Deployment and exploitation of deceptive honeybots in social networks

  title={Deployment and exploitation of deceptive honeybots in social networks},
  author={Q. Zhu and A. Clark and R. Poovendran and T. Başar},
  journal={52nd IEEE Conference on Decision and Control},
  • Q. Zhu, A. Clark, +1 author T. Başar
  • Published 2013
  • Engineering, Computer Science
  • 52nd IEEE Conference on Decision and Control
  • As social networking sites such as Facebook and Twitter are becoming increasingly popular, a growing number of malicious attacks, such as phishing and malware, are exploiting them. Among these attacks, social botnets have sophisticated infrastructure that leverages compromised user accounts, known as bots, to automate the creation of new social networking accounts for spamming and malware propagation. Traditional defense mechanisms are often passive and reactive to non-zero-day attacks. In this… CONTINUE READING
    19 Citations
    Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
    • 24
    • PDF
    Leak sinks: The threat of targeted social eavesdropping
    • 3
    Detection of Spammers in the Reconnaissance Phase by machine learning techniques
    • J. Jeyasudha, G. Usha
    • Computer Science
    • 2018 3rd International Conference on Inventive Computation Technologies (ICICT)
    • 2018
    Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes
    • 8
    • PDF
    The ethics of social honeypots
    • 5
    • PDF
    Game theory for cyber deception: a tutorial
    • Q. Zhu
    • Computer Science, Mathematics
    • HotSoS
    • 2019
    • 2
    • PDF


    The Koobface botnet and the rise of social malware
    • Kurt Thomas, D. Nicol
    • Computer Science
    • 2010 5th International Conference on Malicious and Unwanted Software
    • 2010
    • 118
    • PDF
    Honeypot detection in advanced botnet attacks
    • 68
    • PDF
    Honeypot-Aware Advanced Botnet Construction and Maintenance
    • C. Zou, Ryan Cunningham
    • Computer Science
    • International Conference on Dependable Systems and Networks (DSN'06)
    • 2006
    • 140
    • PDF
    @spam: the underground on 140 characters or less
    • 554
    • PDF
    Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
    • 306
    • PDF
    Spamalytics: an empirical analysis of spam marketing conversion
    • 213
    • PDF