SECURITY ISSUES IN SOCIAL NETWORKING SITES. M OTIVATION : DDOS attack in network and transport layer has been in discussion a lot but not much in application.

Slides:



Advertisements
Similar presentations
The Threat Landscape Jan Threat Report 2.
Advertisements

Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Web 2.0 security Kushal Karanjkar Under guidance of Prof. Richard Sinn.
Web server security Dr Jim Briggs WEBP security1.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Website Hardening HUIT IT Security | Sep
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
BotNet Detection Techniques By Shreyas Sali
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
Computer & Network Security
Filtering in Firewall By Fantastic 5. Agenda What is Firewall? Types Of Firewall Pros and Cons Of Different Firewalls What Firewall can do? What Firewall.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content Michael Robertson, Yin Pan, and Bo Yuan Department of Networking,
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Polymorphic Worm Detection by Instruction Distribution Kihun Lee HPC Lab., Postech.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Computer Security By Duncan Hall.
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure Paper By : V.T.Lam, S.Antonatos, P.Akritidis, K.G.Anagnostakis Conference : ACM.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
WEB BASED MONITORING AND CONTROLING OF INDUSTRIAL PROCESSES PRESENTED BY: Bhagyawant (3AE07EC018) Kushal (3AE07EC032) Mahantesh (3AE07EC034) Mallinath.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
How To Remove Flooders?-Get Help Website:
E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre.
BUILD SECURE PRODUCTS AND SERVICES
Introduction and implementation OWASP Risk Rating Management
A Virtual Tour of SophosLabs Building next-generation protection
Cyber Security Zafar Sadik
Cybersecurity - What’s Next? June 2017
Cloud Firewall.
Critical Security Controls
EITAC Cybersecurity program and IT Security updates
Data Center Firewall.
Network Security Analysis Name : Waleed Al-Rumaih ID :
Real-time protection for web sites and web apps against ATTACKS
Speaker : YUN–KUAN,CHANG Date : 2009/11/17
“Can You See Me Now?” Shining the Light On Hackers & Identity Thieves
Security Engineering.
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou, and David Evans 23rd USENIX Security Symposium, August,
Who should be responsible for risks to basic Internet infrastructure?
Xixu Fu,Kai jun Wu,XiZhang Gong
Myths About Web Application Security That You Need To Ignore.
Risk of the Internet At Home
AKAMAI INTELLIGENT PLATFORM™
Reconnaissance Report Trillium Technologies
Detecting Targeted Attacks Using Shadow Honeypots
Azure Cloud Solution Enables a More Powerful, Robust Multilayer Security for Client Web Assets “Microsoft Azure’s cloud technologies allow us to provide.
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Protect Your Ecommerce Site From Hacking and Fraud
Cyber security and Computer Misuse
Threat Landscape Update
INTERNET SECURITY.
Presentation transcript:

SECURITY ISSUES IN SOCIAL NETWORKING SITES

M OTIVATION : DDOS attack in network and transport layer has been in discussion a lot but not much in application layer. This attack is simple but very difficult in tracking down the parties involved. Preventing this attack we can save users valuable time. Generally DDOS attacks are performed in the government websites so that anti government can be in profit. Security risks. Reputation and crediblity risks.

INTRODUCTION OF WORK: Social networking Antisocial Networks DDOS attack Botnets Puppetnets

LITERATURE REVIEW: AuthorYearRemarks V. T. Lam, S. Antonatos, P. Akritidis, and K. G. Anagnostakis. August 2006Puppetnets: Misusing web browsers as a distributed attack infrastructure Erwin Louis Carrow 2007Puppetnets and Botnets: Information TechnologyVulnerabi lity Exploits that Threaten Basic Internet Use V. T. Lam, S. Antonatos, P. Akritidis, and K. G. Anagnostakis. September 2008Antisocial Networks: Turning a Social Network into a Botnet

LITERATURE REVIEW: AuthorYearRemarks Michael Robertson, Yin Pan, and Bo Yuan B. Thomas Golisano November 2010A Social Approach to Security: Using SN to Help DetectMalicious Web Content Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang and Yan Chen 2011Security Issues in Social Networks Gail-Joon Ahn, MoAnnaSquicciarini hamed Shehab 2011Security and Privacy in Social Networks Sanjay B Ankali, Dr. D V Ashoka Volume: 03, Issue: 01, Pages: (2011) Detection Architecture of Application Layer DDoS Attack for Internet

PROBLEM DEFINATION & OBJECTIVE Study of DDOS attack on Facebook and its detection by using the concept of botspy.

M ETHODOLOGY : ATTACKS Security plans Theoretical Framework Analysis Literature Review Result Analysis Simulation Modeling Conclusion Inclusion Of Security Plans

GANTT CHART: Literature review Objective And Motivation Theoretical Framework analysis Methodology Security plan Simulation and Modelling Result and Conclusion Report Writing

FUTURE WORK: Defence against DDOS attack Tracking botnets i.e to observe botnets Gather some data about the existing botnets.

DELIVERABLE & CONCLUSION Security of Social networking sites from attacks like DDOS attack. Security of users from being involved in malicious activities unknowingly Availability of network resources and avoid interrupt network service for a long period of time. Security for those who suffers from revenue loss due to these attacks. Good business reputation and less operational expenses. to detect traffic anomalies and filter out only the attack traffic while maintaining the uninterrupted flow of legitimate traffic.

REFERENCES: A. T. Williams and J. Heiser. Protect your PCs and Servers From the Bothet Threat. December V. T. Lam, S. Antonatos, P. Akritidis, and K. G. Anagnostakis. Puppetnets: Misusing web browsers as a distributed attack infrastructure.August 2006 Erwin Louis Carrow, Puppetnets and Botnets: Information Technology Vulnerability Exploits that Threaten Basic Internet Use, conference 07 E. Athanasopoulos1, A. Makridakis, S.Antonatos, D. Antoniades. Antisocial Networks: Turning a Social Network into a Botnet. September 2008 Hacking Social Networks. L.Greinier.April 2009

REFERENCES: A Social Approach to Security: Using SN to Help DetectMalicious Web Content. Michael Robertson, Yin Pan, and Bo Yuan B. Thomas Golisano Nov Security Issues in Social Networks. Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang and Yan Chen. IEEE conference Security and Privacy in Social Networks. Gail-Joon Ahn, MoAnnaSquicciarinihamed Shehab IEEE conference Detection Architecture of Application Layer DDoS Attack for Internet, Sanjay B Ankali, Dr. D V Ashoka, Int. J. Advanced Networking and Applications Volume: 03, Issue: 01, Pages: (2011)

THANK YOU

QUESTIONS.....??