Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/9503
DC FieldValueLanguage
dc.contributor.authorCao, Qiang-
dc.contributor.authorSirivianos, Michael-
dc.contributor.authorYang, Xiaowei-
dc.contributor.authorMunagala, Kamesh-
dc.contributor.otherΣιριβιανός, Μιχάλης-
dc.date.accessioned2017-02-06T12:45:59Z-
dc.date.available2017-02-06T12:45:59Z-
dc.date.issued2015-01-01-
dc.identifier.citation35th IEEE International Conference on Distributed Computing Systems, ICDCS 2015; Columbus; United States; 29 June- 2 July 2015en_US
dc.identifier.isbn978-146737214-5-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/9503-
dc.description.abstractUnwanted friend requests in online social networks (OSNs), also known as friend spam, are among the most evasive malicious activities. Friend spam can result in OSN links that do not correspond to social relationship among users, thus pollute the underlying social graph upon which core OSN functionalities are built, including social search engine, ad targeting, and OSN defense systems. To effectively detect the fake accounts that act as friend spammers, we propose a system called Rejecto. It stems from the observation on social rejections in OSNs, i.e., Even well-maintained fake accounts inevitably have their friend requests rejected or they are reported by legitimate users. Our key insight is to partition the social graph into two regions such that the aggregate acceptance rate of friend requests from one region to the other is minimized. This design leads to reliable detection of a region that comprises friend spammers, regardless of the request collusion among the spammers. Meanwhile, it is resilient to other strategic manipulations. To efficiently obtain the graph cut, we extend the Kernighan-Lin heuristic and use it to iteratively detect the fake accounts that send out friend spam. Our evaluation shows that Rejecto can discern friend spammers under a broad range of scenarios and that it is computationally practical.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.rights© 2015 IEEE.en_US
dc.subjectFriend spam detectionen_US
dc.subjectManipulation resistanceen_US
dc.subjectSocial rejectionen_US
dc.subjectSybil defenseen_US
dc.titleCombating Friend Spam Using Social Rejectionsen_US
dc.typeConference Papersen_US
dc.collaborationCyprus University of Technologyen_US
dc.collaborationDuke Universityen_US
dc.subject.categoryComputer and Information Sciencesen_US
dc.countryCyprusen_US
dc.countryUnited Statesen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.relation.conferenceIEEE International Conference on Distributed Computing Systems, ICDCSen_US
dc.identifier.doi10.1109/ICDCS.2015.32en_US
cut.common.academicyear2014-2015en_US
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_c94f-
item.openairetypeconferenceObject-
item.grantfulltextnone-
item.languageiso639-1en-
item.cerifentitytypePublications-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-6500-581X-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation
CORE Recommender
Show simple item record

SCOPUSTM   
Citations 50

16
checked on Nov 6, 2023

Page view(s) 50

411
Last Week
2
Last month
6
checked on Feb 3, 2025

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.