 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

By Hiranmayi Pai Neeraj Jain
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
7 Effective Habits when using the Internet Philip O’Kane 1.
Social media threats. Warning! May contain mild peril.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
1 On Protecting Private Information in Social Networks: A Proposal Bo Luo 1 and Dongwon Lee 2 1 The University of Kansas, 2 The Pennsylvania.
Web Based Attacks SymantecDefense Fantastic Four Casey Ford Mike Lombardo Ragnar Olson Maninder Singh.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Unit 28- Website Development Assignment 1- THEORY P3
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
Norman SecureSurf Protect your users when surfing the Internet.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Computer and Information Security Protecting yourself and your clients in the wild and wooly online world.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Soyeong Jeon Oral communication. f MySpace : Famous social network site (SNS) Individuals create digital profiles and Link to others (“friends”) Similar.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
Online Friends’ Community Presented by: Stuart Monaghan HND in Computing th May 2002.
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Cross Site Scripting and its Issues By Odion Oisamoje.
What is Spam? d min.
Don’t send offensive pictures  This can badly offend people in many ways or they could take you to court and may get charged. Also it is illegal to send.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
Malicious Software.
Computer Skills and Applications Computer Security.
W elcome to our Presentation. Presentation Topic Virus.
INFO 344 Web Tools And Development CK Wang University of Washington Spring 2014.
 Samy (also known as JS.Spacehero)  XSS worm that was designed to propagate across the MySpace social-networking site. At the time of release, it.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Escalation Of Ad Wars Boosts Malware Delivery
Javascript worms By Benjamin Mossé SecPro
Social Media Attacks.
Online Social Network: Threats &
Cross Sight scripting: Type-2
Cybersecurity Awareness
Home Internet Vulnerabilities
Computer Security.
Presentation transcript:

 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated through social networks.  What is being done to help prevent the spread of malware on social networks

The first major online social network worm is detected as Samy worm, a cross scripting attack, on MySpace. Koobface is the best known social networking malware. Social Networking Malware Total number of profile infections after 20 hours

Research has been done in modeling and simulation of spreading worms since online social networks serve lots of users around the world. To begin the simulation of the trend of XSS worm and Koobface worm propagation. Researchers assume that a single visit on the social network site is an event. A visited person has two states which include: the visited profile is one of the visitor’s friends and the visited profile belongs to none of the visitor’s friends. For this research, it has been assumed all people in the network are vulnerable Modeling and Simulation of Spreading Worms

XXS worm propagation simulation in the social network has one person chosen with an equal probability. The chosen person visits their friends with the probability of q Modeling and Simulation of Spreading XSS

Another experiment is to understand the effect of the total number of infected profiles on XSS propagation. It is assumed that 1,10,100,1000 and 5000 initial infected profiles in the simulation with the probability q equal to 0.9. Modeling and Simulation of XSS

Simulated Propagation on Koobface worm In each case the user checks if it has a spam message. With the probability p, that the user clicks the link and executes the malware. The user is infected and sends spam messages containing the malicious link to all their friends. It was assumed that all people execute the malicious code with the same probability of p equals 0.5 and 0.7.

To visualize how the Koobface worm spreads faster than XSS worms, presume figure three is a small social network A small Social network Modeling and Simulation of Spreading Worms

To provide a sense of the scale and scope of malware attacks on websites, consider the following statistics: Every 1.3 seconds a new web page is getting infected 77% of Web sites with malicious code are legitimate sites that have been compromised The number of malware-infected web pages has grown 12x in 4 years 40% percent of social network user have encountered malicious attacks What is the anti-virus and anti-malware communities doing to protect social network users?

Cloud anti-virus Cloud anti-virus involves moving the detection of malicious and unwanted files from end hosts, into the network. Clients no longer need to continually update their local signature database. Symantec and BitDefender, two security firms, are starting to experiment with Facebook apps that are a social networking cloud anti-virus

When the apps detect a malicious link on the user’s wall, they include the alert in a report. Warns the user when his Facebook profile settings have a privacy risk. The apps are testing social networking capabilities of Facebook, providing features to alert the user’s Facebook friends if the links they shared are malicious.

A lot of major flaws with social networks come down to user awareness and user responsibility. Some people don’t fully understand what malware does and others don’t use any form of antivirus software. Today, I have explained two different types of malware, Koobface and Cross Site Scripting, and how they are spread throughout social networks. Also, how anti-virus communities are trying to prevent the spread of malware throughout social networks. Questions? Conclusion