Research of Manipulated Account Detection
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Account has been widely used as the user identifier in WEB applications suck as Social Networks (SN), Instant Massager (IM) and E-Commerce. At present, most researchers focus on the social network attack detection which includes spam and fake accounts detection among SN envrionment. Obviously, current works are unable to cover all related fields and put forward unified description to the study objects. In order to solve these problems better, in this paper, firstly, we propose that the account is the only study object, and define malicious accounts controlled by attackers executing abnormal behaviors as manipulated account. Then, we classify the manipulated account according to the degree of control they suffered so as to categorize the detection methods by different kinds of manipulated account. Moreover, a statistical methods to classify the account have been promoted to verify the existence of manipulated account. Finally, we discussed some challenges and show some prospects about this area.

    Reference
    Related
    Cited by
Get Citation

宋晨,王远,王利明.受控账户检测技术研究.计算机系统应用,2016,25(11):1-13

Copy
Related Videos

Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:March 08,2016
  • Revised:May 12,2016
  • Adopted:
  • Online: November 15,2016
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063