An Approach to Identity Theft Detection Using Social Network Analysis

The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenges in security research. The main idea about method of iden...

Full description

Saved in:
Bibliographic Details
Published in2009 First Asian Conference on Intelligent Information and Database Systems : 1-3 April 2009 pp. 78 - 81
Main Author Kolaczek, G.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.04.2009
Subjects
Online AccessGet full text
ISBN0769535801
9780769535807
DOI10.1109/ACIIDS.2009.44

Cover

Abstract The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenges in security research. The main idea about method of identity theft detection described in the paper is that identity theft events are related to change of the subject's behavior as the node of the social network (or several different networks). In consequence identity theft may be detected similarly as the other types of malicious activities by analyzing the change of observed behavior patterns.
AbstractList The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenges in security research. The main idea about method of identity theft detection described in the paper is that identity theft events are related to change of the subject's behavior as the node of the social network (or several different networks). In consequence identity theft may be detected similarly as the other types of malicious activities by analyzing the change of observed behavior patterns.
Author Kolaczek, G.
Author_xml – sequence: 1
  givenname: G.
  surname: Kolaczek
  fullname: Kolaczek, G.
  organization: Inst. of Inf., Wroclaw Univ. of Technol., Wroclaw, Poland
BookMark eNotzr1OwzAUQGFLgAQtXVlY_AIJ1_FfPUZpgUgVDG3nynFvqCHYUWIJ5e2JBNPZPp0FuQ4xICEPDHLGwDyVVV1v9nkBYHIhrsgCtDKSyzWwW7Iax08AYEbpotB3ZFsGWvb9EK270BRpfcaQfJro4YJtohtM6JKPgR5HHz7oPjpvO_qG6ScOX7QMtptGP96Tm9Z2I67-uyTH5-2hes127y91Ve4yz7RMGZrCoTPQ4PxzdqwF1SgLjZWIIEXRqMJKUEY4rdfzpNKuEVwLZJbblku-JI9_rkfEUz_4bztMJznjRjP-C3pzSho
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ACIIDS.2009.44
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore : IEEE Electronic Library (IEL) [unlimited simultaenous users]
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Business
EndPage 81
ExternalDocumentID 5175971
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i175t-e92cec90be953dc1f06b6a0ba5ee0542b62a50694c77800167cb4374e1a3af353
IEDL.DBID RIE
ISBN 0769535801
9780769535807
IngestDate Wed Aug 27 02:14:48 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-e92cec90be953dc1f06b6a0ba5ee0542b62a50694c77800167cb4374e1a3af353
PageCount 4
ParticipantIDs ieee_primary_5175971
PublicationCentury 2000
PublicationDate 2009-April
PublicationDateYYYYMMDD 2009-04-01
PublicationDate_xml – month: 04
  year: 2009
  text: 2009-April
PublicationDecade 2000
PublicationTitle 2009 First Asian Conference on Intelligent Information and Database Systems : 1-3 April 2009
PublicationTitleAbbrev ACIIDS
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001967227
Score 1.4285145
Snippet The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of...
SourceID ieee
SourceType Publisher
StartPage 78
SubjectTerms Business
computer network security
Costs
Database systems
Deductive databases
Event detection
identity theft
Information analysis
Intelligent networks
Pattern analysis
Protection
social network analysis
Social network services
Title An Approach to Identity Theft Detection Using Social Network Analysis
URI https://ieeexplore.ieee.org/document/5175971
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEB1qD6IXta34TQ4e3Xa_kjTHUltaoUXQQm8lyc6CCFuR9KC_3mSz26p48JbkNEwCb5J57wXg1kJG5hypA07zMEizKAlEFtuzrBRFyV3R6oTCszmbLNKHJV024G6rhUHEknyGXTcse_nZWm_cU1mPWqwTTjC-x_vMa7V27ymC8Tjm_mYuqOvuRZXBTj3nlWljFIreYDid3j95v8o0_fG1Soks4yOY1TF5Qslrd2NUV3_-smv8b9DH0Nlp-MjjFp1OoIFFC_ZrnnsLDr85EbZhNCjIoLIXJ2ZNKv3uB7HHKDfkHk1J2SpISTEgXtRL5p5DTmpnkw4sxqPn4SSoflgIXmxUJkARa9QiVGgzlOkoD5liMlSSItpaLlYsltRJYzW3eXSKBa3ShKcYyUTmCU1OoVmsCzwDwqSylzGpEiWEc623dWcubTGc2aU-j_NzaLvcrN68icaqSsvF38uXcFC3bcLoCprmfYPXFv2Nuim3_QvY7aoH
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5KBR8Xta34NgePbruPZGOOpQ9abYtgC72VZHcWRNgVSQ_660320ap48JbkNAwD8yXzfV8Abk3LiK0jtcNZ4jo09gJHxL6pZaUYSm5BqxUKT2fhaEEflmxZg7uNFgYRc_IZtu0yn-XHWbS2T2UdZnqdsILxHUYpZYVaa_uiIkLu-7y4mwtm53teabFT7Xlp2-i5otPtjcf958KxktIfn6vkvWV4CNMqqoJS8tpea9WOPn8ZNv437CNobVV85GnTn46hhmkDdiumewMOvnkRNmHQTUm3NBgnOiOlgveDmEJKNOmjzklbKclJBqSQ9ZJZwSInlbdJCxbDwbw3cso_FpwXE5V2UPgRRsJVaDIUR17ihiqUrpIM0aA5X4W-ZFYcG3GTR6tZiBQNOEVPBjIJWHAC9TRL8RRIKJW5jkkVKCGsb71Bnok0cDg2R_fcT86gaXOzeitsNFZlWs7_Pr6BvdF8OllNxrPHC9ivhjiudwl1_b7GK4MFtLrOS-AL9KStVA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+First+Asian+Conference+on+Intelligent+Information+and+Database+Systems+%3A+1-3+April+2009&rft.atitle=An+Approach+to+Identity+Theft+Detection+Using+Social+Network+Analysis&rft.au=Kolaczek%2C+G.&rft.date=2009-04-01&rft.pub=IEEE&rft.isbn=9780769535807&rft.spage=78&rft.epage=81&rft_id=info:doi/10.1109%2FACIIDS.2009.44&rft.externalDocID=5175971
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769535807/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769535807/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769535807/sc.gif&client=summon&freeimage=true