The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2011 vol.26)
pp: 22-30
Yaniv Altshuler , Massachusetts Institute of Technology
Nadav Aharony , Massachusetts Institute of Technology
Alex Pentland , Massachusetts Institute of Technology
Yuval Elovici , Ben Gurion University of the Negev, Israel
Manuel Cebrian , University of California, San Diego
ABSTRACT
<p>Stealing-reality attacks attempt to steal social network and behavioral information through data collection and inference techniques, making them more dangerous than other types of identity theft.</p>
INDEX TERMS
intelligent systems, social and economic computing, malware, mobile networks security, advanced persistent threat, stealth attacks
CITATION
Yaniv Altshuler, Nadav Aharony, Alex Pentland, Yuval Elovici, Manuel Cebrian, "Stealing Reality: When Criminals Become Data Scientists (or Vice Versa)", IEEE Intelligent Systems, vol.26, no. 6, pp. 22-30, November/December 2011, doi:10.1109/MIS.2011.78
REFERENCES
1. M. McLuhan, Understanding Media: The Extensions of Man, Mentor, 1964.
2. C. Herley and D. Florencio, "Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy," Economics of Information Security and Privacy, T. Moore, D. Pym, and C. Ioannidis eds., Springer, 2010, pp. 33–53.
3. "The Advanced Persistent Threat (APT)," white paper, Solutionary, 2011.
4. B.E. Binde, R. McRee, and T.J. O'Connor, Assessing Outbound Traffic to Uncover Advanced Persistent Threat, tech. report, Sans Inst., 2011.
5. M. Brunner et al., Infiltrating Critical Infrastructures with Next-Generation Attacks, tech. report, Fraunhofer-Inst. for Secure Information Technology, 2010.
6. L. Tang and H. Liu, "Toward Predicting Collective Behavior via Social Dimension Extraction," IEEE Intelligent Systems, vol. 35, no. 5, 2010, pp. 19–25.
7. D. Barbieri et al., "Deductive and Inductive Stream Reasoning for Semantic Social Media Analytics," IEEE Intelligent Systems, vol. 25, no. 6, 2010, pp. 32–41.
8. N. Jeffay, "Israel Poised to Pass National I.D. Database Law," The Jewish Daily Forward, 2009; www.forward.com/articles112033.
9. D. Emery, "Privacy Fears over Gay Teenage Database," BBC News, 2010; www.bbc.co.uk/news10612800.
10. R.M. Stana and D.R. Burton, Identity Theft: Prevalence and Cost Appear to Be Growing, tech. report GAO-02-363, US General Accounting Office, 2002.
11. S. Granger, "Social Engineering Fundamentals, Part I: Hacker Tactics," Symantec, 2001; www.symantec.com/connect/articlessocial-engineering-fundamentals-part-i-hacker-tactics .
12. R. Gross and A. Acquisti, "Information Revelation and Privacy in Online Social Networks," Proc. 2005 ACM Workshop Privacy in the Electronic Society (WPES), ACM Press, 2005, pp. 71–80.
13. A. Korolova et al., "Link Privacy in Social Networks," Proc. 17th ACM Conf. Information and Knowledge Management (CIKM), ACM Press, 2008, pp. 289–298.
14. W. Pan, N. Aharony, and A. Pentland, "Composite Social Network for Predicting Mobile Apps Installation," Proc. 25th Conf. Artificial Intelligence, 2011, pp. 821–827.
15. N.A. Christakis and J.H. Fowler, "Social Network Sensors for Early Detection of Contagious Outbreaks," PLoS ONE, vol. 5, 2010, p. e12948.
16. A. Kolmogorov, "Three Approaches to the Quantitative Definition of Information," Problems Information Transmission, vol. 1, no. 1, 1965, pp. 1–7.
17. A. Madan et al., "Social Sensing for Epidemiological Behavior Change," Proc. 12th ACM Int'l Conf. Ubiquitous Computing, ACM Press, 2010, pp. 291–300.
18. N. Eagle, A. Pentland, and D. Lazer, "Inferring Social Network Structure Using Mobile Phone Data," Proc. Nat'l Academy of Sciences, vol. 106, no. 36, 2009, pp. 15274–15278.
19. N. Aharony et al., "The Social fMRI: Measuring, Understanding, and Designing Social Mechanisms in the Real World," Proc. 13th ACM Int'l Conf. Ubiquitous Computing (Ubicomp), ACM Press, 2011, pp. 445–454.
20. D. Moore et al., "Inside the Slammer Worm," IEEE Security & Privacy, vol. 1, no. 4, 2003, pp. 33–39.
21. F. Apap et al., "Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses," Recent Advances in Intrusion Detection, Springer, 2002, pp. 36–53.
22. R. Moskovitch et al., "Host Based Intrusion Detection Using Machine Learning," Proc. IEEE Int'l Conf. Intelligence and Security Informatics (ISI), IEEE Press, 2007, pp. 107–114.
391 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool