Filters








1,249 Hits in 3.1 sec

Preventing Fake Information Generation Against Media Clone Attacks

Noboru BABAGUCHI, Isao ECHIZEN, Junichi YAMAGISHI, Naoko NITTA, Yuta NAKASHIMA, Kazuaki NAKAMURA, Kazuhiro KONO, Fuming FANG, Seiko MYOJIN, Zhenzhong KUANG, Huy H. NGUYEN, Ngoc-Dung T. TIEU
2021 IEICE transactions on information and systems  
This paper describes some research results of the Media Clone project, in particular, various methods for protecting personal information against generating fake information.  ...  Such media can be created from fake information about a specific person. Our goal is to develop a trusted communication system that can defend against attacks of media clones.  ...  Using that fake information, Eve generates clones of Alice's media and sends these media clones to Bob to deceive him.  ... 
doi:10.1587/transinf.2020mui0001 fatcat:dzmvdl4pvvbvlpaxx5gf7tsbgq

Generation and Detection of Media Clones

Isao ECHIZEN, Noboru BABAGUCHI, Junichi YAMAGISHI, Naoko NITTA, Yuta NAKASHIMA, Kazuaki NAKAMURA, Kazuhiro KONO, Fuming FANG, Seiko MYOJIN, Zhenzhong KUANG, Huy H. NGUYEN, Ngoc-Dung T. TIEU
2021 IEICE transactions on information and systems  
from fake information and 2) realization of a protection shield for media clones' attacks by recognizing them. key words: media clone, information security, image and speech processing, social media,  ...  Our aim is to achieve a communication system that can defend against MC attacks and help ensure safe and reliable communication.  ...  The following shows our research results on media clone detection. Table 3 Accuracy of capsule network against several types of attack.  ... 
doi:10.1587/transinf.2020mui0002 fatcat:2tom7k5wrbhbbiha6g2txlgaqi

Social Media Identity Deception Detection: A Survey [article]

Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil
2021 arXiv   pre-print
This survey analyses various identity deception attacks, which can be categorized into fake profile, identity theft and identity cloning.  ...  Many social media identity deception cases have arisen over the past few years. Recent studies have been conducted to prevent and detect identity deception.  ...  Identity Cloning Identity cloning is to create a fake profile using stolen identity information.  ... 
arXiv:2103.04673v1 fatcat:zf6xcn3pafcgfbxmoewc3yhhpi

Online Social Deception and Its Countermeasures: A Survey

Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra
2020 IEEE Access  
and cybercrimes; 3) comprehensive defense mechanisms embracing prevention, detection, and response (or mitigation) against OSD attacks along with their pros and cons; 4) datasets/metrics used for validation  ...  Therefore, it is critical to understand OSD and develop effective countermeasures against OSD for building trustworthy SNSs.  ...  They found that information loss was incurred in the process of generating fake reviews from RNN models and the generated reviews can be detected against real reviews. Song et al.  ... 
doi:10.1109/access.2020.3047337 fatcat:xw2rr2sjnrdf3nk4vfuowrkizy

Fake Profiles Types of Online Social Networks: A Survey

Rafeef Kareem, Wesam Bhaya
2018 International Journal of Engineering & Technology  
Thus, needing more complex automated methods, and tremendous effort manpower to discover and stopping these harmful users.This paper explains different kinds of OSNs risk generators such as cloned profiles  ...  Also, this paper trying to show what is the dangerous type of profile attacks and the most popular in OSNs.  ...  In the other site, many algorithms and technologies were appeared, to detected the fake accounts and to prevent the exploitation of real or personal information to prevent exploit them by the attackers  ... 
doi:10.14419/ijet.v7i4.19.28071 fatcat:rr7db4eifrfdtitvdairajenoa

Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey [article]

Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra
2020 arXiv   pre-print
attacks and cybercrimes; (iii) comprehensive defense mechanisms embracing prevention, detection, and response (or mitigation) against OSD attacks along with their pros and cons; (iv) datasets/metrics  ...  Therefore, it is critical to understand OSD and develop effective countermeasures against OSD for building a trustworthy SNSs.  ...  They found that information loss was incurred in the process of generating fake reviews from RNN models and the generated reviews can be detected against real reviews. Song et al.  ... 
arXiv:2004.07678v1 fatcat:k4a6siywefb6lhkmyn67lmoqwe

Three prophylactic interventions to counter fake news on social media [article]

David A. Eccles, Tilman Dingler
2021 arXiv   pre-print
Fake news on Social Media undermines democratic institutions and processes. Especially since 2016, researchers from many disciplines have focussed on ways to address the phenomenon.  ...  the population exposed to fake news.  ...  Fake news account followers appear to be clones, often with AI generated profile pictures, generic profiles and non sensical interactions with each other (18) .  ... 
arXiv:2105.08929v1 fatcat:z67qmeiekjh7tlffbbfrflwhhe

Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks

Dania Aljeaid, Amal Alzhrani, Mona Alrougi, Oroob Almalki
2020 Information  
Usually, an attacker uses trickery as well as fraudulent and disguised means to steal valuable personal information or to deceive the victim into running malicious code, thereby gaining access and controlling  ...  Furthermore, we elaborate on some of the concepts related to phishing attacks and review the steps required to launch such attacks.  ...  Each attack servers as model providing information about phishing and indicating possible preventive measures. 3.  ... 
doi:10.3390/info11120547 fatcat:iqwux437lfagxcbz2tbmmoccqe

A sneak into the Devil's Colony - Fake Profiles in Online Social Networks [article]

Mudasir Ahmad Wani, Suraiya Jabin
2017 arXiv   pre-print
In this paper, various types of OSN threat generators like compromised profiles, cloned profiles and online bots (spam bots, social bots, like bots and influential bots) have been classified.  ...  A refresher on existing cyber laws to curb social media based cyber crimes with their limitations is also presented.  ...  These attacks are called as Identity Clone Attacks (ICAs) [24] which are of two types of profile cloning attacks namely single site and cross site profile cloning.  ... 
arXiv:1705.09929v2 fatcat:sjz4ux7mffd43pzgzdoe3gx3oy

Identity Verification Mechanism for Detecting Fake Profiles in Online Social Networks

Ali M. Meligy, Hani M. Ibrahim, Mohamed F. Torky
2017 International Journal of Computer Network and Information Security  
Scammers and adversaries seek to create set of fake profiles to carry out malicious behaviors and online social crimes in social media.  ...  In this paper, we propose a detection technique called Fake Profile Recognizer (FPR) for verifying the identity of profiles, and detecting the fake profiles in OSNs.  ...  Profiling Attack [4] through which the adversary try to gather information about OSN activities.  ... 
doi:10.5815/ijcnis.2017.01.04 fatcat:jrzyhiuxofgxbfnv2if4nwagja

Cyber Harassment Trends Analysis: a Malaysia Case Study

Sharifah Roziah Mohd Kassim, Wira Zanoramy A. Zakaria, Faiszatulnasro Maksom, Kilausuria Abdullah
2018 International Journal of Engineering & Technology  
Countermeasures to cyber harassment is proposed as a preventive measure to limit the risks and impacts of potential cyber harassment threats.  ...  This includes discussion on online fake profiles, executing cyber extortion and cyber harassment based on the incidents received by MyCERT from year 2014 until June of 2017.  ...  Once identified the risk, necessary controls can be put in place as a preventive measure against potential harms such as cyber harassment, fake profiles that can be harnessed from social networks.  ... 
doi:10.14419/ijet.v7i4.15.21430 fatcat:2lvmb6255ndtvj5tqujjhbgd3a

Privacy and Security Issues in Online Social Networks

Shaukat Ali, Naveed Islam, Azhar Rauf, Ikram Din, Mohsen Guizani, Joel Rodrigues
2018 Future Internet  
It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests.  ...  In this paper, common security and privacy issues are explained along with recommendations to OSN users to protect themselves from these issues whenever they use social media.  ...  Identity Clone Attacks Profile cloning can be performed by an attacker using theft credentials from an already existing profile, creating a new fake profile while using stolen private information.  ... 
doi:10.3390/fi10120114 fatcat:n6yw5hjcovgs7hsll7xeriiuni

Online Social Networks: Threats and Solutions

Michael Fire, Roy Goldschmidt, Yuval Elovici
2014 IEEE Communications Surveys and Tutorials  
In this paper we present a thorough review of the different security and privacy risks which threaten the well-being of OSN users in general, and children in particular.  ...  This information, if put into the wrong hands, can be used to harm users both in the virtual world and in the real world. These risks become even more severe when the users are children.  ...  In this section, we present studies which provide solutions for improving OSN users' privacy settings; for detecting phishing, spammers, cloned and fake profiles, and socware; and for preventing information  ... 
doi:10.1109/comst.2014.2321628 fatcat:4btteszrdnc7xotjxo7x6bp7we

THE IMPACT OF CYBER THREATS ON SOCIAL NETWORKING SITES

Hilal Almarabeh
2019 International Journal of Advanced Research in Computer Science  
The most modern threats are Surveillance, User Profiling, Inference Attacks, Cyberstalking, Clickjacking, Location Privacy Leakage, Identity Clone Attacks, Information Privacy Leakage, Fake Profiles, and  ...  For instance, an approach was generated in [38] to demonstrate the fake profile and able to send a total of 8,570 connection requests on Facebook.  ... 
doi:10.26483/ijarcs.v10i2.6384 fatcat:cgvar7clmba4leuepa6bien6ga

Study of Phishing Attacks and Preventions

Tenzin Dakpa, Peter Augustine
2017 International Journal of Computer Applications  
Because of the ascent in the quantity of clients getting to the Internet through advanced cells, long range, interpersonal communication sites have extended their administrations on PDAs, including informing  ...  CONCLUSION Phishing is critical problem that result in continual threats in social media, Despite the fact that laws ordered, training is the best protection against phishing.  ...  PREVENTION OF PHISHING Sites utilized for phishing identified by breaking down end client detailed information accommodation measurements.  ... 
doi:10.5120/ijca2017913461 fatcat:rsstpjc7zfgttd6hd3xdbpf4xm
« Previous Showing results 1 — 15 out of 1,249 results