularly vulnerable to Sybil attacks. In a Sybil attack, a malicious user assumes many fake identities, and pretends to be multiple honest users in the system. By controlling a certain fraction of the nodes in the system, he out votes the honest users to promote his own news articles, which poses a threat to th...

2009
Tyler Moore Richard Clayton

To implement a phishing scam, attackers must create a fake website and send spam to attract visitors. To date, empirical research into phishing’s impact has studied either the spam being sent or the website lifetimes. In this paper, we examine both phishing websites and the associated spam to gauge the overall effectiveness of phishing attack and defense. We find that while the bulk of spam is ...

Journal: :IJDCF 2012
Pedram Hayati Vidyasagar Potdar

Spam 2.0 is defined as the propagation of unsolicited, anonymous, mass content to infiltrate legitimate Web 2.0 applications. A fake eye-catching profile in social networking websites, a promotional review, a response to a thread in online forums with unsolicited content, or a manipulated Wiki page are examples of Spam 2.0. In this paper, the authors provide a comprehensive survey of the state-...

2012
Vít Baisa Vit Suchomel

To increase the search result rank of a website, many fake websites full of generated or semigenerated texts have been made in last years. Since we do not want this garbage in our text corpora, this is a becoming problem. This paper describes generated texts observed in the recently crawled web corpora and proposes a new way to detect such unwanted contents. The main idea of the presented appro...

Journal: :CoRR 2018
Luca de Alfaro Massimo Di Pierro Eugenio Tacchini Gabriele Ballarin Marco L. Della Vedova Stefano Moret

Social networks offer a ready channel for fake and misleading news to spread and exert influence. This paper examines the performance of different reputation algorithms when applied to a large and statistically significant portion of the news that are spread via Twitter. Our main result is that simple algorithms based on the identity of the users spreading the news, as well as the words appeari...

2017
C. Emilin Shyni S. Swamynathan

A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card information. Phishing has seen an alarming trend of increase in both the volume and the sophistication of phi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید