[go: up one dir, main page]

Bossetta, 2018 - Google Patents

A simulated cyberattack on Twitter: Assessing partisan vulnerability to spear phishing and disinformation ahead of the 2018 US midterm elections

Bossetta, 2018

View PDF
Document ID
9126406353093134215
Author
Bossetta M
Publication year
Publication venue
arXiv preprint arXiv:1811.05900

External Links

Snippet

State-sponsored" bad actors" increasingly weaponize social media platforms to launch cyberattacks and disinformation campaigns during elections. Social media companies, due to their rapid growth and scale, struggle to prevent the weaponization of their platforms. This …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • H04M3/53Centralised arrangements for recording incoming messages, i.e. mailbox systems
    • H04M3/5322Centralised arrangements for recording incoming messages, i.e. mailbox systems for recording text messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Similar Documents

Publication Publication Date Title
Ghazi-Tehrani et al. Phishing evolves: Analyzing the enduring cybercrime
Soomro et al. Social media-related cybercrimes and techniques for their prevention
Fire et al. Online social networks: threats and solutions
Benjamin et al. Examining hacker participation length in cybercriminal internet-relay-chat communities
Rawat et al. Applications of social network analysis to managing the investigation of suspicious activities in social media platforms
Steffens Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
US11403400B2 (en) Troll account detection
US11134097B2 (en) Automated social account removal
Alharbi et al. Social media identity deception detection: a survey
US20190068632A1 (en) Malicious social media account identification
Bartholomew et al. Wave your false flags! deception tactics muddying attribution in targeted attacks
Shires Hack-and-leak operations: intrusion and influence in the Gulf
Bossetta A simulated cyberattack on Twitter: Assessing partisan vulnerability to spear phishing and disinformation ahead of the 2018 US midterm elections
US20190036937A1 (en) Social network page protection
Hassan et al. Digital privacy and security using Windows: A practical guide
US10868824B2 (en) Organizational social threat reporting
Algarni et al. Social engineering in social networking sites: Phase-based and source-based models
Imtiaz et al. Analysis of cybersecurity measures for detection, prevention, and misbehaviour of social systems
Yadav Social automation and APT attributions in national cybersecurity
Samermit et al. {“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators
Khadka et al. A survey on the principles of persuasion as a social engineering strategy in phishing
Rao et al. Evolving cyber threats, combating techniques, and open issues in online social networks
Sun et al. From victims to defenders: an exploration of the phishing attack reporting ecosystem
Gupta et al. Abusing phone numbers and cross-application features for crafting targeted attacks
Hudaib Comprehensive social media security analysis & xkeyscore espionage technology