An Information-Theoretic Definition of Similarity
ICML '98 Proceedings of the Fifteenth International Conference on Machine Learning
Worm Detection, Early Warning and Response Based on Local Victim Information
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Entropy Based Worm and Anomaly Detection in Fast IP Networks
WETICE '05 Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise
Structure and evolution of online social networks
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication
IEEE Transactions on Parallel and Distributed Systems
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
IEEE Transactions on Dependable and Secure Computing
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Spectator: detection and containment of JavaScript worms
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
Social networks and context-aware spam
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Construction K-Dominating Set with Multiple Relaying Technique in Wireless Mobile Ad Hoc Networks
CMC '09 Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 02
Anomalous payload-based worm detection and signature generation
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Malware propagation in online social networks: nature, dynamics, and defense implications
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Poster: a path-cutting approach to blocking XSS worms in social web networks
Proceedings of the 18th ACM conference on Computer and communications security
Poultry markets: on the underground economy of twitter followers
Proceedings of the 2012 ACM workshop on Workshop on online social networks
Poultry markets: on the underground economy of twitter followers
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
Containment of misinformation spread in online social networks
Proceedings of the 3rd Annual ACM Web Science Conference
What you see predicts what you get—lightweight agent-based malware detection
Security and Communication Networks
Analysis of misinformation containment in online social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
REPLOT: REtrieving profile links on Twitter for suspicious networks detection
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
A worm-containing strategy using a social network and PageRank
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Hi-index | 0.00 |
Worms propagating in online social networking (OSN) websites have become a major security threat to both the websites and their users in recent years. Since these worms exhibit unique propagation vectors, existing Internet worm detection mechanisms cannot be applied to them. In this work, we propose an early warning OSN worms detection system, which leverages both the propagation characteristics of these worms and the topological properties of online social networks. Our system can effectively monitor the entire social graph by keeping only a small number of user accounts under surveillance. Moreover, the system applies a two-level correlation scheme to reduce the noise from normal user communications such that infected user accounts can be identified with a higher accuracy. Our evaluation on the real social graph data obtained from Flickr indicates that by monitoring five hundreds users out of 1.8 million users, the proposed detection system can detect the burst of an OSN worm when less than 0.13% of total user accounts are infected. Besides, by adopting simple countermeasures, the detection system is also shown to be very helpful for worm containment.