This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Stealing Reality: When Criminals Become Data Scientists (or Vice Versa)
November/December 2011 (vol. 26 no. 6)
pp. 22-30
Yaniv Altshuler, Massachusetts Institute of Technology
Nadav Aharony, Massachusetts Institute of Technology
Alex Pentland, Massachusetts Institute of Technology
Yuval Elovici, Ben Gurion University of the Negev, Israel
Manuel Cebrian, University of California, San Diego

Stealing-reality attacks attempt to steal social network and behavioral information through data collection and inference techniques, making them more dangerous than other types of identity theft.

1. M. McLuhan, Understanding Media: The Extensions of Man, Mentor, 1964.
2. C. Herley and D. Florencio, "Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy," Economics of Information Security and Privacy, T. Moore, D. Pym, and C. Ioannidis eds., Springer, 2010, pp. 33–53.
3. "The Advanced Persistent Threat (APT)," white paper, Solutionary, 2011.
4. B.E. Binde, R. McRee, and T.J. O'Connor, Assessing Outbound Traffic to Uncover Advanced Persistent Threat, tech. report, Sans Inst., 2011.
5. M. Brunner et al., Infiltrating Critical Infrastructures with Next-Generation Attacks, tech. report, Fraunhofer-Inst. for Secure Information Technology, 2010.
6. L. Tang and H. Liu, "Toward Predicting Collective Behavior via Social Dimension Extraction," IEEE Intelligent Systems, vol. 35, no. 5, 2010, pp. 19–25.
7. D. Barbieri et al., "Deductive and Inductive Stream Reasoning for Semantic Social Media Analytics," IEEE Intelligent Systems, vol. 25, no. 6, 2010, pp. 32–41.
8. N. Jeffay, "Israel Poised to Pass National I.D. Database Law," The Jewish Daily Forward, 2009; www.forward.com/articles112033.
9. D. Emery, "Privacy Fears over Gay Teenage Database," BBC News, 2010; www.bbc.co.uk/news10612800.
10. R.M. Stana and D.R. Burton, Identity Theft: Prevalence and Cost Appear to Be Growing, tech. report GAO-02-363, US General Accounting Office, 2002.
11. S. Granger, "Social Engineering Fundamentals, Part I: Hacker Tactics," Symantec, 2001; www.symantec.com/connect/articlessocial-engineering-fundamentals-part-i-hacker-tactics .
12. R. Gross and A. Acquisti, "Information Revelation and Privacy in Online Social Networks," Proc. 2005 ACM Workshop Privacy in the Electronic Society (WPES), ACM Press, 2005, pp. 71–80.
13. A. Korolova et al., "Link Privacy in Social Networks," Proc. 17th ACM Conf. Information and Knowledge Management (CIKM), ACM Press, 2008, pp. 289–298.
14. W. Pan, N. Aharony, and A. Pentland, "Composite Social Network for Predicting Mobile Apps Installation," Proc. 25th Conf. Artificial Intelligence, 2011, pp. 821–827.
15. N.A. Christakis and J.H. Fowler, "Social Network Sensors for Early Detection of Contagious Outbreaks," PLoS ONE, vol. 5, 2010, p. e12948.
16. A. Kolmogorov, "Three Approaches to the Quantitative Definition of Information," Problems Information Transmission, vol. 1, no. 1, 1965, pp. 1–7.
17. A. Madan et al., "Social Sensing for Epidemiological Behavior Change," Proc. 12th ACM Int'l Conf. Ubiquitous Computing, ACM Press, 2010, pp. 291–300.
18. N. Eagle, A. Pentland, and D. Lazer, "Inferring Social Network Structure Using Mobile Phone Data," Proc. Nat'l Academy of Sciences, vol. 106, no. 36, 2009, pp. 15274–15278.
19. N. Aharony et al., "The Social fMRI: Measuring, Understanding, and Designing Social Mechanisms in the Real World," Proc. 13th ACM Int'l Conf. Ubiquitous Computing (Ubicomp), ACM Press, 2011, pp. 445–454.
20. D. Moore et al., "Inside the Slammer Worm," IEEE Security & Privacy, vol. 1, no. 4, 2003, pp. 33–39.
21. F. Apap et al., "Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses," Recent Advances in Intrusion Detection, Springer, 2002, pp. 36–53.
22. R. Moskovitch et al., "Host Based Intrusion Detection Using Machine Learning," Proc. IEEE Int'l Conf. Intelligence and Security Informatics (ISI), IEEE Press, 2007, pp. 107–114.
1. A.-L. Barabasi and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, no. 5429, 1999, pp. 509–512.
2. D. Watts and S. Strogatz, "Collective Dynamics of 'Small-World' Networks," Nature, vol. 393, no. 6684, 1998, pp. 440–442.
3. M. Newman, "The Structure and Function of Complex Networks," SIAM Rev., vol. 45, 2003, pp. 167–256.
4. N. Eagle, A. Pentland, and D. Lazer, "Inferring Social Network Structure Using Mobile Phone Data," Proc. Nat'l Academy of Sciences, vol. 106, no. 36, 2009, pp. 15274–15278.
5. C. Au Yeung et al., "Measuring Expertise in Online Communities," IEEE Intelligent Systems, vol. 26, no. 1, 2011, pp. 26–32.
6. D. Lazer et al., "Social Science: Computational Social Science," Science, vol. 323, no. 5915, 2009, pp. 721–723.
7. N. Eagle and A. Pentland, "Reality Mining: Sensing Complex Social Systems," Personal and Ubiquitous Computing, vol. 10, 2006, pp. 255–268.
8. M.C. Gonzalez, C.A. Hidalgo, and A.-L. Barabasi, "Understanding Individual Human Mobility Patterns," Nature, vol. 453, no. 7196, 2008, pp. 779–782.
9. N. Eagle, M. Macy, and R. Claxton, "Network Diversity and Economic Development," Science, vol. 328, no. 5981, 2010, pp. 1029–1031.
10. A. Madan et al., "Social Sensing for Epidemiological Behavior Change," Proc. 12th ACM Int'l Conf. Ubiquitous Computing, ACM Press, 2010, pp. 291–300.

Index Terms:
intelligent systems, social and economic computing, malware, mobile networks security, advanced persistent threat, stealth attacks
Citation:
Yaniv Altshuler, Nadav Aharony, Alex Pentland, Yuval Elovici, Manuel Cebrian, "Stealing Reality: When Criminals Become Data Scientists (or Vice Versa)," IEEE Intelligent Systems, vol. 26, no. 6, pp. 22-30, Nov.-Dec. 2011, doi:10.1109/MIS.2011.78
Usage of this product signifies your acceptance of the Terms of Use.