Skip to main navigation Skip to search Skip to main content

Detection for user impersonation attacks in mobile social networks based on high-order Markov chains

    • Nanchang Business College of JXAU
    • IDEAS NCBR
    • Norwegian Research Center NORCE
    • University of South-Eastern Norway

    Research output: Contribution to journalArticlepeer-review

    3 Downloads (Pure)

    Abstract

    In security defense of MSN (MSN), attackers often impersonate themselves as other users, making it difficult to detect network user attacks based on user behavior. Multi-order Markov chains can consider the front-to-back correlation of user behavior, thereby more accurately identifying disguised users. Therefore, this paper proposes a user impersonation attack detection method based on multi-order Markov chains. First, the relevance coefficient method is used to determine the order of the multi-order Markov chain, and by defining appropriate multi-order Markov chain states to capture key features in user behavior, a multi-order Markov chain is established. Then, through the multi-order Markov chain combined with Shell commands, the normal behavior profile of legitimate users is established, and based on this, the probability of occurrence of the state sequence is calculated to complete the detection of userimpersonation attacks. The experimental results show that the similarity between the results of the proposed method and the actual situation in detecting impersonation attacks is more than 97%, indicating that this method can detect MSN user impersonation attacks with high accuracy.
    Original languageEnglish
    Pages (from-to)191-200
    Number of pages10
    JournalMobile Networks and Applications
    Volume30
    Issue number1-2
    DOIs
    Publication statusPublished - 31 Mar 2025

    Keywords

    • Markov chains
    • mobile social networks
    • user impersonation attacks
    • Auto-correlation coefficient
    • Impersonation attack
    • Multi-order Markov chain
    • MSN
    • Shell command

    ASJC Scopus subject areas

    • Software
    • Information Systems
    • Hardware and Architecture
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Detection for user impersonation attacks in mobile social networks based on high-order Markov chains'. Together they form a unique fingerprint.

    Cite this