publication . Part of book or chapter of book . Conference object . 2015

Quit Playing Games with My Heart: Understanding Online Dating Scams

Huang, J. M.; Stringhini, G.; Yong, P.;
Open Access
  • Published: 01 Jan 2015
  • Publisher: Springer International Publishing
  • Country: United Kingdom
© Springer International Publishing Switzerland 2015. Online dating sites are experiencing a rise in popularity, with one in five relationships in the United States starting on one of these sites. Online dating sites provide a valuable platform not only for single people trying to meet a life partner, but also for cybercriminals, who see in people looking for love easy victims for scams. Such scams span from schemes similar to traditional advertisement of illicit services or goods (i.e., spam) to advanced schemes, in which the victim starts a long-distance relationship with the scammer and is eventually extorted money. In this paper we perform the first large-sc...
free text keywords: Life partner, Threat model, Popularity, Countermeasure, Single people, World Wide Web, Internet privacy, business.industry, business, Demographics, Computer science
Download fromView all 2 versions
Part of book or chapter of book
Provider: UnpayWall
UCL Discovery
Conference object . 2015
Part of book or chapter of book
Provider: Crossref
24 references, page 1 of 2

1. eHarmony., 2013.

2. OkCupid., 2013.

3. Online dating sites pricing. compare.php, 2013.

4. Online Dating Statistics., 2013.

5. AFROZ, S., BRENNAN, M., AND GREENSTADT, R. Detecting hoaxes, frauds, and deception in writing style online. In IEEE Symposium on Security and Privacy (2012). [OpenAIRE]

6. BALTAZAR, J., COSTOYA, J., AND FLORES, R. KOOBFACE: The Largest Web 2.0 Botnet Explained. In Trend Micro Threat Research (2009).

7. BENEVENUTO, F., MAGNO, G., RODRIGUES, T., AND ALMEIDA, V. Detecting Spammers on Twitter. In Conference on Email and Anti-Spam (CEAS) (2010).

8. CAI, Z., AND JERMAINE, C. The Latent Community Model for Detecting Sybils in Social Networks. In Symposium on Network and Distributed System Security (NDSS) (2012).

9. CAO, Y., YEGNESWARAN, V., POSSAS, P., AND CHEN, Y. PathCutter: Severing the SelfPropagation Path of XSS Javascript Worms in Social Web Networks. In Symposium on Network and Distributed System Security (NDSS) (2012).

10. CHEN, L., AND NAYAK, R. Social network analysis of an online dating network. In Proceedings of the 5th International Conference on Communities and Technologies (2011).

11. DRUCKER, H., WU, D., AND VAPNIK, V. N. Support vector machines for spam categorization. In IEEE transactions on neural networks (1999).

12. DYRUD, M. A. “I brought you a good news”: An analysis of nigerian 419 letters. In Association for Business Communication Annual Convention (2005).

13. EGELE, M., STRINGHINI, G., KRUEGEL, C., AND VIGNA, G. Compa: Detecting compromised accounts on social networks. In Symposium on Network and Distributed System Security (NDSS) (2013).

14. FIORE, A., AND TRESOLINI, R. Romantic regressions: An analysis of behavior in online dating systems. PhD thesis, Massachusetts Institute of Technology, 2004.

15. GAO, H., CHEN, Y., LEE, K., PALSETIA, D., AND CHOUDHARY, A. Towards Online Spam Filtering in Social Networks. In Symposium on Network and Distributed System Security (NDSS) (2012).

24 references, page 1 of 2
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue