Creation and management of social network honeypots for detecting targeted cyber attacks

A Paradise, A Shabtai, R Puzis… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Reconnaissance is the initial and essential phase of a successful advanced persistent threat
(APT). In many cases, attackers collect information from social media, such as professional …

Homing socialbots: intrusion on a specific organization's employee using socialbots

A Elyashar, M Fire, D Kagan, Y Elovici - Proceedings of the 2013 IEEE …, 2013 - dl.acm.org
One dimension on the Internet, which has gained great popularity in recent years are the
online social networks (OSNs). Users all over the globe write, share, and publish personal …

Anti-reconnaissance tools: Detecting targeted socialbots

A Paradise, R Puzis, A Shabtai - IEEE Internet Computing, 2014 - ieeexplore.ieee.org
Advanced attackers use online social networks to extract useful information about the target
organization, including its members and their connections, affiliations, and positions …

[PDF][PDF] Volatile multi-armed bandits for guaranteed targeted social crawling

Z Bnaya, R Puzis, R Stern, A Felner - Workshops at the Twenty …, 2013 - cdn.aaai.org
We introduce a new variant of the multi-armed bandit problem, called Volatile Multi-Arm
Bandit (VMAB). A general policy for VMAB is given with proven regret bounds. The problem …

[PDF][PDF] Social network search as a volatile multi-armed bandit problem

Z Bnaya, R Puzis, R Stern, A Felner - Human, 2013 - academia.edu
In many cases the best way to find a profile or a set of profiles matching some criteria in a
social network is via targeted crawling. An important challenge in targeted crawling is …

Photometric self-calibration of a projector-camera system

R Juang, A Majumder - 2007 IEEE Conference on Computer …, 2007 - ieeexplore.ieee.org
In this paper, we present a method for photometric self-calibration of a projector-camera
system. In addition to the input transfer functions (commonly called gamma functions), we …

Social network honeypot

A Shabtai, R Puzis, Y Elovici - US Patent 9,509,716, 2016 - Google Patents
The invention is a method and system for detecting attackers that are interested in attacking
an organization's infrastructure during the reconnaissance phase of an Advanced Persistent …

Bandit algorithms for social network queries

Z Bnaya, R Puzis, R Stern… - … international conference on …, 2013 - ieeexplore.ieee.org
In many cases the best way to find a profile or a set of profiles matching some criteria in a
social network is via targeted crawling. An important challenge in targeted crawling is to …

Hunting organization-targeted socialbots

A Paradise, A Shabtai, R Puzis - Proceedings of the 2015 IEEE/ACM …, 2015 - dl.acm.org
In this paper we perform cost-effectiveness analysis of strategies for monitoring the
organizational social network in order to trap the attacker's profiles. We analyze attack …

Detecting organization-targeted socialbots by monitoring social network profiles

A Paradise, A Shabtai, R Puzis - Networks and Spatial Economics, 2019 - Springer
Advanced attackers use online social networks in order to extract useful information about
targeted organizations, including the names of the organization's members, their …