A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit <a rel="external noopener" href="http://www.mpi-sws.org/~gummadi/papers/impersonators_IMC2015.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="ACM Press">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ojfzbasykngz3ensk2j2k3fcbi" style="color: black;">Proceedings of the 2015 ACM Conference on Internet Measurement Conference - IMC '15</a>
People have long been aware of malicious users that impersonate celebrities or launch identity theft attacks in social networks. However, beyond anecdotal evidence, there have been no in-depth studies of impersonation attacks in today's social networks. One reason for the lack of studies in this space is the absence of datasets about impersonation attacks. To this end, we propose a technique to build extensive datasets of impersonation attacks in current social networks and we gather 16,572<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2815675.2815699">doi:10.1145/2815675.2815699</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/imc/GogaVG15.html">dblp:conf/imc/GogaVG15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nu4qerf7lrao7lvyq3gdkivpai">fatcat:nu4qerf7lrao7lvyq3gdkivpai</a> </span>
more »... s of impersonation attacks in the Twitter social network. Our analysis reveals that most identity impersonation attacks are not targeting celebrities or identity theft. Instead, we uncover a new class of impersonation attacks that clone the profiles of ordinary people on Twitter to create real-looking fake identities and use them in malicious activities such as follower fraud. We refer to these as the doppelgänger bot attacks. Our findings show (i) that identity impersonation attacks are much broader than believed and can impact any user, not just celebrities and (ii) that attackers are evolving and create real-looking accounts that are harder to detect by current systems. We also propose and evaluate methods to automatically detect impersonation attacks sooner than they are being detected in today's Twitter social network.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160806071525/http://www.mpi-sws.org/~gummadi/papers/impersonators_IMC2015.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/df/e7df506ab9267eca8c65ff2b42d0cde5b82bfb3d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2815675.2815699"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>