Logo des Repositoriums
 

Real or Fake? Large-Scale Validation of Identity Leaks

dc.contributor.authorMaschler, Fabian
dc.contributor.authorNiephaus, Fabio
dc.contributor.authorRisch, Julian
dc.contributor.editorEibl, Maximilian
dc.contributor.editorGaedke, Martin
dc.date.accessioned2017-08-28T23:48:03Z
dc.date.available2017-08-28T23:48:03Z
dc.date.issued2017
dc.description.abstractOn the Internet, criminal hackers frequently leak identity data on a massive scale. Subsequent criminal activities, such as identity theft and misuse, put Internet users at risk. Leak checker services enable users to check whether their personal data has been made public. However, automatic crawling and identification of leak data is error-prone for different reasons. Based on a dataset of more than 180 million leaked identity records, we propose a software system that identifies and validates identity leaks to improve leak checker services. Furthermore, we present a proficient assessment of leak data quality and typical characteristics that distinguish valid and invalid leaks.en
dc.identifier.doi10.18420/in2017_248
dc.identifier.isbn978-3-88579-669-5
dc.identifier.pissn1617-5468
dc.language.isoen
dc.publisherGesellschaft für Informatik, Bonn
dc.relation.ispartofINFORMATIK 2017
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-275
dc.subjectData quality
dc.subjectData profiling
dc.subjectLeak validation
dc.subjectIdentity leaks
dc.titleReal or Fake? Large-Scale Validation of Identity Leaksen
gi.citation.endPage2448
gi.citation.startPage2437
gi.conference.date25.-29. September 2017
gi.conference.locationChemnitz
gi.conference.sessiontitleStudierendenkonferenz Informatik 2017 (SKILL 2017)

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
E1-5.pdf
Größe:
342.58 KB
Format:
Adobe Portable Document Format