Download presentation
Presentation is loading. Please wait.
Published byEsther Singleton Modified over 8 years ago
1
Surveying The Landscape of Threats Facing Users In The Social Web Steve Webb, Ph.D. Emory Guest Lecture April 16, 2009
2
Introduction The World Wide Web is evolving into a “social Web” World’s top Web destinations are now dominated by social environments
3
Introduction (cont.) New and exciting ways to connect with others Wildly popular 200 million active Facebook users 100 million YouTube videos 1.5 million SecondLife residents
4
Introduction (cont.) And as always... attackers love crashing big parties Threat categories Traditional Attacks Socially Enhanced Attacks Social Web-specific Attacks Let’s take a closer look…
5
Traditional Attacks Social environment characteristics Large and very distributed Numerous communication mechanisms Relatively naïve user bases That seems like a paradise for attackers…
6
Malware Propagation Worms Samy Mikeyy Spyware Ad networks Rogue apps Adware Zango
7
Spam Comment spam Bulletin spam Message spam
8
Phishing Fraudulent login display Grants access to resources outside of the community Compromised accounts used to launch additional attacks
9
Research Challenges Same problems… new and more challenging environment More information available… but it’s a double-edged sword
10
Research Challenges How can we adapt existing techniques to these environments? What new approaches are necessary?
11
Socially Enhanced Attacks Obviously, social environments are vulnerable to traditional attacks But that’s just the beginning…
12
Socially Enhanced Attacks (cont.) Key barrier for attackers has been private information Generic attacks against the masses
13
Socially Enhanced Attacks (cont.) What if attackers knew private information about their victims? Oh, wait! Isn’t that what social environments provide?!?!
15
What’s The Big Deal? Name, Age, Gender, and Location Friends Relationship Status Interests and Favorite Things Education/Employment History Etc., Etc., Etc.
16
Socially Enhanced Attacks (cont.) ORIGINAL From: Bellusci Thresa Subject: Jessica Alba's hot scene If your powder is damped and gun can't fire: We know the spark you need! http://yqazqvot.com/http://yqazqvot.com/
17
Socially Enhanced Attacks (cont.) SOCIALLY ENHANCED From: Li Xiong Subject: Jessica Alba's hot scene Steve, Check out this link: http://yqazqvot.com/http://yqazqvot.com/ -Li
18
Socially Enhanced Attacks (cont.) Scary, right?! Not isolated to spam Malware propagation and phishing attacks benefit too
19
Socially Enhanced Attacks (cont.)
20
SOCIALLY ENHANCED From: Li Xiong Subject: Check out this auction… Steve, I think you might like this Kevin Smith auction… http://url.com/http://url.com/ -Li
21
Research Challenges How can we protect users without killing the fun of these environments? How do you identify a needle in a stack of needles?
22
Social Web-specific Attacks Phishing revisited Questionably more dangerous than “old school phishing” Creates a new set of problems…
23
Social Identity Theft “Bryan NEEDS HELP URGENTLY!!!” Twitter fail
24
Fake Profiles “Fakesters” Impersonators Thin line between fun and slander
25
Fake Profiles (cont.) The next generation of spam The next generation of malware propagation
26
Research Questions How do we collect examples of these new attacks? Social Honeypots (CEAS 2008) More importantly, how do we protect users…
27
Purewire Trust Demo http://www.purewiretrust.org
28
Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.