Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Detection of fast flux network based social bot using analysis based techniques

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Tyagi, A.K. ; Dept. of Comput. Sci., Pondicherry Univ., Puducherry, India ; Aghila, G.

As the technology growing Botmasters are also growing with latest technology (e.g. virus to Botnet and Root kits) using fast flux feature have begun to exploit Social Network Sites (e.g.,; etc) as their command and control (C&C) infrastructures e.g. Social Bot hacked four lacs facebook accounts alone in Bangalore only in November 2011 and steal 64 lacs password of LinkedIn in June 2012. This paper proposed a novel technique “Analysis Based Detection Techniques (ABDT) ”to detect fast flux service network (FFSN) based Social Bots on OSNs based on presented information on user's profile. It use geographically-dispersed set of proxy hosts to locate the position of the mothership in an abstract and dimensional space and built similarity graph (clustering) for each URL presented to validation checking for each user. This similarity graph describe all users as nodes in a large graph, and build edges when two users are connected based on (1) group users with “similar” textual description together, where similarity is captured by a probabilistic fingerprint. (2) For single destination URL must come from the same Bot. Hence as conclusion, this paper detect FFSN based Social Bot, by combining information obtained in form of similarity graph (clustering) through Social networking users; performing cross validation (to identify normal users) for each cluster and measuring TTL value (time to live) for each user.

Published in:

Data Science & Engineering (ICDSE), 2012 International Conference on

Date of Conference:

18-20 July 2012