An Approach to Identity Theft Detection Using Social Network Analysis
The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenges in security research. The main idea about method of iden...
        Saved in:
      
    
          | Published in | 2009 First Asian Conference on Intelligent Information and Database Systems : 1-3 April 2009 pp. 78 - 81 | 
|---|---|
| Main Author | |
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        01.04.2009
     | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 0769535801 9780769535807  | 
| DOI | 10.1109/ACIIDS.2009.44 | 
Cover
| Abstract | The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenges in security research. The main idea about method of identity theft detection described in the paper is that identity theft events are related to change of the subject's behavior as the node of the social network (or several different networks). In consequence identity theft may be detected similarly as the other types of malicious activities by analyzing the change of observed behavior patterns. | 
    
|---|---|
| AbstractList | The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenges in security research. The main idea about method of identity theft detection described in the paper is that identity theft events are related to change of the subject's behavior as the node of the social network (or several different networks). In consequence identity theft may be detected similarly as the other types of malicious activities by analyzing the change of observed behavior patterns. | 
    
| Author | Kolaczek, G. | 
    
| Author_xml | – sequence: 1 givenname: G. surname: Kolaczek fullname: Kolaczek, G. organization: Inst. of Inf., Wroclaw Univ. of Technol., Wroclaw, Poland  | 
    
| BookMark | eNotzr1OwzAUQGFLgAQtXVlY_AIJ1_FfPUZpgUgVDG3nynFvqCHYUWIJ5e2JBNPZPp0FuQ4xICEPDHLGwDyVVV1v9nkBYHIhrsgCtDKSyzWwW7Iax08AYEbpotB3ZFsGWvb9EK270BRpfcaQfJro4YJtohtM6JKPgR5HHz7oPjpvO_qG6ScOX7QMtptGP96Tm9Z2I67-uyTH5-2hes127y91Ve4yz7RMGZrCoTPQ4PxzdqwF1SgLjZWIIEXRqMJKUEY4rdfzpNKuEVwLZJbblku-JI9_rkfEUz_4bztMJznjRjP-C3pzSho | 
    
| ContentType | Conference Proceeding | 
    
| DBID | 6IE 6IL CBEJK RIE RIL  | 
    
| DOI | 10.1109/ACIIDS.2009.44 | 
    
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore : IEEE Electronic Library (IEL) [unlimited simultaenous users] IEEE Proceedings Order Plans (POP All) 1998-Present  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering Business  | 
    
| EndPage | 81 | 
    
| ExternalDocumentID | 5175971 | 
    
| Genre | orig-research | 
    
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIB RIC RIE RIL  | 
    
| ID | FETCH-LOGICAL-i175t-e92cec90be953dc1f06b6a0ba5ee0542b62a50694c77800167cb4374e1a3af353 | 
    
| IEDL.DBID | RIE | 
    
| ISBN | 0769535801 9780769535807  | 
    
| IngestDate | Wed Aug 27 02:14:48 EDT 2025 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i175t-e92cec90be953dc1f06b6a0ba5ee0542b62a50694c77800167cb4374e1a3af353 | 
    
| PageCount | 4 | 
    
| ParticipantIDs | ieee_primary_5175971 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2009-April | 
    
| PublicationDateYYYYMMDD | 2009-04-01 | 
    
| PublicationDate_xml | – month: 04 year: 2009 text: 2009-April  | 
    
| PublicationDecade | 2000 | 
    
| PublicationTitle | 2009 First Asian Conference on Intelligent Information and Database Systems : 1-3 April 2009 | 
    
| PublicationTitleAbbrev | ACIIDS | 
    
| PublicationYear | 2009 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| SSID | ssj0001967227 | 
    
| Score | 1.4285145 | 
    
| Snippet | The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of... | 
    
| SourceID | ieee | 
    
| SourceType | Publisher | 
    
| StartPage | 78 | 
    
| SubjectTerms | Business computer network security Costs Database systems Deductive databases Event detection identity theft Information analysis Intelligent networks Pattern analysis Protection social network analysis Social network services  | 
    
| Title | An Approach to Identity Theft Detection Using Social Network Analysis | 
    
| URI | https://ieeexplore.ieee.org/document/5175971 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEB1qD6IXta34TQ4e3Xa_kjTHUltaoUXQQm8lyc6CCFuR9KC_3mSz26p48JbkNEwCb5J57wXg1kJG5hypA07zMEizKAlEFtuzrBRFyV3R6oTCszmbLNKHJV024G6rhUHEknyGXTcse_nZWm_cU1mPWqwTTjC-x_vMa7V27ymC8Tjm_mYuqOvuRZXBTj3nlWljFIreYDid3j95v8o0_fG1Soks4yOY1TF5Qslrd2NUV3_-smv8b9DH0Nlp-MjjFp1OoIFFC_ZrnnsLDr85EbZhNCjIoLIXJ2ZNKv3uB7HHKDfkHk1J2SpISTEgXtRL5p5DTmpnkw4sxqPn4SSoflgIXmxUJkARa9QiVGgzlOkoD5liMlSSItpaLlYsltRJYzW3eXSKBa3ShKcYyUTmCU1OoVmsCzwDwqSylzGpEiWEc623dWcubTGc2aU-j_NzaLvcrN68icaqSsvF38uXcFC3bcLoCprmfYPXFv2Nuim3_QvY7aoH | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5KBR8Xta34NgePbruPZGOOpQ9abYtgC72VZHcWRNgVSQ_660320ap48JbkNAwD8yXzfV8Abk3LiK0jtcNZ4jo09gJHxL6pZaUYSm5BqxUKT2fhaEEflmxZg7uNFgYRc_IZtu0yn-XHWbS2T2UdZnqdsILxHUYpZYVaa_uiIkLu-7y4mwtm53teabFT7Xlp2-i5otPtjcf958KxktIfn6vkvWV4CNMqqoJS8tpea9WOPn8ZNv437CNobVV85GnTn46hhmkDdiumewMOvnkRNmHQTUm3NBgnOiOlgveDmEJKNOmjzklbKclJBqSQ9ZJZwSInlbdJCxbDwbw3cso_FpwXE5V2UPgRRsJVaDIUR17ihiqUrpIM0aA5X4W-ZFYcG3GTR6tZiBQNOEVPBjIJWHAC9TRL8RRIKJW5jkkVKCGsb71Bnok0cDg2R_fcT86gaXOzeitsNFZlWs7_Pr6BvdF8OllNxrPHC9ivhjiudwl1_b7GK4MFtLrOS-AL9KStVA | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+First+Asian+Conference+on+Intelligent+Information+and+Database+Systems+%3A+1-3+April+2009&rft.atitle=An+Approach+to+Identity+Theft+Detection+Using+Social+Network+Analysis&rft.au=Kolaczek%2C+G.&rft.date=2009-04-01&rft.pub=IEEE&rft.isbn=9780769535807&rft.spage=78&rft.epage=81&rft_id=info:doi/10.1109%2FACIIDS.2009.44&rft.externalDocID=5175971 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769535807/lc.gif&client=summon&freeimage=true | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769535807/mc.gif&client=summon&freeimage=true | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769535807/sc.gif&client=summon&freeimage=true |