Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/2015 1.

Slides:



Advertisements
Similar presentations
Surrey Libraries Computer Learning Centres January 2012 Internet Searching Teaching Script Totally New to Computers Internet Searching.
Advertisements

Privacy: Facebook, Twitter
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Marketing Communications Services Hayward, WI.
Design and Evaluation of a Real- Time URL Spam Filtering Service Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song University of California,
Ahmad Radaideh.  Abstract  Introduction  Google Cached Content  GOOGLE HACKING Procedures  Google Advance Operators  Google hacking Result Categories.
Facebookin’ for Bucks A Beginner’s Guide Sarah Spencer.
What’s the Difference? Groups or Pages?. What are Groups and Pages? Facebook Groups are pages that you create within the Facebook.
Inbound Statistics Slides Attract. 1 Blogging There are 31% more bloggers today than there were three years ago 46% of people read blogs more than once.
Privacy By Mohammed Al-Ghamdi. Outline Introduction Privacy How to Provide Privacy Ethics Summary.
 Search engines are programs that search documents for specified keywords and returns a list of the documents where the keywords were found.  A search.
What does the course cover:  The course is a practical guide to use digital marketing to effectively reach out to internet audience while building your.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
MAKING THE INTERNET WORK FOR A HEALTHCARE FACILITY Creating functional websites with optimal Customer Service.
Social Networking – The Ways and Means Rosey Broderick May 2011.
Social networking FACEBOOK AND TWITTER. Then In the beginning of Facebook, there were very few features. There were no status updates, messages, photo.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
TwitterSearch : A Comparison of Microblog Search and Web Search
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
FaceBook and Your Business Women in Technology in Nigeria Presented by Mrs M.O Alade Women in Technology in Nigeria
Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 9/19/2015Slide 1 (of 32)
Basic Web Applications 2. Search Engine Why we need search ensigns? Why we need search ensigns? –because there are hundreds of millions of pages available.
Why I LIKE the Facebook Database… Sharon Viente May 2010.
FluXOR: Detecting and Monitoring Fast-Flux Service Networks Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, and Danilo Bruschi 5th international.
Using Facebook to Connect With Customers Part 1. Outline Questions from Librarians Introduction to Facebook Uses for Facebook Facebook for Personal Use.
Cloak and Dagger: Dynamics of Web Search Cloaking David Y. Wang, Stefan Savage, and Geoffrey M. Voelker University of California, San Diego 左昌國 Seminar.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
Curtis Spencer Ezra Burgoyne An Internet Forum Index.
Using Facebook to Connect With Customers. Outline Questions from Librarians Introduction to Facebook Uses for Facebook Hands-On Workshop Summary / Conclusions.
11 Spamcraft: An Inside Look At Spam Campaign Orchestration Reporter: 林佳宜 Advisor: Chun-Ying Huang /6/3.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.
Using Facebook to Connect With Customers. Outline Questions from Librarians Introduction to Facebook Uses for Facebook Hands-On Workshop Summary / Conclusions.
We.b : The web of short URLs Demetris Antoniades, lasonas Polakis, Gerogios Kontaxis, Elias Athansapoulos, Sotiris loannidis, Evangelos P.Markatos, Thomas.
CTH Session 6. Search engines What are search engines ? Examples of search engines?
A Framework for Detection and Measurement of Phishing Attacks Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 2/25/2016 Slide.
1 CS 8803 AIAD (Spring 2008) Project Group#22 Ajay Choudhari, Avik Sinharoy, Min Zhang, Mohit Jain Smart Seek.
Web Design Terminology Unit 2 STEM. 1. Accessibility – a web page or site that address the users limitations or disabilities 2. Active server page (ASP)
Chapter 8: Web Analytics, Web Mining, and Social Analytics
A consistent social media presence is key to a good SEO strategy. Create engaging content that will encourage people to share. Encourage sharing on your.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or coputers. However we do not realize how fast is internet getting bigger.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
Exposing Private Information by Timing Web Applications Stephen Kleinheider.
Crawling When the Google visit your website for the purpose of tracking, Google does this with help of machine, known as web crawler, spider, Google bot,
Welcome.
Social Media Attacks.
Online Social Network: Threats &
Discover How Your Business Can Benefit from a Facebook Fanpage
Discover How Your Business Can Benefit from a Facebook Fanpage
Welcome to DCISD Technology
Are these Ads Safe: Detecting Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan Riley.
Dieudo Mulamba November 2017
Information Security Session October 24, 2005
A Comparative Study of Link Analysis Algorithms
Social Media Account Management Services
The Internet An Overview.
GOOGLE + Google+ (pronounced Google plus) is a Google social networking project. It lunched in June 2011 and there are more than 212 million active users.
Web Mining Department of Computer Science and Engg.
Identify Different Chinese People with Identical Names on the Web
The Internet: Encryption & Public Keys
Exposing Private Information by Timing Web Applications
Using Facebook to Connect With Customers
Presentation transcript:

Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/2015 1

Reference I. Polakis, G. Kontaxis, S. Antonatos, E. Gessiou, T. Petsas, and E. P. Markatos, “Using social networks to harvest addresses,” in WPES ’10: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society 9/14/2015 2

Outline Introduction Social network harvest Facebbok informaition Conclusions 9/14/2015 3

Introduction Social networking is one of the most popular Internet activities ▫Facebook has more than 400 million users ▫Twitter has more than 40 million users Privacy leakage is one of the biggest problems of social networking 9/14/2015 4

9/14/2015 5

Social network Used for malicious purposes ▫name, nickname  How names extracted from social networks ▫harvest addresses Names collected ▫Facebook and Twitter networks Query terms for the Google search engine ▫harvest almost 9 million unique 9/14/2015 6

Current Methodologies Give a brief overview of the current methodologies used by spammers to harvest addresses ▫Web crawling ▫Crawling mailing list archives sites ▫Malware ▫Malicious sites ▫Dictionary attacks 9/14/2015 7

Two approaches Present two different approaches to harvesting ▫Blind harvesting ▫Targeted harvesting Social network ▫Facebbok and Twitter Google search engine ▫gather addresses Facebook ▫personal information 9/14/2015 8

Find name and nickname Crawlers for extracting names ▫Facebook  fan pages ▫Twitter  crawled the accounts the user follows 9/14/2015 9

Google search engine Once the names have been harvested ▫8 different combinations  "term“, "term at “, ▫retrieve the first 50 results ▫parse the two-line summary provided 9/14/

Blind Harvesting (1/2) Able to harvest, on average ▫45 s per name for the Facebook names ▫25 s per name for the Twitter nicknames 9/14/

Blind Harvesting (2/2) Dictionary : Surnames: 9/14/

Targeted harvesting (1/3) Traditional phishing contain generic terms ▫“Dear user”, ”Dear customer”, ”Hello subscriber” Personalized phishing ▫ look like they originate from a friend 9/14/

Targeted harvesting (2/3) Use the harvested addresses in the Facebook search utility ▫gain profile The first technique ▫Uses information from the Facebook network  Successfully link 11.5% of the harvested names with their actual address The second technique ▫Uses information from the Twitter network  43.4% of the profiles returned 9/14/

Targeted harvesting (3/3) The third technique ▫collected from other social networks ▫harvest profiles from Google Buzz  40.5% valid Gmail addresses 9/14/

Fetch name Method ▫facebook app ▫friend 9/14/

Permissions Read Permissions Write Permissions Page Permissions 9/14/

Basic profile 9/14/

9/14/

Facebook profile 9/14/

Content categorization 9/14/

Conclusions We present how information, that is publicly available in social networking sites ▫for harvesting addresses ▫deploying personalized phishing campaigns We present two different approaches to harvesting ▫greatly enhance the efficiency of a spam campaign 9/14/

Thanks for Your Attention Q & A 9/14/