Cargando…
Combating QR-Code-Based Compromised Accounts in Mobile Social Networks
Cyber Physical Social Sensing makes mobile social networks (MSNs) popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR) codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5038795/ https://www.ncbi.nlm.nih.gov/pubmed/27657071 http://dx.doi.org/10.3390/s16091522 |
_version_ | 1782455954211602432 |
---|---|
author | Guo, Dong Cao, Jian Wang, Xiaoqi Fu, Qiang Li, Qiang |
author_facet | Guo, Dong Cao, Jian Wang, Xiaoqi Fu, Qiang Li, Qiang |
author_sort | Guo, Dong |
collection | PubMed |
description | Cyber Physical Social Sensing makes mobile social networks (MSNs) popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR) codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices’ operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors’ messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System)-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs. |
format | Online Article Text |
id | pubmed-5038795 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-50387952016-09-29 Combating QR-Code-Based Compromised Accounts in Mobile Social Networks Guo, Dong Cao, Jian Wang, Xiaoqi Fu, Qiang Li, Qiang Sensors (Basel) Article Cyber Physical Social Sensing makes mobile social networks (MSNs) popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR) codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices’ operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors’ messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System)-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs. MDPI 2016-09-20 /pmc/articles/PMC5038795/ /pubmed/27657071 http://dx.doi.org/10.3390/s16091522 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Guo, Dong Cao, Jian Wang, Xiaoqi Fu, Qiang Li, Qiang Combating QR-Code-Based Compromised Accounts in Mobile Social Networks |
title | Combating QR-Code-Based Compromised Accounts in Mobile Social Networks |
title_full | Combating QR-Code-Based Compromised Accounts in Mobile Social Networks |
title_fullStr | Combating QR-Code-Based Compromised Accounts in Mobile Social Networks |
title_full_unstemmed | Combating QR-Code-Based Compromised Accounts in Mobile Social Networks |
title_short | Combating QR-Code-Based Compromised Accounts in Mobile Social Networks |
title_sort | combating qr-code-based compromised accounts in mobile social networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5038795/ https://www.ncbi.nlm.nih.gov/pubmed/27657071 http://dx.doi.org/10.3390/s16091522 |
work_keys_str_mv | AT guodong combatingqrcodebasedcompromisedaccountsinmobilesocialnetworks AT caojian combatingqrcodebasedcompromisedaccountsinmobilesocialnetworks AT wangxiaoqi combatingqrcodebasedcompromisedaccountsinmobilesocialnetworks AT fuqiang combatingqrcodebasedcompromisedaccountsinmobilesocialnetworks AT liqiang combatingqrcodebasedcompromisedaccountsinmobilesocialnetworks |