scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors used supervised machine learning algorithms to detect P2P botnet flow and also used an ensemble learning technique to combine the performances of various machine learning models to make predictions.
Abstract: Peer-to-peer (P2P) botnet is one of the greatest threats to digital data. It has become a common tool for performing a lot of malicious activities such as DDoS attacks, phishing attacks, spreading spam, identity theft, ransomware, extortion attack, and many other fraudulent activities. P2P botnets are very resilient and stealthy and keep mutating to evade security mechanisms. Therefore, it has become necessary to identify and detect botnet flow from the normal flow. This paper uses supervised machine learning algorithms to detect P2P botnet flow. This paper also uses an ensemble learning technique to combine the performances of various supervised machine learning models to make predictions. To validate the results, four performance metrics have been used. These are accuracy, precision, recall, and F1-score. Experimental results show that the proposed approach delivers 99.99% accuracy, 99.81% precision, 99.11% recall, and 99.32% F1 score, which outperform the previous botnet detection approaches.

1 citations

Proceedings ArticleDOI
21 Apr 2022
TL;DR: The anonymous identity authentication scheme based on moving target defense proposed in this paper not only ensures the authenticity and integrity of information sources, but also avoids the disclosure of vehicle identity information in V2X secure communication.
Abstract: As one of the effective methods to enhance traffic safety and improve traffic efficiency, the Internet of vehicles has attracted wide attention from all walks of life. V2X secure communication, as one of the research hotspots of the Internet of vehicles, also has many security and privacy problems. Attackers can use these vulnerabilities to obtain vehicle identity information and location information, and can also attack vehicles through camouflage.Therefore, the identity authentication process in vehicle network communication must be effectively protected. The anonymous identity authentication scheme based on moving target defense proposed in this paper not only ensures the authenticity and integrity of information sources, but also avoids the disclosure of vehicle identity information.

1 citations

Patent
22 Dec 2017
TL;DR: In this paper, a computerized and networked system protects individuals against identity theft without the need to disclose the detailed personal information of the individuals Furthermore, the system helps prevent loss and damage to consumers, financial institutions and merchants caused by financial crimes related to identity theft.
Abstract: A computerized and networked system protects individuals against identity theft without the need to disclose the detailed personal information of the individuals Furthermore, the system helps prevent loss and damage to consumers, financial institutions and merchants caused by financial crimes related to identity theft In addition, users can conduct payments in a secure manner without the need to use any traditional financial instrument A pass code can be generated for each transaction and sent to a user's personal communications device When the correct pass code is received from the user, the transaction is then authorized

1 citations

Journal Article
TL;DR: In this article, the author analyzes the concept of identity theft, lists the main means of ID theft, and describes the hazards of Identity theft in the third part of the article and how to set up identity theft prevention and treatment of the legal system.
Abstract: In this paper,the author analyzes the concept of identity theft,lists the main means of identity theft in the second part of the article.The author describes the hazards of identity theft in the third part of the article and how to set up identity theft prevention and treatment of the legal system in the last part of the article.

1 citations

Journal Article

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112