Deployment and exploitation of deceptive honeybots in social networks

@article{Zhu2013DeploymentAE,
  title={Deployment and exploitation of deceptive honeybots in social networks},
  author={Q. Zhu and A. Clark and R. Poovendran and T. Başar},
  journal={52nd IEEE Conference on Decision and Control},
  year={2013},
  pages={212-219}
}
  • Q. Zhu, A. Clark, +1 author T. Başar
  • Published 2013
  • Computer Science
  • 52nd IEEE Conference on Decision and Control
  • As social networking sites such as Facebook and Twitter are becoming increasingly popular, a growing number of malicious attacks, such as phishing and malware, are exploiting them. Among these attacks, social botnets have sophisticated infrastructure that leverages compromised user accounts, known as bots, to automate the creation of new social networking accounts for spamming and malware propagation. Traditional defense mechanisms are often passive and reactive to non-zero-day attacks. In this… CONTINUE READING
    Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
    • 23
    • PDF
    Do Social Bots Dream of Electric Sheep? A Categorisation of Social Media Bot Accounts
    • 29
    • PDF
    Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception
    • 10
    • PDF
    Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes
    • 7
    • PDF
    Game Theory Meets Network Security: A Tutorial
    • 9
    • PDF
    Compliance signaling games: toward modeling the deterrence of insider threats
    • 9
    Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings
    • 7

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 41 REFERENCES
    The Koobface botnet and the rise of social malware
    • 116
    • PDF
    Honeypot-Aware Advanced Botnet Construction and Maintenance
    • 139
    • PDF
    Spamalytics: an empirical analysis of spam marketing conversion
    • 205
    • PDF