2022/9/28

Optimizing Targeting of Intrusion Detection Systems in Social Networks

Rami Puzis, Meytal Tubi, Yuval Elovici

Handbook of Social Network Technologies and Applications, 549-568, 2010

Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term “threats”, rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].