Social Networking, Security and Privacy Dr. Bhavani Thuraisingham April 21, 2008.

Slides:



Advertisements
Similar presentations
Options for communicating. A social network is a social structure made of individuals (or organizations) called "nodes," which are tied (connected) by.
Advertisements

Our Digital World Second Edition
Social Media.
The Big Idea for the “Emerging Young Artists” is to do SMART marketing using digital marketing avenues. The idea is to create awareness and increase.
Promoting Your Business Through Twitter ©2009, All rights reserved Fox Coaching Associates.
Pete Bohman Adam Kunk.  Introduction  Related Work  System Overview  Indexing Scheme  Ranking  Evaluation  Conclusion.
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
1 Working with Social Media in Research Settings Victoria Wade Careers Consultant.
Day 1 SOCIAL MEDIA CERTIFICATE SERIES DAY 4 - LINKEDIN.
Web 2.0: Concepts and Applications 5 Connecting People.
Web 2.0: Concepts and Applications 5 Connecting People.
SEO & SMO Working Plan Copyright © Orion Computech | | - | Skype: - vishal.orion.
An introduction to social networking Marga Navarrete 1 st June 2007.
WEB2.0 Social Media & Independent Pharmacy Real World Use & Possibilities.
An Overview. BizLink BizLink is a Social Networking platform for business. It allows colleagues to come together, ask questions, share resources, form.
By: Roma Mohibullah Shahrukh Qureshi
Search Engines and Information Retrieval
UNDERSTANDING VISIBLE AND LATENT INTERACTIONS IN ONLINE SOCIAL NETWORK Presented by: Nisha Ranga Under guidance of : Prof. Augustin Chaintreau.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
GenSpace: Exploring Social Networking Metaphors for Knowledge Sharing and Scientific Collaborative Work Chris Murphy, Swapneel Sheth, Gail Kaiser, Lauren.
6/16/20151 Recent Results in Automatic Web Resource Discovery Soumen Chakrabartiv Presentation by Cui Tao.
Anthony Bonomi, Amber Heeg, Elizabeth Newton, Bianca Robinson & Marzi Shabani.
YAMMER Guidelines for CCAFS Social Learning Group* *Based on CGIAR Master Guidelines.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
WELCOME TO THE AHIA CONNECTED COMMUNITY! HEALTHCARE INTERNAL AUDIT'S PROFESSIONAL THOUGHT LEADERSHIP COMMUNITY.
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
Social Networks Abhimanyu DhamijaAbhishek Kumar Munish MiniaPriyank Sharma.
How to Expand Your School’s Online Reach using Facebook, Blogs and Twitter.
CS105 Introduction to Social Network Lecture: Yang Mu UMass Boston.
© 2011 IBM Corporation Getting social in IBM. © 2011 IBM Corporation Are we having a conversation?  Today, business happens in real-time. Market shifts.
Using Social Networks in Education Region One Technology Conference May 11, 2010.
© Paradigm Publishing, Inc. 5-1 Chapter 5 Application Software Chapter 5 Application Software.
Search Engines and Information Retrieval Chapter 1.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
AVI/Psych 358/IE 340: Human Factors Web 2.0 November
Using LinkedIn to Build Business Presented by: Mandy Boyle SEO Manager.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Social Networking, Security and Privacy Dr. Bhavani Thuraisingham Lecture #1 August 28, 2015.
10 Reasons to Use Google Analytics By: Errett Cord
© 2008 IBM Corporation ® Atlas for Lotus Connections Unlock the power of your social network! Customer Overview Presentation An IBM Software Services for.
LET’S WORK TOGETHER: Integrating Social Media, Online Marketing, and Outreach ALA Annual 2012 June 25, 2012 Marshall Breeding Independent Consultant, Author,
1 The Digital Public Library for Flanders A strategic look into the future Jan Braeckman Based on consultancy by ONE Agency Vlaams Centrum voor Openbare.
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
Use of Electronic and Internet advertising options Standard 3.4.
C21 COMMUNITIES - TALKS A Social Media Platform for Agents & Brokers.
Date: 2012/4/23 Source: Michael J. Welch. al(WSDM’11) Advisor: Jia-ling, Koh Speaker: Jiun Jia, Chiou Topical semantics of twitter links 1.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
Chapter 5 Social Network Analysis: Techniques to Discover How Work Really Gets Done.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
WEB 2.0 PATTERNS Carolina Marin. Content  Introduction  The Participation-Collaboration Pattern  The Collaborative Tagging Pattern.
Social Networks and Surveillance: Evaluating Suspicion by Association Ryan P. Layfield Dr. Bhavani Thuraisingham Dr. Latifur Khan Dr. Murat Kantarcioglu.
Social Media Primer. Social Media is Great For: Building awareness and attracting new business Fostering community Providing helpful content and information.
HCC class lecture 21: Intro to Social Networks John Canny 4/11/05.
Tshilidzi Tshiredo. Introduction Long time ago even before technologies, social networking platforms and mobile devices, Dewey, J.( ) stated that.
Refined Online Citation Matching and Adaptive Canonical Metadata Construction CSE 598B Course Project Report Huajing Li.
Google Apps and Tools for the Classroom
Good Use of Social Networking Sites Moderator Alisha Cardenas CSS Supervisor – San Benito County DCSS Speaker Peggy Hawkins Chief Assistant Director –
1 Discovering Web Communities in the Blogspace Ying Zhou, Joseph Davis (HICSS 2007)
Building a Social Media Presence Participants will look at the BCPS social media outlets (Twitter, Facebook, Flickr, Vimeo, Instagram, blogs) and relevant.
Social Media & Social Networking 101 Canadian Society of Safety Engineering (CSSE)
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
CRIM6660 Terrorist Networks Lesson 1: Introduction, Terms and Definitions.
Social Networks.
Social Networking, Security and Privacy
Use of Electronic and Internet advertising options
The INTERACT Website: Important source of information for the ETC Community Karen Vandeweghe, Communications Manager, IS Bratislava 27 January 2010.
MyASQ myASQ is a centralized, online community that provides timely, relevant, and personalized engagement for members of ASQ, allowing members to make.
Presentation transcript:

Social Networking, Security and Privacy Dr. Bhavani Thuraisingham April 21, 2008

1-2 11/16/ :58 Social Networks 0 A social network site allows people who share interests to build a ‘trusted’ network/ online community. A social network site will usually provide various ways for users to interact, such as IM (chat/ instant messaging), , video sharing, file sharing, blogging, discussion groups, etc. 0 The main types of social networking sites have a ‘theme’, they allow users to connect through image or video collections online (like Flicker or You Tube) or music (like My Space, lastfm). Most contain libraries/ directories of some categories, such as former classmates, old work colleagues, and so on (like Face book, friends reunited, Linked in, etc). They provide a means to connect with friends (by allowing users to create a detailed profile page), and recommender systems linked to trust.

1-3 11/16/ :58 Popular Social Networks 0 Face book - A social networking website. Initially the membership was restricted to students of Harvard University. It was originally based on what first-year students were given called the “face book” which was a way to get to know other students on campus. As of July 2007, there over 34 million active members worldwide. From September 2006 to September 2007 it increased its ranking from 60 to 6th most visited web site, and was the number one site for photos in the United States. 0 Twitter- A free social networking and micro-blogging service that allows users to send “updates” (text-based posts, up to 140 characters long) via SMS, instant messaging, , to the Twitter website, or an application/ widget within a space of your choice, like MySpace, Facebook, a blog, an RSS Aggregator/reader. 0 My Space - A popular social networking website offering an interactive, user-submitted network of friends, personal profiles, blogs, groups, photos, music and videos internationally. According to AlexaInternet, MySpace is currently the world’s sixth most popular English-language website and the sixth most popular website in any language, and the third most popular website in the United States, though it has topped the chart on various weeks. As of September 7, 2007, there are over 200 million accounts.

1-4 11/16/ :58 Social Networks: More formal definition 0 A structural approach to understanding social interaction. 0 Networks consist of Actors and the Ties between them. 0 We represent social networks as graphs whose vertices are the actors and whose edges are the ties. 0 Edges are usually weighted to show the strength of the tie. 0 In the simplest networks, an Actor is an individual person. 0 A tie might be “is acquainted with”. Or it might represent the amount of exchanged between persons A and B.

1-5 11/16/ :58 Social Network Examples 0 Effects of urbanization on individual well- being 0 World political and economic system 0 Community elite decision-making 0 Social support, Group problem solving 0 Diffusion and adoption of innovations 0 Belief systems, Social influence 0 Markets, Sociology of science 0 Exchange and power 0 , Instant messaging, Newsgroups 0 Co-authorship, Citation, Co-citation 0 SocNet software, Friendster 0 Blogs and diaries, Blog quotes and links

1-6 11/16/ :58 History 0 “ Sociograms” were invented in 1933 by Moreno. 0 In a sociogram, the actors are represented as points in a two-dimensional space. The location of each actor is significant. E.g. a “central actor” is plotted in the center, and others are placed in concentric rings according to “distance” from this actor. 0 Actors are joined with lines representing ties, as in a social network. In other words a social network is a graph, and a sociogram is a particular 2D embedding of it. 0 These days, sociograms are rarely used (most examples on the web are not sociograms at all, but networks). But methods like MDS (Multi-Dimensional Scaling) can be used to lay out Actors, given a vector of attributes about them. 0 Social Networks were studied early by researchers in graph theory (Harary et al. 1950s). Some social network properties can be computed directly from the graph. 0 Others depend on an adjacency matrix representation (Actors index rows and columns of a matrix, matrix elements represent the tie strength between them).

1-7 11/16/ :58 Social Networks Basic Questions 0 Balance: important in exchange networks 0 In a two-person network (dyad), exchange of goods, services and cash should be balanced. 0 More generally, exchanges of “favors” or “support” are likely to be quite balanced. 0 Role: what role does the actor perform in the network? 0 Role is defined in terms of Actors’ neighborhoods. 0 The neighborhood is the set of ties and actors connected directly to the current actor. 0 Actors with similar or identical neighborhoods are assigned the same role. 0 What is the related idea from semiotics? 0 Paradigm: interchangability. Actors with the same role are interchangable in the network.

1-8 11/16/ :58 Social Networks Basic Questions 0 Prestige: How important is the actor in the network? 0 Related notions are status and centrality. 0 Centrality reifies the notion of “peripheral vs. central participation” from communities of practice. 0 Key notions of centrality were developed in the 1970’s, e.g. “eigenvalue centrality” by Bonacich. 0 Most of these measures were rediscovered as quality measures for web pages: -Indegree -Pagerank = eigenvalue centrality -HITS ?= two-mode eigenvalue centrality

1-9 11/16/ :58 Social Network Concepts 0 Actor -An “actor” is a basic component for SNs. Actors can be: -Individual people, Corporations, Nation-States, Social groups 0 Modes -If all the actors are of the same type, the network is called a one-mode network. If there are two groups of actor then it is a two-mode network. -E.g. an affiliation network is a two-mode network. One mode is individuals, the other is groups to which they belong. Ties represent the relation: person A is a member of group B. 0 Ties -A tie is the relation between two actors. Common types of ties include: =Friendship, Amount of communication, Goods exchanged, Familial relation (kinship), Institutional relations

/16/ :58 Practical issues: Boundaries and Samples 0 Because human relations are rich and unbounded, drawing meaningful boundaries for network analysis is a challenge. 0 There are two main approaches: 0 Realist: boundaries perceived by actors themselves, e.g. gang members or ACM members. 0 Nominalist: Boundaries created by researcher: e.g. people who publish in ACM CHI. 0 To deal with large networks, sampling is necessary. Unfortunately, randomly sampled graphs will typically have completely different structure. Why? 0 One approach to this is “snowballing”. You start with a random sample. Then extend with all actors connected by a tie. Then extend with all actors connected to the previous set by a tie…

/16/ :58 Social Network Analysis of 9/11 Terrorists ( Early in 2000, the CIA was informed of two terrorist suspects linked to al-Qaeda. Nawaf Alhazmi and Khalid Almihdhar were photographed attending a meeting of known terrorists in Malaysia. After the meeting they returned to Los Angeles, where they had already set up residence in late 1999.

/16/ :58 Social Network Analysis of 9/11 Terrorists What do you do with these suspects? Arrest or deport them immediately? No, we need to use them to discover more of the al- Qaeda network. Once suspects have been discovered, we can use their daily activities to uncloak their network. Just like they used our technology against us, we can use their planning process against them. Watch them, and listen to their conversations to see... who they call / who visits with them locally and in other cities where their money comes from The structure of their extended network begins to emerge as data is discovered via surveillance.

/16/ :58 Social Network Analysis of 9/11 Terrorists A suspect being monitored may have many contacts -- both accidental and intentional. We must always be wary of 'guilt by association'. Accidental contacts, like the mail delivery person, the grocery store clerk, and neighbor may not be viewed with investigative interest. Intentional contacts are like the late afternoon visitor, whose car license plate is traced back to a rental company at the airport, where we discover he arrived from Toronto (got to notify the Canadians) and his name matches a cell phone number (with a Buffalo, NY area code) that our suspect calls regularly. This intentional contact is added to our map and we start tracking his interactions -- where do they lead? As data comes in, a picture of the terrorist organization slowly comes into focus. How do investigators know whether they are on to something big? Often they don't. Yet in this case there was another strong clue that Alhazmi and Almihdhar were up to no good -- the attack on the USS Cole in October of One of the chief suspects in the Cole bombing [Khallad] was also present [along with Alhazmi and Almihdhar] at the terrorist meeting in Malaysia in January Once we have their direct links, the next step is to find their indirect ties -- the 'connections of their connections'. Discovering the nodes and links within two steps of the suspects usually starts to reveal much about their network. Key individuals in the local network begin to stand out. In viewing the network map in Figure 2, most of us will focus on Mohammed Atta because we now know his history. The investigator uncloaking this network would not be aware of Atta's eventual importance. At this point he is just another node to be investigated.

/16/ :58 Social Network Analysis of 9/11 Terrorists Figure 2 shows the two suspects and

/16/ :58 Social Network Analysis of 9/11 Terrorists Figure 2 shows the two suspects and Atta's eventual importance. At this point he is just another node to be investigated. Figure 3 shows the direct

/16/ :58 Social Network Analysis of 9/11 Terrorists We now have enough data for two key conclusions: All 19 hijackers were within 2 steps of the two original suspects uncovered in 2000! Social network metrics reveal Mohammed Atta emerging as the local leader With hindsight, we have now mapped enough of the 9-11 conspiracy to stop it. Again, the investigators are never sure they have uncovered enough information while they are in the process of uncloaking the covert organization. They also have to contend with superfluous data. This data was gathered after the event, so the investigators knew exactly what to look for. Before an event it is not so easy. As the network structure emerges, a key dynamic that needs to be closely monitored is the activity within the network. Network activity spikes when a planned event approaches. Is there an increase of flow across known links? Are new links rapidly emerging between known nodes? Are money flows suddenly going in the opposite direction? When activity reaches a certain pattern and threshold, it is time to stop monitoring the network, and time to start removing nodes. The author argues that this bottom-up approach of uncloaking a network is more effective than a top down search for the terrorist needle in the public haystack -- and it is less invasive of the general population, resulting in far fewer "false positives".

/16/ :58 Social Network Analysis of Steroid Usage in Baseball ( Figure 2 shows the two suspects and When the Mitchell Report on steroid use in Major League Baseball [MLB], was published, people were surprised at who and how many players were mentioned. The diagram below shows a human network created from data found in the Mitchell Report. Baseball players are shown as green nodes. Those who were found to be providers of steroids and other illegal performance enhancing substances appear as red nodes. The links reveal the flow of chemicals -- from provider to player.

/16/ :58 Knowledge Management Examples 0 Managing the 21st Century Organization 0 Networks of Adaptive/Agile Organizations 0 Best Practice: Organizational Network Mapping 0 Discovering Communities of Practice 0 Data-Mining 0 Finding Leaders on your Team 0 Post-Merger Integration 0 Knowledge Sharing in Organizations 0 Innovation happens at the Intersections 0 Partnerships and Alliances in Industry 0 Decision-Making in Organizations 0 New Organizational Structures

/16/ :58 Knowledge Sharing in Organizations: Finding Experts Figure 2 shows the two suspects and

/16/ :58 Knowledge Sharing Network: Finding Experts ( Figure 2 shows the two suspects and Organizational leaders are preparing for the potential loss of expertise and knowledge flow due to turnover, downsizing, outsourcing, and the coming retirements of the baby boom generation. The model network (previous chart) is used to illustrate the knowledge continuity analysis process. Each node in this sample network (previous chart) represents a person that works in a knowledge domain. Some people have more / different knowledge than others. Employees who will retire in 2 years or less have their nodes colored red. Those who will retire in 3-4 years are colored yellow. Those retiring in 5 years or later are colored green. A gray, directed line is drawn from the seeker of knowledge to the source of expertise. A-->B indicates that A seeks expertise / advice from B. Those with many arrows pointing to them are sought often for assistance. The top subject matter experts -- SMEs -- in this group are nodes 29, 46, 100, 41, 36 and 55. The SMEs were discovered using a network metric in InFlow that is similar to how the Google search engine ranks web pages -- using both direct and indirect links. Of the top six SMEs in this group, half are colored red[100] or yellow[46, 55]. The loss of person 46 has the greatest potential for knowledge loss. 90% of the network is within 3 steps of accessing this key knowledge source.

/16/ :58 Social Networks: Security and Privacy Issues: European Network and Information Security Agency 0 The European Network and Information Security Agency (ENISA) has released its first issue paper “Security Issues and Recomendations for Online Social Networks" Four groups of threats: privacy related threats, variants of traditional network and information security threats, identity related threats, social threats. 0 Recommendations are given for governments (oversight and adaption of existing data protection legislation), companies that run such networks, technology developers, and research and standardisation bodies. 0 Some concenrs: recommnendation to use automated filters against "offensive, litigious or illegal content". This brings potential freedom of speech issues. European Digital Rights has started a campaign against a similar recommendation by the Council of Europe. Issue of portability of profiles social graphs are also addressed. However what is missing is that “Information about social links is not about only one user, but also the others which he is linked to. They have to agree if this information is moved to different platforms”.

/16/ :58 Social Networks: Security and Privacy Issues: Microsoft Recommendations 0 Online communities require you to provide personal information. Profiles are public. Comments you post are permanently recorded on the community site.You might even mention when you plan to be out of town. 0 and phishing scammers count on the appealing sense of trust that is often fostered in online communities to steal your personal information. The more you reveal in profiles and posts, the more vulnerable you are to scams, spam, and identity theft. 0 Here are some features to look for when you're considering joining an online community: -Privacy policies that explain exactly what information the service will collect and how it might be used. User guidelines that outline a basic code of conduct for users on their sites. Sites have the option to penalize reported violators with account suspension or termination.Special provisions for children and their parents, such as family-friendly options geared towards protecting children under a certain age.Password protection to help keep your account secure.. address hiding, which lets you display only part of your address on the site's membership lists. Filtering options: Offered on blogging sites, these tools let you to choose which subscribers can see what you've written.

/16/ :58 Appendix: Social Networks and Surveillance: Evaluating Suspicion by Association Ryan Layfield, PhD Student Prof. Bhavani Thuraisingham September 2006

/16/ :58 Overview 0 Introduction -Our Goal -System Design -Social Networks -Threat Detection -Correlation Analysis 0 The Experiment -Setup -Current Results -Issues -Future Work 0 Directions

/16/ :58 Introduction 0 Automated message surveillance is essential to communication monitoring -Widespread use of electronic communication -Exponential data growth -Impossible to sift through all ‘by hand’ 0 Going beyond basic surveillance -Identifying groups rather than individuals -Monitoring conversations rather than messages

/16/ :58 Our Approach 0 Design new techniques and apply existing algorithms to… -Create a machine-understandable model of existing social networks; Identify abnormal conversations and behavior; Monitor a given communications system in real-time; Continuously learn and adapt to a dynamic environment 0 System Design: Three major components: -Social Network Modeler; Initial Activity Detector; Correlated Activity Investigator 0 Assumptions -Individuals engaged in suspicious or undesirable behavior rarely act alone -We can infer than those associated with a person positively identified as suspicious have a high probability of being either: =Accomplices (participants in suspicious activity) =Witnesses (observers of suspicious activity) -Making these assumptions, we create a context of association between users of a communication network

/16/ :58 Social Networks 0 Within our model: -Every node is a unique user -Every message creates or strengthens a link between nodes 0 Over time, the network changes -Frequent communication leads to stronger links -Intermittent messaging implies weakening social ties 0 The strength of the link implies how strong an association between individuals is 0 From this data, we can theoretically identify -Hubs -Groups -Liaisons

/16/ :58 Social Networks

/16/ :58 Threat Detection and Correlation Analysis 0 Every message sent is scrutinized in the interest of identifying suspicious communication -Keywords analysis; Prior context (i.e. previous message content) 0 When a detection algorithm yields a strong result, a token is created -The token is created at the origin and passed to the recipients); Existing tokens, if any, are cloned instead 0 The result is a web that potentially reflects the dissemination of suspicious information activity 0 Future messages with similar suspicious topics are not always identifiable with the same ‘initial’ techniques -Quick replies; Pronoun use; Assumption that recipient is aware of topic 0 If a token is present at the sender when a message is sent: -Message token is associated with and new message are analyzed; If analysis yields a strong match, the token is further cloned and passed to recipient

/16/ :58 The Experiment 0 A rare set of words shared between two or more messages are candidates for keyword analysis, but they are not always easily sifted from ‘noise’ 0 Noise within text-based messages comes in a variety of forms -Misspelled words -Unusual word choice -Incompatible variations of the same language (i.e. British vs. American English) -Unexpected language 0 However, we do not want to eliminate potential keywords -Document names -Terminology specific to a subject -‘Buzz’ words 0 We proposed an experiment that attempts to eliminate false positives due to noisy data while strengthening and expanding our correlation techniques

/16/ :58 Setup 0 Tools -Running word ‘rank’ database -Implementation of word set theory infrastructure -JAMA Matrix Library =Singular Value Decomposition 0 Our Approach -Apply SVD noise filtering based on 100 messages -Analyze word frequency correlation between current message and prior suspicious messages -Generate a score based on the results

/16/ :58 Setup 0 Construct a matrix based on the last 100 messages words messages More common Less common

/16/ :58 Setup 0 Decompose and rebuild U VTVT  A Eliminate ‘weak’ singular values

/16/ :58 Setup Pulled from messages j and k ‘Raw’ total score for word w i Pulled from ‘running’ word database Counts only intersection of words Predefined fixed threshold

/16/ :58 Current Results 1000 messages evaluated, first 100 used to seed word ranks. Method is not currently accurate Large fluctuations Correlation easily swayed by plethora of common words Uncommon words not given enough weight Accuracy of Results over 900 Messages 3% 12% 59% 26% True Positives False Positives True Negatives False Negatives

/16/ :58 Issues and Directions 0 Word frequencies fluctuate wildly during beginning of experiment (0.0 – 10.0+) 0 Extreme cost for current construction methods and computation 0 Filtering context limited to recent global history 0 Affected by large bodies of text 0 Future Directions include -Tap potential of existing matrix for further analysis -Adaptive filtering feedback algorithms -Speed improvements to accommodate real-time streams -Flexible communication platform monitoring -Addition of pipe architecture for modular threat detection and correlation