Abstract
In security defense of MSN (MSN), attackers often impersonate themselves as other users, making it difficult to detect network user attacks based on user behavior. Multi-order Markov chains can consider the front-to-back correlation of user behavior, thereby more accurately identifying disguised users. Therefore, this paper proposes a user impersonation attack detection method based on multi-order Markov chains. First, the relevance coefficient method is used to determine the order of the multi-order Markov chain, and by defining appropriate multi-order Markov chain states to capture key features in user behavior, a multi-order Markov chain is established. Then, through the multi-order Markov chain combined with Shell commands, the normal behavior profile of legitimate users is established, and based on this, the probability of occurrence of the state sequence is calculated to complete the detection of userimpersonation attacks. The experimental results show that the similarity between the results of the proposed method and the actual situation in detecting impersonation attacks is more than 97%, indicating that this method can detect MSN user impersonation attacks with high accuracy.
| Original language | English |
|---|---|
| Pages (from-to) | 191-200 |
| Number of pages | 10 |
| Journal | Mobile Networks and Applications |
| Volume | 30 |
| Issue number | 1-2 |
| DOIs | |
| Publication status | Published - 31 Mar 2025 |
Keywords
- Markov chains
- mobile social networks
- user impersonation attacks
- Auto-correlation coefficient
- Impersonation attack
- Multi-order Markov chain
- MSN
- Shell command
ASJC Scopus subject areas
- Software
- Information Systems
- Hardware and Architecture
- Computer Networks and Communications
Fingerprint
Dive into the research topics of 'Detection for user impersonation attacks in mobile social networks based on high-order Markov chains'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver