{"title":"使用Canvas指纹检测恶意用户帐户","authors":"Ahmed M. Abouollo, Sultan Almuhammadi","doi":"10.1109/IACS.2017.7921998","DOIUrl":null,"url":null,"abstract":"Online social network applications suffer from people owning bulk of fake accounts. These fake accounts cause several problems such as resource consumption and inaccurate study results. In many cases, the social network operators assign full time employees to detect these fake accounts. Many researchers have proposed methods that help detecting fake accounts in online social networks. This research paper proposes a new technique that depends on HTML Canvas Fingerprint to identify what accounts belong to the same person or entity. The methodology has been tested on a public web application and found to give promising results, especially when combined with the other techniques described in the future work.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Detecting malicious user accounts using Canvas Fingerprint\",\"authors\":\"Ahmed M. Abouollo, Sultan Almuhammadi\",\"doi\":\"10.1109/IACS.2017.7921998\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Online social network applications suffer from people owning bulk of fake accounts. These fake accounts cause several problems such as resource consumption and inaccurate study results. In many cases, the social network operators assign full time employees to detect these fake accounts. Many researchers have proposed methods that help detecting fake accounts in online social networks. This research paper proposes a new technique that depends on HTML Canvas Fingerprint to identify what accounts belong to the same person or entity. The methodology has been tested on a public web application and found to give promising results, especially when combined with the other techniques described in the future work.\",\"PeriodicalId\":180504,\"journal\":{\"name\":\"2017 8th International Conference on Information and Communication Systems (ICICS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 8th International Conference on Information and Communication Systems (ICICS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IACS.2017.7921998\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 8th International Conference on Information and Communication Systems (ICICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IACS.2017.7921998","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detecting malicious user accounts using Canvas Fingerprint
Online social network applications suffer from people owning bulk of fake accounts. These fake accounts cause several problems such as resource consumption and inaccurate study results. In many cases, the social network operators assign full time employees to detect these fake accounts. Many researchers have proposed methods that help detecting fake accounts in online social networks. This research paper proposes a new technique that depends on HTML Canvas Fingerprint to identify what accounts belong to the same person or entity. The methodology has been tested on a public web application and found to give promising results, especially when combined with the other techniques described in the future work.