How naïve are people on Internet Final, June 1st.

Slides:



Advertisements
Similar presentations
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Advertisements

ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
CMU has been said to be the “most wired campus in the US” for two years in a row. What kind of impact does such a infrastructure has on the daily academic.
Breaking Trust On The Internet
INTERNET INFORMATION ACCESS How to avoid and eliminate common problems confronting usage of modern resources to access the Internet.
ABUSING BROWSER ADDRESS BAR FOR FUN AND PROFIT - AN EMPIRICAL INVESTIGATION OF ADD-ON CROSS SITE SCRIPTING ATTACKS Presenter: Jialong Zhang.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Students’ online profiles for employability and community Frances Chetwynd, Karen Kear, Helen Jefferis and John Woodthorpe The Open University.
Social Media: FACEBOOK Kristin Martin Professional Development.
Using “Account-free” Services to Combat Phishing, Brand Infringement, and Other Online Threats Qi-fense LLC © 2009 Sebastian Holst
Yusuf Simonson Title Suggesting Friends Using the Implicit Social Graph.
People in Design Damian Gordon. People in Design Why do we care about people in design? – Because we build software systems for other people, so we have.
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
Making friends on Facebook Isaac, Rahul, Alex and Kai.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Company LOGO B2C E-commerce Web Site Quality: an Empirical Examination (Cao, et al) Article overview presented by: Karen Bray Emilie Martin Trung (John)
CitiManager Cardholder Self- Registration
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Oracle Method | Group Delivery Together. Free your energies New Supplier Registration.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
MAKE STUDY ISLAND WORK FOR YOU… INSTEAD OF YOU WORKING ON STUDY ISLAND. Mrs. Irish Dyer, TXVA 7 th & 8 th Grade Homeroom / 7 th grade Science Teacher.
Challenges of Lender List Creation Objective, analytical lender selections Documenting & defending your lender selections Collecting & administering lender.
Introduction to Research Methodology
REVENUE MANAGEMENT GUIDE © Marin Management, Inc. 1 Online Networking Guide, 1560 Facebook ® A. Introduction to Facebook ® Facebook Facebook ® is a very.
Planned Giving Design Center. What is the Planned Giving Design Center? National network of websites dedicated to advancing philanthropy.
BRIDGE COURSE of INFORMATION & COMMUNICATION TECHNOLOGY
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
Welcome To Follow along with the Demonstrations go to
Using Transactional Information to Predict Link Strength in Online Social Networks Indika Kahanda and Jennifer Neville Purdue University.
Encryption Cisco Ironport using Click here to begin Press the ‘F5’ Key to Begin.
Mark Phillip markphillip.com The New Facebook: More than just a redesign.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
NTU Natural Language Processing Lab. 1 Investment and Attention in the Weblog Community Advisor: Hsin-Hsi Chen Speaker: Sheng-Chung Yen.
Getting Started Copyright 2010 Peoplemovers.com, All rights reserved.
Leveraging Asset Reputation Systems to Detect and Prevent Fraud and Abuse at LinkedIn Jenelle Bray Staff Data Scientist Strata + Hadoop World New York,
REVISITING DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS Mansour Alsaleh,Mohammad Mannan and P.C van Oorschot.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
EDTECH Module 7 Technology Survey by J.D. Winterhalter.
FaceBook…. Really?? FaceBook…. Really?? Social networking & Facebook Pam Krambeck, ESU#3
By The Supreme Team CMPT 275 Assignment 2 May 29, 2009.
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Connect with Heather How many members does your church have?
With OVER 750 Million ACTIVE users it’s NO LONGER a question of ‘IF’ a business should have a Facebook Business Page (FanPage) Discover How QuarterMoonPlumbing.com.
QuickSuite VIP-QuickSuite: A Collection of tools designed to adjust to solve your company needs.
How to Select and Use Privacy Settings EL Civics Assessment Task 3.
2005 Electronic Messaging Opportunities IT and Security Services Department 22 February 2005.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Using Document Collaboration, Integration, and Charting Tools
Schools-On-I-Net and Google Apps for Education. Good-bye Yellow, Hello Blue Effective July 1, 2008.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Social Media & Social Networking 101 Canadian Society of Safety Engineering (CSSE)
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
>>0 >>1 >> 2 >> 3 >> 4 >> Privacy and SNS in China Comundus-European Master of Arts in Media, Communication and Cultural Study Jin PENG the case of xiaonei.com.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Social Media Smarts. Yep! That’s Me! I have had a cell phone since 5 th Grade I just got a cell phone this year I wish I had a cell phone I have an IPAD.
First year HE students´ social media skills Sakari Saukkonen and Jaana Kettunen Institute for Educational Research University of Jyväskylä, Finland.
Knowledge Hub Walkthrough August
Project Management: Messages
Rocketmail RocketMail RocketMail is the fast and clean . RocketMail is a kind of free webmail services RocketMail is a product of Four11 corporation.
CitiManager Cardholder Self- Registration
Yahoo Users Face Various Issues. Yahoo Account Login Issue Call Toll Free:
1. 4 BECOME A PAGE ADMINISTRATOR
Communication between meetings: the use of CIRCA
How to manage your s Tips and tricks.
How to manage your s Tips and tricks.
Presentation transcript:

How naïve are people on Internet Final, June 1st

Motivation All kinds of social media on Internet are glue connecting people in a virtual community. People awareness/ alertness on these social media have not been extensively studied. How people accept new friends in Facebook? How many people are trapped by spamming/ phishing? What the differences if these attacks are performed on different media? ……

Objective and Methodology Questions to answer: Can we quantify people’s behaviors on these social media, how naïve are they? Can we rank these media according to people’s alertness on them? High level methodology: Vertical: focus on each of these media individually and quantify the extent to which people’s awareness on them. For example, x% of people will be likely to accept you though they do not know you at all on Facebook. Horizontal: put these media together, and differentiate them. For instance, are people more careful about their communication than Facebook requests or IM?

Step 1, Facebook (Vertical) System Framework An automated facebook friending system, including, Automated user IDs crawler Automated friends requester Based on these tools, our experiment flowchart is,

Step 1, (cont.) Reverse engineering of facebook counter-measures Account creation: cell-phone validation or an authorized Sensitive to IP address: one logon per account at any time Rate limiting of Friend Requests ……

Step 1, (cont.) Experiment setting Sending requests to a random sample of 400 people each time. Mid-term results We got 40 and 35 in the first 3 days, and we get 100 friend acceptance for both profiles after a week. (95% confidence, no differences) Final-term results (20 days later) Can you guess what are the results? (A) >150 (B) >200 (C) >250 (D) >300 (E) >350 The answer is 393, are you surprising?

Step 1, (cont.) Max = 393 (98.25%), Min = 179 (44.75%), Mean = 318 (80%) These who have accept us usually have more friends in their list, (they are friendly) These who have not accepted us usually have less friends in the list, (Maybe they login Facebook rarely, or they are not friendly.) Some people have few friends, but also have accepted us, maybe b/c we have common friends. Requests from others Groups invitation Mafia wars requests Birthday requests …… Seems that requests have a correlation with the number of friends in one’s profiles.

Step 1, (cont.) Another interesting observation: In mid-term summary, we reported that well- created profiles receive less acceptance. Now, this is further confirmed Two well-created ones receive 101 and 200 acceptances during a months. (Male 101, Female 200) Ten other roughly-created ones receive 318 acceptances in average. WHY this is the case???

Following work Spamming/Phishing on s (Vertical) Comparison b/w different providers, such as Gmail, Yahoo, hotmail, institution/enterprise mail systems, and so on. Comparison b/w different contents. Requests on IM, and spam on IM (Vertical) Will people add you on IM friend list easily? Comparison b/w different contents for spamming/phishing. Any suggestion to include other media?

Following work (cont.) Do people differentiate these media? (horizontal study) For instance, it is likely that people may trust the more than the message from IM. Challenging: how to make the measurement work on this point be convincing? Empirical results of comparison between different populations of different media may not be considered representative. Statistically, do the experiments multiple time, and calculate the CI. Exploring a thread that can combine these different media together, i.e., finding a sample of people that have account on each of these media, and focus on these people.

Please give your comments Thanks!