Toward Worm Detection in Online Social Networks Wei Xu, Fangfang Zhang, and Sencun Zhu ACSAC 2010 1.

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

* Bellman-Ford: single-source shortest distance * O(VE) for graphs with negative edges * Detects negative weight cycles * Floyd-Warshall: All pairs shortest.
An Introduction of Botnet Detection – Part 2 Guofei Gu, Wenke Lee (Georiga Tech)
Stelios Lelis UAegean, FME: Special Lecture Social Media & Social Networks (SM&SN)
SOCELLBOT: A New Botnet Design to Infect Smartphones via Online Social Networking th IEEE Canadian Conference on Electrical and Computer Engineering(CCECE)
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
Service Discrimination and Audit File Reduction for Effective Intrusion Detection by Fernando Godínez (ITESM) In collaboration with Dieter Hutter (DFKI)
UNDERSTANDING VISIBLE AND LATENT INTERACTIONS IN ONLINE SOCIAL NETWORK Presented by: Nisha Ranga Under guidance of : Prof. Augustin Chaintreau.
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
An Effective Defense Against Spam Laundering Paper by: Mengjun Xie, Heng Yin, Haining Wang Presented at:CCS'06 Presentation by: Devendra Salvi.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
A Measurement-driven Analysis of Information Propagation in the Flickr Social Network WWW09 报告人: 徐波.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Discovery of Emergent Malicious Campaigns in Cellular Networks Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock © 2013 AT&T Intellectual.
Authors: Xu Cheng, Haitao Li, Jiangchuan Liu School of Computing Science, Simon Fraser University, British Columbia, Canada. Speaker : 童耀民 MA1G0222.
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
An Introduction to the Powerful Social Network and What it Means for Your Business.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
DATA MINING LECTURE 13 Absorbing Random walks Coverage.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Profile-based Web Application Security System Kyungtae Kim High Performance.
Network Characterization via Random Walks B. Ribeiro, D. Towsley UMass-Amherst.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
A few project ideas… Gareth Tyson
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
A Measurement-driven Analysis of Information Propagation in the Flickr Social Network author: Meeyoung Cha Alan Mislove Krishna P. Gummadi From Saarbrucken,
CSE 486/586 CSE 486/586 Distributed Systems Graph Processing Steve Ko Computer Sciences and Engineering University at Buffalo.
TWITTER What is Twitter, a Social Network or a News Media? Haewoon Kwak Changhyun Lee Hosung Park Sue Moon Department of Computer Science, KAIST, Korea.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Surveying The Landscape of Threats Facing Users In The Social Web Steve Webb, Ph.D. Emory Guest Lecture April 16, 2009.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
SocialTube: P2P-assisted Video Sharing in Online Social Networks
Security with Honeyd By Ryan Olsen. What is Honeyd? ➲ Open source program design to create honeypot networks. ➲ What is a honeypot? ● Closely monitored.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content Michael Robertson, Yin Pan, and Bo Yuan Department of Networking,
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
We.b : The web of short URLs Demetris Antoniades, lasonas Polakis, Gerogios Kontaxis, Elias Athansapoulos, Sotiris loannidis, Evangelos P.Markatos, Thomas.
1 Friends and Neighbors on the Web Presentation for Web Information Retrieval Bruno Lepri.
Effective Anomaly Detection with Scarce Training Data Presenter: 葉倚任 Author: W. Robertson, F. Maggi, C. Kruegel and G. Vigna NDSS
1 Monitoring and Early Warning for Internet Worms Authors: Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst Publish: 10th.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
2016/3/13 1 Peer-to-peer system-based active worm attacks: Modeling, analysis and defense Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan Computer Communications.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Maintaining and Updating Windows Server 2008 Lesson 8.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Lecture 23: Structure of Networks
Cohesive Subgraph Computation over Large Graphs
Uncovering Social Spammers: Social Honeypots + Machine Learning
Online Social Network: Threats &
CMS Central Version 1.0 Made by Eden Sun Jan 2010.
Worm Origin Identification Using Random Moonwalks
Lecture 23: Structure of Networks
Generative Model To Construct Blog and Post Networks In Blogosphere
The likelihood of linking to a popular website is higher
Local Worm Detection using Honeypots Justin Miller Jan 25, 2007
Lecture 23: Structure of Networks
SOCIAL MEDIA: FIRST STEPS
Presentation transcript:

Toward Worm Detection in Online Social Networks Wei Xu, Fangfang Zhang, and Sencun Zhu ACSAC

OUTLINE Introduction Related Work System Design Evaluation Limitation and Discussion Conclusion 2

Introduction - Worm Worm ◦ Scanning ◦ Attack string XSS Worm ◦ XSS Vulnerability OSN(Online Social Networking) Worm ◦ Messages ◦ Url link 3

Twitter XSS Worm var xss = urlencode(' <a '); 4

Introduction – OSN Worm 5

Related Work Worm detection, early warning and response based on local victim information. ACSAC(2004) And many Worm detection approach… ◦ Rely on scanning traffic/detailed infection procedure Fast detection and suppression of instant messaging malware in enterprise-like networks. ACSAC(2007) ◦ HoneyIM 6

Idea OSN ◦ High clustering property ◦ Monitor the “popular” user “Decoy friend” ◦ Idea of honeypot ◦ Add into a normal user’s friends list 7

System Design Like lightweight NIDS 8

System Design Configuration module ◦ Social graph Evidence collecting module ◦ Gathers suspicious worm propagation evidence Worm detection module ◦ Identifies and reports worm Communication module ◦ Just for communicate 9

Evidence collecting module Decoy friend ◦ As a low-interactive honeypot ◦ Receive worm evidence Questions of decoy friend ◦ Information leak ◦ User’s reluctance ◦ How to collect only suspicious worm evidence 10

Configuration module Selecting normal users and assigning decoy friends to these users ◦ Two decoy friends for each user Selecting normal users ◦ Limiting the number of decoy friends ◦ Preserving the detection effectiveness 11

Configuration module Question: A directed graph G = (V,E) user connection between two users Extended dominating set problem ◦ Minimum vertex set ◦ ◦ Or exists a path form to where and the length of this path is at most hops. 12

Configuration module Make it simple ◦ Sets r = 2 Not necessary to cover the entire social graph ◦ Power law distribution ◦ 20% of users have no connections Maximum Coverage Problem ◦ Given a social graph G=(V,E) and a number k, choose a set of vertices with size of at most k such that the number of other vertices that are covered by this set with coverage redius r=2 reaches the maximum 13

Worm detection module Def: suspicious propagation evidence list(SPEL) ◦ {decoy friend ID, receiving time, content} Event: get any SPEL ◦ Keep it for a short period of time ◦ Step1:Local Correlation  Compare two decoy friends(from same user) ◦ Step2:Network Correlation  Compare all saved SPEL 14

Worm detection module Compare SPEL ◦ If a similarity over 90% → Alert Similarity ◦ Edit distance of content in SPEL ◦ 15

Evaluation 16

Evaluation Flickr ◦ 1,846,198 users ◦ 22,613,981 friend links 1.Test Koobface worm and Mikeyy worm 2.Different worm behavior 3.Different size of selected users set(with decoy friends) 17

Evaluation 1 Koobface Different messages All friends Mikeyy Same messages All friends Maximum infection 2420 (0.13%) 18

Evaluation 2 Infection Number versus Different Percentages of Friends lists 19

Evaluation (0.16%) 20

Limitation & Discussion False positive ? ◦ Outbreak of a large-scale event ◦ A posted link in a suspicious message is pointed to well-known website – OK ◦ Otherwise – rare case, manual checking ? Time delay ◦ Keep messages longer 21

Conclusion A new problem – OSN worm Monitor a few hundreds of users to detect OSN worm Effectively detect OSN worm (0.13%) 22