The Socio-monetary Incentives of Online Social Network Malware Campaigns Ting-Kai Huang (Google) Bruno Ribeiro (Carnegie Mellon University) Harsha M. Madhyastha.

Slides:



Advertisements
Similar presentations
 A significant 90% of marketers indicate that social media is important for their business  Video marketing on the rise: A significant 77% of marketers.
Advertisements

Keeping Your Child Safe on the Internet
The Role of Twitter in YouTube Videos Diffusion George Christodoulou EPFL Switzerland Laboratory for Internet Computing Department of Computer Science.
Are You Smarter Than a 5 th Grader? 1,000,000 Blog Online Search Kindle? Documents? Backup Virus click here! Downloading Music Expiration Date?
Efficient Control of Epidemics over Random Networks Marc Lelarge (INRIA-ENS) SIGMETRICS 09.
Explain the social impacts of the use of IT.. Social Social networking has made the world Bigger and easier to communicate with others. It allows friends,
Social Media Marketing How to make it successful?.
Anthony Bonomi, Amber Heeg, Elizabeth Newton, Bianca Robinson & Marzi Shabani.
CS 599: Social Media Analysis University of Southern California1 Information Diffusion Kristina Lerman University of Southern California.
Jennifer Ford.  Blog – A type of website or online journal that allows you to publish articles and updates that visitors.
+ Beginning Blogging by Six Sisters’ Stuff. + Just start! What do you want to blog about? What are you an expert in? What makes you unique? What are you.
Konstantin Avrachenkov (INRIA) Prithwish Basu (BBN) Giovanni Neglia (INRIA) Bruno Ribeiro (CMU) Don Towsley (UMass Amherst) 1 K. Avrachenkov, P. Basu,
Artur Strzelecki.  10 teams  10 non-profit organizations  6 students per team  2 weeks of developing campaigns  ~50€
Establishing Successful Business Online Alexei Kouleshov.
“Consistency is Key!” A Quick Guide to Online Marketing By Virtual Marketing Empire, LLC
Created by Amber Craddock, Kylee Stone & Caleb Truette.
How to Expand Your School’s Online Reach using Facebook, Blogs and Twitter.
 The Shift Towards Digital Branding By Zahra Karim.
 Facebook  Youtube  Twitter  Google +  Pinterest.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
IL SOS Online Safety Think Before You Click!. STOP.
Looking Professional Online. Privacy Measures Facebook allows users to filter visible content Create a second profile for professional use Make personal.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Restaurants & Mobile Why Your Restaurant Needs A Mobile Experience.
Introduction Position your online or offline business Quickly and safely grow a huge army of potential clients Productively interact with your new and.
Authors: Xu Cheng, Haitao Li, Jiangchuan Liu School of Computing Science, Simon Fraser University, British Columbia, Canada. Speaker : 童耀民 MA1G0222.
Drive brand awareness. YouTube Promoted Videos YouTube Promoted Videos. Leveraging Your Video Assets.
Adotomi.com | Copyright Adotomi 2013 Scaling Up While Maintaining Quality: Life After the Like Nadav Weinberg | Director of Business Development.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
The history of computers By Naoise kearns. What is a computer? A computer is a programmable machine that receives input and stores data and information.
Class Usability Experience User slides are in BLUE.
Microblogs: Information and Social Network Huang Yuxin.
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
Phillip Dinh, Fofanova, 1301, UH Internet Security By Phillip Dinh 1301 Spring 2007 University of Houston.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Al Jomaih Social Media. Facebook Page 90 Likes Started with 7,772 Reached Likes.
Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.
Go to your Blog URL: Then click on “Log in” Your students do not need to remember their password, they can select.
The Factors of Production Game
Presented to: Space 150 Dan Murphy Triton Digital.
USING FACEBOOK FOR VIRAL MARKETING AND AUDIENCE ENGAGEMENT Presented by Linh Ho, Principal at Ideation Agency Office:
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Authors: Yazan Boshmaf, Lldar Muslukhov, Konstantin Beznosov, Matei Ripeanu University of British Columbia Annual Computer Security Applications Conference.
Choose the Best Answer for each Sentence 1. People are afraid of computer viruses because they can ___________your computer. a. ruining b. be ruined c.
Mining information from social media
Internet Safety Safely Navigating Uncharted Waters.
Online Marketing. Types Marketing Link Building Content Marketing Search Engine Optimization(SEO) Social Media Marketing Advertising.
Content I. Introduction II. Unique features III. Pros & Cons IV. Extra benefits V. Tips & Conclusion.
103 Moo 2, Ratchaphruek St., Bangkhungong, Banggruay, Nonthaburee Tel. 02 – 422 – 5237, Lucky Aommie Viral Marketing Strategy.
Welcome to the world of social media =jottDMuLesU
Facebook Marketing Master Software Solutions Pvt. Ltd.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
CERN TTE ASSEMBLY Getting your CV working for you!
Internet in 21st Century. We all use web in our daily lives, from our mobiles or coputers. However we do not realize how fast is internet getting bigger.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Computer Security Keeping you and your computer safe in the digital world.
Introduction To Crowd Funding Webinar 26 May,
Word of Mouth. Introduction Word of Mouth is the informal transmission of ideas, comments, opinions, and information between two or more individuals,
Meng-Jia Yan Itus: A Generic Feature-based Detection for Facebook Spamming Groups Meng-Jia Yan Presenter: Fu-Hau Hsu National Central University R.O.C.
Welcome.
Social Media Security: Understanding how to keep yourself safe.
Social Media Attacks.
Online Social Network: Threats &
Internet Identity, Safety, & Security
Freedom Independence Transition
Epidemic spreading in complex networks with degree correlations
Diffusion in Networks Dr. Henry Hexmoor Department of Computer Science Southern Illinois University Carbondale 1/17/2019.
May News Recap Facebook F8 Conference Automated Ads Video Editing Tools Story Users Increase to 500 Million Messenger Updates Lead Form Templates.
Presentation transcript:

The Socio-monetary Incentives of Online Social Network Malware Campaigns Ting-Kai Huang (Google) Bruno Ribeiro (Carnegie Mellon University) Harsha M. Madhyastha (University of Michigan) Michalis Faloutsos (University of New Mexico) Conference on Online Social Networks Dublin, Ireland October

(c) 2014, Bruno Ribeiro: Computer virusInternet “viral”Biological virus self-replicating  mutates to fool defenses  copes with diverse “gene” pool  ? 2 Tech “Virus” x Bio Virus In 1983 Cohen uses the term “virus” to describe a self-replicating computer program “Recently” added: Viral Marketing, Memes (1976), Viral Videos

(c) 2014, Bruno Ribeiro: 3 OSN Malware Computer virusInternet “viral”Biological virus self-replicating  mutates to fool defenses  copes with diverse gene pool  ? OSN MalwareBiological virus self-replicating - mutates to fool defenses - copes with diverse gene pool -

(c) 2014, Bruno Ribeiro:  Spreads through clickjacking 4 OSN Malware replication Play as Game to win a FREE iPad2! Play NOW: Like Comment Share John Smith Michael Smith OSN Malware self-replicating  mutates to fool defenses ? copes with diverse gene pool ?

(c) 2014, Bruno Ribeiro:  Text 0bfuscat1on to fool Facebook’s spam detection engine 5 OSN Malware mutations OSN Malware self-replicating  mutates to fool defenses copes with diverse gene pool ?

(c) 2014, Bruno Ribeiro:  What makes someone retweet?  What makes people forward videos? Understanding what drives OSN malware cascades may help us create better models 6 What makes people click on posted links?

(c) 2014, Bruno Ribeiro: Behavioral Economics has answers  BE studies what gets people to do something  Heyman & Ariely Labor Markets ◦ Social incentives ◦ Monetary incentives 7 What makes people do things? Play a Game to win a FREE iPad2! Play NOW: Like Comment Share John Smith Michael Smith monetar y incentive

(c) 2014, Bruno Ribeiro:  [Heyman & Ariely, 2004] experiments: ◦ Social incentive (“get friends to work for you”) ◦ Monetary incentive (“pay people to work for you`”) ◦ What about mixed socio-monetary incentives? 8 Heyman & Ariely Labor Markets + + = =  Socio-monetary incentive ≈ Monetary incentive Money speaks louder than social capital

(c) 2014, Bruno Ribeiro: 9 A Labor Market view of malware cascades

(c) 2014, Bruno Ribeiro: Classifying Facebook malware incentives Our Facebook data: ◦ 111 million posts ◦ 164,000 malware posts ◦ 3,100 distinct malware campaigns (campaign defined through URL of attack) ◦ From 07/2011 to 04/2012  Mechanical Turk to classify incentives 10

(c) 2014, Bruno Ribeiro: classifying the incentives in malware posts  “Some People will dominate all the games and some are doomed to remain losers their whole life (sic): link” ◦ social incentive  “NEW GAME NOTICE! Come check out the awesome new contest that is available, you could win a Kindle Fire. Start playinghere” ◦ monetary incentive  “CONTEST UPDATE: Currently in 10246th place in The Daily Addi’s Gem Swap II contest to win a 16GB iPad2. Think you can do better? You should give it a try here” ◦ socio-monetary incentive 11 Malware incentives

(c) 2014, Bruno Ribeiro: 12 Results: “Social” is favorite incentive of developers

(c) 2014, Bruno Ribeiro: Facebook incentive popularity Developers may know something?! Illustrative examples: Which incentive most effective? 13

(c) 2014, Bruno Ribeiro:  Results over all 3,100 campaigns 14 Results: Incentive efficiency socio-monetary > st monetary or social Duration Reach ? days infected users

(c) 2014, Bruno Ribeiro: 15 Socio-monetary ~ monetary? Computer virusInternet “viral”Biological virus self-replicating  mutates to fool defenses  copes with diverse host population  ? OSN MalwareBiological virus self-replicating  mutates to fool defenses copes with diverse gene pool ? Elegant reconciliation of Heyman & Ariely

(c) 2014, Bruno Ribeiro: Mechanics of crop epidemics  Resilience of mixed crops  Fungi counteracts by becoming flexible (but less virulent) [Chin & Wolfe, 84]  Also true for complex systems? 16 1D2D

(c) 2014, Bruno Ribeiro:  Enron network  36,692 nodes  Variant of SIR model 17 Epidemics with heterogeneous preferences p infected users

(c) 2014, Bruno Ribeiro: Completing the picture 18 Malware must cope with diversity of incentives OSN MalwareBiological virus self-replicating  mutates to fool defenses copes with diverse “gene” pool

(c) 2014, Bruno Ribeiro:  Labor market incentives help understand epidemics on online social networks  [Heyman & Ariely, 2004] conclusion “socio-monetary ≈ monetary” may not be true in networks due to percolation effects  There can be other explanations (but ours is elegant & fills gap bio  techno viruses) we didn't get university approval for our “malware epidemic” experiment 19 Conclusions

(c) 2014, Bruno Ribeiro: 20 Thank you! Incentive Percolation Effects