Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Attackers' Intention and Influence A...
~
Lai, Chun-Ming.
Attackers' Intention and Influence Analysis in Social Media.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Attackers' Intention and Influence Analysis in Social Media.
Author:
Lai, Chun-Ming.
Published:
Ann Arbor : ProQuest Dissertations & Theses, 2019
Description:
95 p.
Notes:
Source: Dissertations Abstracts International, Volume: 81-04, Section: A.
Notes:
Advisor: Wu, S. Felix.
Contained By:
Dissertations Abstracts International81-04A.
Subject:
Computer science.
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13862994
ISBN:
9781085795845
Attackers' Intention and Influence Analysis in Social Media.
Lai, Chun-Ming.
Attackers' Intention and Influence Analysis in Social Media.
- Ann Arbor : ProQuest Dissertations & Theses, 2019 - 95 p.
Source: Dissertations Abstracts International, Volume: 81-04, Section: A.
Thesis (Ph.D.)--University of California, Davis, 2019.
This item must not be sold to any third party vendors.
Human communication behavior has changed significantly with the popularity of Online Social Networks (OSNs). In the absence of access control mechanisms, any user can contribute to an OSNs thread. Individuals can exploit this characteristic to execute targeted attacks, which increases the potential for subsequent malicious behaviors such as phishing, hate speech, malware distribution and fake news propagation. Actually, new patterns of attacking strategies have been discovered, trying to influence OSNs users online and offline behavior implicitly and explicitly.In this dissertation, we will use the concepts from criminology to study attackers strategies on OSNs. Our examinations include: (1) The suitable targets problem studies the characteristic of those post threads embedded with malicious URLs. (2) Effectiveness and influence analysis quantify the reactions and feedbacks for malicious campaigns. (3) Attackers daily and weekly behavior vectors provide the other way to analyze how malicious accounts differ from normal ones. We apply all above problems into engineering framework consideration, aiming at designing a general predictive systems on large-scale OSNs datasets with state-of-the-art machine learning algorithms.To evaluate our model, we will use discussion threads from Facebook public pages. By our research, with limited resource, attackers are able to perform more intelligent and effective malicious campaigns. On the other hand, defenders can focus on suspected targets by certain temporal and spatial variables. It is our hope that the data and analyses presented in this proposal will support a better understanding of attacker strategies and footprints, thereby assisting digital forensics.
ISBN: 9781085795845Subjects--Topical Terms:
199325
Computer science.
Attackers' Intention and Influence Analysis in Social Media.
LDR
:02714nmm a2200313 4500
001
570756
005
20200514111952.5
008
200901s2019 ||||||||||||||||| ||eng d
020
$a
9781085795845
035
$a
(MiAaPQ)AAI13862994
035
$a
AAI13862994
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Lai, Chun-Ming.
$3
857442
245
1 0
$a
Attackers' Intention and Influence Analysis in Social Media.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2019
300
$a
95 p.
500
$a
Source: Dissertations Abstracts International, Volume: 81-04, Section: A.
500
$a
Advisor: Wu, S. Felix.
502
$a
Thesis (Ph.D.)--University of California, Davis, 2019.
506
$a
This item must not be sold to any third party vendors.
520
$a
Human communication behavior has changed significantly with the popularity of Online Social Networks (OSNs). In the absence of access control mechanisms, any user can contribute to an OSNs thread. Individuals can exploit this characteristic to execute targeted attacks, which increases the potential for subsequent malicious behaviors such as phishing, hate speech, malware distribution and fake news propagation. Actually, new patterns of attacking strategies have been discovered, trying to influence OSNs users online and offline behavior implicitly and explicitly.In this dissertation, we will use the concepts from criminology to study attackers strategies on OSNs. Our examinations include: (1) The suitable targets problem studies the characteristic of those post threads embedded with malicious URLs. (2) Effectiveness and influence analysis quantify the reactions and feedbacks for malicious campaigns. (3) Attackers daily and weekly behavior vectors provide the other way to analyze how malicious accounts differ from normal ones. We apply all above problems into engineering framework consideration, aiming at designing a general predictive systems on large-scale OSNs datasets with state-of-the-art machine learning algorithms.To evaluate our model, we will use discussion threads from Facebook public pages. By our research, with limited resource, attackers are able to perform more intelligent and effective malicious campaigns. On the other hand, defenders can focus on suspected targets by certain temporal and spatial variables. It is our hope that the data and analyses presented in this proposal will support a better understanding of attacker strategies and footprints, thereby assisting digital forensics.
590
$a
School code: 0029.
650
4
$a
Computer science.
$3
199325
650
4
$a
Communication.
$3
180335
650
4
$a
Web studies.
$3
708690
690
$a
0984
690
$a
0459
690
$a
0646
710
2
$a
University of California, Davis.
$b
Computer Science.
$3
730453
773
0
$t
Dissertations Abstracts International
$g
81-04A.
790
$a
0029
791
$a
Ph.D.
792
$a
2019
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13862994
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000178130
電子館藏
1圖書
學位論文
TH 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13862994
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login