Hongyu Gao, Tuo Huang, Jun Hu, Jingnan Wang.  Boyd et al. Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication,

Slides:



Advertisements
Similar presentations
What is MySpace MySpace is a free online community composed of personal profiles aimed foremostly at a younger membership. A MySpace profile typically.
Advertisements

Introducing: What is Social Media Ministry? Social Media Ministry is a collection of believers dedicated to using social media sites.
 For museums online social media has the potential to be more than traditional marketing  Social media is about creating a community with our visitors.
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
Social Networking Websites BENATUIL, Eduardo KIM, Na Hyun WELMOND, Benjamin.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Enabling the Social Web Krishna P. Gummadi Networked Systems Group Max Planck Institute for Software Systems.
1 On Protecting Private Information in Social Networks: A Proposal Bo Luo 1 and Dongwon Lee 2 1 The University of Kansas, 2 The Pennsylvania.
Tagging Systems Austin Wester. Tags A keywords linked to a resource (image, video, web page, blog, etc) by users without using a controlled vocabulary.
Tagging Systems Mustafa Kilavuz. Tags A tag is a keyword added to an internet resource (web page, image, video) by users without relying on a controlled.
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
Web 2.0 Web 2.0 is the term given to describe a second generation of the World Wide Web (WWW) that is focused on the ability for people to collaborate.
Verma - ICISS 2014 R easoning M ining NLP Defense Rakesh M. Verma ReMiND Laboratory Catching Classical and Hijack-based Phishing Attacks.
Creating Online Class Communities Jennifer Dorman Discovery Education
Top 5 Facebook Tips Mark Smith Rosemary Turner. What is Facebook? Users create a personalised profile for themselves and then add people as friends to.
Large-Scale Cost-sensitive Online Social Network Profile Linkage.
By: Aaron Gustafson Owner Computers N’ Stuff.  Facebook is FREE!!!  Youtube is FREE!!!  Twitter is FREE!!!  Google Plus is FREE!!!  Website hosting.
Online Presence for SAIPs What’s Online Presence?
+ The Future of Social Media By Abigail Boghurst.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
REVENUE MANAGEMENT GUIDE © Marin Management, Inc. 1 Online Networking Guide, 1560 Facebook ® A. Introduction to Facebook ® Facebook Facebook ® is a very.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Why Use Social Media for Rotary? Peter Borner The Rotary Club of Towcester.
Social Media How Can This New Technology Possibly Help My Congregation?
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
Authors: Xu Cheng, Haitao Li, Jiangchuan Liu School of Computing Science, Simon Fraser University, British Columbia, Canada. Speaker : 童耀民 MA1G0222.
Knowing Your Facebook From Your Flickr Dan O’ Neill – -
Facebook Strategies That Produce Results October 5, 2011.
DETECTING SPAMMERS AND CONTENT PROMOTERS IN ONLINE VIDEO SOCIAL NETWORKS Fabrício Benevenuto ∗, Tiago Rodrigues, Virgílio Almeida, Jussara Almeida, and.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Understanding and Using Social Media. Attention Overload.
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
Social Media Traffic Building Methods Facebook.com + Twitter.com.
Surveying The Landscape of Threats Facing Users In The Social Web Steve Webb, Ph.D. Emory Guest Lecture April 16, 2009.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
FaceBook…. Really?? FaceBook…. Really?? Social networking & Facebook Pam Krambeck, ESU#3
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
Perspective 2730 Dr. Wing Lee Erinika Taliaferro Cameron Johnson Kyana Johnson Facebook.
Facebook: social networking website Camposarcone – Del Balio - Scarpelli.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
#GoingViral giulia_bonelli, formicablu Using social media to promote research CAGLIARI,
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida Universidade Federal de Minas Gerais Belo Horizonte, Brazil ACSAC 2010 Fabricio.
 Teacher Tube launched on March 6 th Jason Smith, a teacher with 14 years of experience created Teacher Tube.  The purpose of Teacher Tube was.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Social Media & Social Networking 101 Canadian Society of Safety Engineering (CSSE)
Social Networking Utilizing Social Networking for an Educational Purpose.
Types and purposes of online communities. Types of websites within online communities blogs chat rooms forums social networking wikis.
Information Security Awareness
Survey of Social Networking Tools Michelle Pulaski Behling Pace University, Pleasantville.
Meng-Jia Yan Itus: A Generic Feature-based Detection for Facebook Spamming Groups Meng-Jia Yan Presenter: Fu-Hau Hsu National Central University R.O.C.
Welcome.
Gross Niv Analyzing Spammer’s Social Networks for Fun and Profit
Creating your online identity
Uncovering Social Spammers: Social Honeypots + Machine Learning
Social Media Attacks.
Online Social Network: Threats &
Social Media Marketing: A Strategic Approach, 2e
Dieudo Mulamba November 2017
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Presentation transcript:

Hongyu Gao, Tuo Huang, Jun Hu, Jingnan Wang

 Boyd et al. Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, 13(1), article

 Rapid growth of social network sites spawns a new area of network security and privacy issues

 To conduct a comprehensive survey of existing and potential attack behaviors in social network sites  Identify patterns in such attack behaviors  Review existing solutions, measurement as well as defense mechanisms

 Social Engineering attacks  Spamming  Phishing  Social Network vs. Social Network Sites (SNS)  Sybil attack  Social network Account Attack  Hack the social network account using password cracking.  Malware attack  Social Network sites as vectors of malware propagation

 SNS as vectors for conventional spamming  Messages, Wallposts, Comments, …  Detection and measurements

 Message spam and comment spam are similar with traditional spam.In my space there is new form of spam –deceptive profile spam.  This kind of spammer uses sexy photo and seductive story in about me section to attract visitors.

Figure 1: An example of a deceptive spam profile

 Social honeypots can be seen as a kind of active detection of social network spam.  The author constructed 51 honeypot profiles and associated them with distinct geographic location in Myspace to collect the deceptive spam profiles.  For the num of their honeypots is small,so the dataset they collected is very limited.

 This paper is a comprehensive behavior- based detection and it can be cataloged into passive dectection compared with “Social Honeypots”.

 The author manually select a test collection of real YouTube users, classifying them as spammers, promoters, and legitimates. Using this collection,they provided a characterization of social and content attributes that help distinguish each user class.They used a state-of-the-art supervised classification algorithm to detect spammers and promoters, and assess its effectiveness in their test collection.

 They considered three attribute sets, namely, video attributes, user attributes, and social network (SN) attributes.

 They characterize each video by its duration, numbers of views and of commentaries received, ratings, number of times the video was selected as favorite, as well as numbers of honors and of external links

 They select the following 10 user attributes: number of friends, number of videos Uploaded, number of videos watched, number of videos added as favorite, numbers of video responses posted and received, numbers of subscriptions and subscribers, average time between video uploads, and maximum number of videos uploaded in 24 hours.

 Social network (SN) attributes: clustering coefficient, betweenness,reciprocity, assortativity, and UserRank.

 For it is passive detection,it need pre- knowledge and another drawback is that using supervised learning algorithm may require large dataset for learning, otherwise the result will not be accurate.

 Characteristics  No specific recipient  Using SNS as free advertisement site  Can completely undermine the service of the website especially if launched as Sybil attacks  Detection Metrics  TagSpam  TagBlur  DomFp  NumAds  ValidLink

 A general form of attack to reputation systems  Large amount of fake identities “outvote” honest identities  Can be used to thwart the intended purpose of certain SNSes

 Sybil Nodes have small “Quotient Cuts”  Inherent social networks do not  Possible to encircle the Sybil nodes

The most notorious worm in social network is the koobface. According to Trend Micro, the attack from koobface as follows: Step 1: Registering a Facebook account. Step 2:Confirming an address in Gmail to activate the registered account. Step 3: Joining random Facebook groups. Step 4: Adding “friends” and posting messages on their walls.

 There are worms and other threats that have plagued social networking sites. E.g. Grey Goo targeting at Second Life, JS/SpaceFlash targeting at MySpace,Kut Wormer targeting at Orkut, Secret Crush targeting at Facebook, etc.

 Until now there are few papers on detecting these attacks.

 Hack the social network account using password cracking In February,2009, the Twitter account of Miley Cyrus was hijacked too and someone posted some offensive messages