SlideShare a Scribd company logo
1 of 72
Online Social Networks
Threats and Solutions
By Smita V More
Under the guidance of
Dr. Madhumitta Chatterjee
INDEX
• ONLINE SOCIAL NETWROKS (OSN)
• THREATS IN OSN AND ITS TAXONOMY
• ONLINE SOCIAL NETWORK THREATS SOLUTIONS TAXONOMY
• USER ORIENTED SOLUTIONS TAXONOMY
• IMPORTANCE OF ACCESS CONTROL SOLUTIONS
• ACCESS CONTROL SOLUTIONS
• REFERENCES
Online Social Networks[1]
• A social network (SN) is a set of people connected to each other by social relationships.
• Offline Social Networks refer to real-world social communities.
• Online Social Networks (OSNs) are web-based services that offer the functionality of
creating a personal representation of one’s self through which one can socialize with others.
• A main feature of OSNs is the articulation of various types of relationships between
profiles to facilitate the social communication with others.
• The social communication includes various activities such as sharing objects, creating
groups, organizing online and offline events, etc.
• For example Facebook, Twitter, Foursquare, Linked etc.
Threats classification
Threats
Classic threats,
(privacy and
security threats)
Modern
threats(unique
threats)
Combination
threats
Threats
specifically
targeting children
Classic Threats[1]
• Often referred to as malware, spam, cross-site scripting (XSS) attacks, or
phishing, they continue to be an ongoing issue.
• Classic threats take advantage of a user’s personal information published in a
social network to attack not only the user but also their friends simply by
adjusting the threat to accommodate the user’s personal information.
Contd.
• For example, in many cases, these threats target essential and everyday user
resources such as credit card numbers, account passwords, computing power,
and even computer bandwidth (in order to send spam emails).
Types of Classic Threats[1]
• I. Malware: Malware is malicious software developed to disrupt a computer
operation in order to collect a user’s credentials and gain access to his or her
private information.
For example: Koobface was the first malware to successfully propagate
through OSNs such as Facebook, MySpace, and Twitter.
Koobface attempts to collect login information and join the infected
computer in order to be part of a botnet, a so-called “zombie army” of
computers.
Existing malwares
Recent malware milestones
Operation
Aurora Mariposa Conficker Short
URLs
Search engine
optimization
Hactivism
Click fraud
Control and sustainability for malwares
Methods Description
Command-and-control Command-and-control botnets are managed by a single central controller,
often a purpose-built botnet control console such as Zunker, WebAttacker,
MPack, or IcePack..
Drive-by attacks Cybercriminals use a couple of different drive-by attack mechanisms. In one, a
bogus website scans a site visitor’s system for specific vulnerabilities.
HTTP Here it is hiding their command-and-control messages to zombie armies inside
innocent web communications protocols.
Internet relay chat (IRC) This mature communications protocol from early network bulletin boards lets
anyone hold live keyboard conversations with other computers.
Contd.
Methods Description
Peer-to-peer A botnet fault-tolerant strategy, peer-to-peer botnets ignore the loss of any
controller and continue operating standalone until a new manager emerges.
Pull propagation A classic bot attack “pushes” spam with a special offer or lure containing a
malicious payload.
Zero-day exploit A zero-day exploit refers to the release of code whose purpose it is to exploit a
just-published or unpublished vulnerability within an OS
Zero-day window of
opportunity
Zero-day window refer to the time between announcement of a vulnerability
and the release and installation of its associated patch.
Contd.
• II. Phishing Attacks: Phishing attacks are a form of social engineering to
acquire user-sensitive and private information by impersonating a
trustworthy third party.
Contd. [1]
• III. Spammers: Spammers are users who use electronic messaging systems
in order to send unwanted messages, like advertisements, to other users.
An example of the prevalence of network spamming can be found on
Twitter, which has suffered from a massive amount of spam and in August
2009, 11% of Twitter messages were spam messages.
Nevertheless, a 2013 article states, “Social spam, as it already exists on
Twitter, will continue to grow and unless the company addresses the problem
quickly, it may be the one thing that sinks it.”
Cont.[1]
• IV. Cross-Site Scripting (XSS): An XSS attack is an assault against web
applications.
• The attacker who uses the XSS exploits the trust of the web client in the web
application and causes the web client to run malicious code capable of collecting
sensitive information.
XSS worm, called Mikeyy, rapidly transmitted automated tweets across Twitter and
infected many users.
 The Mikeyy worm used an XSS weakness and the Twitter network structure to
spread through Twitter user profiles .
Contd.[1]
• V. Internet Fraud: Internet fraud, also known as cyber fraud, refers to using
Internet access to scam or take advantage of people.
For example, fraudsters have been hacking into the accounts of Facebook
users who travel abroad.
Once they manage to log into a user’s account, the scammers cunningly ask
the user’s friends for assistance in transferring money to the scammer’s bank
account.
Modern Threats[1]
• Modern threats are typically unique to OSN environments.
• Usually these threats specifically target users’ personal information as well as the personal
information of their friends.
 For example, an attacker who is trying to gain access to a Facebook user’s high school
name—view able only by the user’s Facebook friends—can create a fake profile with
pertinent details and initiate a friend request to the targeted user.
 If the user accepts the friend request, his or her details will be exposed to the attacker.
 Alternatively, the attacker can collect data from the user’s Facebook friends and employ an
inference attack to infer the high school name from the data collected from the user’s
friends.
Types of Modern Threats[1]
• I. Clickjacking: Clickjacking is a malicious technique which tricks users into
clicking on something different from what they intended to click.
An example of a click-jacking attack occurred on Twitter in 2009 when
Twitter was plagued by a “Don’t Click” attack.
The attacker tweeted a link with the message “Don’t Click” along with a
masked URL (the actual URL domain was hidden).
When Twitter users clicked on the “Don’t Click” message, the message
automatically spread virally and was posted onto their Twitter accounts.
Contd. [1]
• II. De-Anonymization Attacks: This attacks use techniques such as
tracking cookies, network topology, and user group memberships to uncover
the user’s real identity.
Most recent example was presented by Peled et al; who introduced a method
for matching user profiles across several OSNs.
The method was evaluated by matching profiles across Facebook and Xing.
Contd.[1]
• III. Face Recognition: Many people
use OSNs for uploading pictures
of themselves and their friends.
Millions and millions of photos
are uploaded to Facebook each
Day.
Survey Results
Experiments Types Observation
1 online to online image datasets by using publicly accessible
2 offline to online image datasets can also be matched. namely,
they used publicly available images
3 personal and sensitive information from a
face; an individual’s interests, activities, and
even his or her social security number could
be automatically predicted by matching the
face image with the person’s Facebook image
to obtain the person’s full name.
Contd.
• IV. Fake Profiles: Fake profiles (also referred to as sybils or socialbots) are
automatic or semi-automatic profiles that mimic human behaviours in OSNs.
• These can be used to harvest users’ personal data from social networks.
For example: From one of the survey, it was found that an army of more
than a 100 Facebook socialbots was created which attempted to infiltrate
innocent Facebook profiles, by initiating a series of friend requests. The
socialbot army succeeded in generating approximately 250 GB of inbound
Facebook traffic.
Contd.
• V. Identity Clone Attacks: The attackers duplicate a user’s online presence
either in the same network, or across different networks, to deceive the
cloned user’s friends into forming a trusting relationship with the cloned
profile.
An example of an identity clone attack occured with NATO’s most senior
commander, Admiral James Stavridis, where his profile details were cloned
and then used to collect data on defence ministry officials.
Contd.
• VI. Inference Attacks: These are used to predict a user’s personal, sensitive
information that the user has not chosen to disclose, such as religious
affiliation or sexual orientation.
An inference attack was demonstrated by Mislove et al, who presented
techniques for predicting a user’s attributes based on other users’ attributes in
the OSN, where they tested their techniques and inferred different Facebook
users’ attributes, such as educational, geographical, and their personal
information.
Contd.[1]
• VII. Information Leakage: Users willingly share sensitive information
about themselves and other people, such as health related information, and
sobriety status.
For example, insurance companies may use OSN data to identify risky
clients, as this companies can use OSN leaked information to detect clients
with medical conditions, consequently increasing their premium or denying
the coverage.
Information leakage in OSN[2]
Table:- OSN functions and potential problems to organisations [2]
Factors responsible for information leakages
• The Decomposed Theory of Planned Behaviour an extension to Theory of
Planned Behaviour comprises the following factors for information scanning and
leakages:-
• Attitude towards OSN use
• Social Influence
• Perceived Behavioural Control
• One of the existing example is APT ADVANCED PERSISTENT THREATS
Control measures for Prevention
• Information Security Policy (ISP)
• Security Education, Training and Awareness
• Preventive Security Systems
Contd.[1]
• VIII. Location Leakage: Many people use OSNs to willingly share private
and sometimes sensitive information about their (or their friends’) current or
future whereabouts.
One such example of location leakage threats is given by the website
Pleaserobme.com, which shows a way to find the location information of
specific Twitter and Foursquare users.
Contd.[1]
• IX. Socware: Socware entails fake and possibly damaging posts and
messages from friends in OSNs.
• Socware may lure victims by offering false rewards to users who install
socware-related malicious Facebook applications or visit questionable
socware websites.
For example: In 2012, Rahman et al, investigated over 40 million posts and
discovered that 49% of the studied users were exposed to at least one
socware post in a four-month period.
Working of socware
Mechanisms :-
Propagation mechanism
Exploitation mechanism
Socware
Post consisting of URLs posts typically contain a catchy
text message
How does socware work?
(a) Application installation process on Facebook
Contd.
(b) architecture of MyPageKeeper
Prevention techniques
• Socware was indentified and detected through MyPageKeeper, which is an application.
• Following are the basic components on which this application works:-
 User authorization module
 Crawling module
 Feature extraction module
 Classification module
 Notification module
 User feedback module
Combination Threats [1]
For example, an attacker can use a phishing attack to collect a targeted user’s
Facebook password and then post a message containing a clickjacking attack
on the targeted user’s timeline, thus luring the user’s Facebook friends to
click on the posted message and install a hidden virus onto their own
computers.
Classic threats Modern threats Combination threats
Threats Targeting Children
• Due to the critical nature of this topic, this section highlights those threats,
as well as describes specific findings from current studies.
Types of Threats Targeting Children[1]
• Online Predators: The greatest concern regarding the personal information
safety of children relates to Internet pedophiles, also referred to as online
predators.
Types of harm Categorization
harm from content a child’s exposure to pornography or harmful sexual content
harm from contact a child who is contacted by an adult or another child for the purpose
of sexual abuse
harm from conduct the child as an active initiator of abusive or risky behaviours
Contd.
• Risky Behaviours: Potential risky behaviours of children may include direct
online communication with strangers, use of chat rooms for interactions
with strangers, sexually explicit talk with strangers, and giving private
information and photos to strangers.
Re-searchers contend that victims of Internet abuse are very often
vulnerable children, such as youths with a history of physical or sexual abuse
or those who suffer from depression or social interaction problems.
Contd.
• Cyberbullying: Cyberbullying (also referred to as cyber abuse) is bullying
that takes place within technological communication platforms, emails, chats,
phones conversations, and OSNs, by an attacker.
Threats to Online Social Networks Users
Classic Threats Modern Threats Combination Threats Threats targeting Children
Malware
Phishing Attacks
Spammers
Cross Site Scripting
(XSS)
Internet Fraud
Clickjacking
De anonymization
Attacks
Face Recognition
Fake Profiles
(Socialbots)
Identify Clone Attacks
Inference Attacks
Information Leakage
Location Leakage
Socware
Online
Predators
Risky
Behaviours
Cyberbullying
Taxonomy of Online Threats[1]
Combination
of clickjacking
and phishing
attacks
Taxonomy of Solutions [1]:-
User Threats Solutions
Some crucial threats
Operator solutions Commercial Solutions Academic Solutions
Authentication
mechanisms
Security and Privacy
settings
Internal Protection
Mechanisms
Report Users MinorMonitor
Defensio
MyPermissions
FB Phishing
Protector
Preventing
Information
and Location
Leakage
Cloned Profile
Detection
Operator Solutions Taxonomy[1]
• OSN operators attempt to protect their users by activating safety measures,
such as employing user authentication mechanisms and applying user privacy
settings. Several of these techniques are described in detail below.
I. Authentication Mechanisms[1]
• OSN operators use authentication mechanisms, such as CAPTCHA, photos-
of-friends identification, multi-factor authentication, and in some cases even
requesting that the user send a copy of his or her government issued ID.
Design implementation of Facebook’s photo-
based authentication mechanism
Design Implementation
II. Security and Privacy Settings[1]
• Many OSNs support various configurable user privacy settings that enable
users to protect their personal data from other users or applications.
Procedural Approach [5]
Stages Steps Description
1 Survey of Privacy Attitude Survey the participant’s privacy attitudes and their experience with Facebook.
2 Collection of Intentions Gather participant’s sharing intentions for each profile group per information
category using a table of information categories and profile groups.
3 Identification of Potential
Violations
Examine participant’s Facebook data to identify potential violations based on the
intentions stated in Stage 2.
4 Confirmation of Violations Present participant with their potential violations, allow them to confirm the actual
violations, and survey their intent to act on the violation.
Collection of Intentions
Figure:- The color user interface to collect participant’s sharing intentions in Stage 2.
III. Internal Protection Mechanisms[1]
• Several OSNs protect their users by implementing additional internal
protection mechanisms for defence against spammers, fake profiles, scams,
and other threats.
• Facebook, for example, protects its users from malicious attacks and
information collecting by activating the Facebook Immune System (FIS).
• The FIS is described as an adversarial learning system that performs real-
time checks and classifications on read-and-write actions on Facebook’s
database.
IV. Report Users
Procedure:
• To report a user, go to their user page, and
click on the Report this User button below the
What I've Been Doing section.
• One you have selected what you are
reporting, you can either press Send to send
the report to the Scratch Team or press
Cancel to cancel the report.
When should a user be reported?
 If his/her username is inappropriate
 If he/she has an inappropriate icon or
inappropriate text in the description fields
 The "user" is impersonation of another user
Commercial solutions Taxonomy[1]
• Various commercial companies have expanded their traditional Internet
security options and now offer software solutions specifically for OSN users
to better protect themselves against threats.
I. FB Phishing Protector
• FB Phishing Protector is a Firefox add-on which warns Facebook users
when a suspicious activity is detected, such as a script-injection attempt.
• This add-on provides protection against various phishing attacks
• The FB Phishing Protector add-on works by detecting and blocking XSS
(cross side script) injection in the Facebook content.
II. Mypermissions
• Online Permissions Technologies’ MyPermissions is a web service that
provides its users with convenient links to the permissions pages for many
OSNs, such as Facebook, Twitter, and LinkedIn.
• These links can help users view and revoke the permissions they had given in
the past to various applications, thus better protecting their privacy.
Setting for Mypermissions
Figure:- Mypermission app settings
III. Defensio
• Websense’s Defensio web service helps protect social network users from threats like links to malware that
could be posted on the user’s Facebook page.
• The Defensio service also assists in preventing information leakage by controlling the user’s published
content by removing certain words from posts or filtering specific comments.
• Following are some of the malicious contents which Defensio detects:-
 Spam content
 Attempts to distribute malware
 Links to undesirable content categories (e.g., adult material, gambling, etc.)
 Links to executable files
 The inclusion of JavaScript or VBScript
Controlling of comments through Defensio
Figure:- Defensio mechanisms
IV. MinorMonitor
• Infoglide’s MinorMonitor is a parental control web-service which gives
parents a quick dashboard view of their child’s Facebook activities and online
friends.
• By using MinorMonitor, parents can be informed about questionable
content that may have been revealed to their child, and they can identify
overage friends in their child’s Facebook friends list.
MinorMonitor working
Figure:- MyMonitor app settings
Academic solutions[1]
• These solutions have primarily focused on identifying malicious users and
applications.
• These academic solutions provide cutting-edge insight into dealing with
social network threats.
• They can be used by OSN operators to improve their users’ security and
privacy, by security companies to offer the customers better OSN protection,
or by early-adopter OSN users who want to better protect themselves.
I. Cloned Profile Detection
• A cloned profile could be used to send falsified messages in order to harm
the original user.
• The victimized user has no way of knowing the existence of the fake profiles
(especially if across social networks).
Methodology[6]:-
• It’s a prototype which can be employed to investigate whether or not users
have fallen victim to clone attacks.
System design and its working [6]
Figure:- Methodogy to detect cloned profiles
II. Preventing Information and Location
Leakage[7]
Module wise working approach
• Here “guardian angel service” that can monitor users’ tweets and alert users to potential privacy
violations.
 The Classifier module is used to automatically detect sensitive tweets.
 The Content Analysis module provides information about what private topics are revealed from drunk
and disease related tweets, which also can be utilized by Classifier to select classification labels.
 The system thus outputs a stream of sensitive tweets leaking private information through the Classifier.
Taxonomy of Access control solutions
• Access control Solutions
Operator
solutions
Commercial
solutions
MyPermissions
Defensio
MinorMonitor
Importance of Access control [8]
• Online social networks (OSNs) have analyses large growth in recent years and
become a saturation for hundreds of millions of Internet users.
• These OSNs offer to enforce attractive means for digital social interactions and
information contribution, but also increase a number of security and privacy issues.
• Right to use manage mechanism is provide to restrict shared data, they currently do
not provide any mechanism to minimize problem of multiuser shared data.
• Hence access control mechanisms has become the prime need in order to secure the
Online social networking.
Access Control Policy Taxonomy
Figure:- Access Control Policy Taxonomy
Access Control Models
Figure : Model Components
Figure:- Access control Models
COMPARATIVE ANALYSIS
Solutions Threats
Information
Leakage
Location
Leakage
Socware Cyberbullying Internet Fraud Spammers Fake profiles Face
Recognization
Identify clone
attack
Information
Security
Policy(ISP),
Security
Education,
Training And
Awareness
(SETA) &
Preventive
security
systems.
Yes Yes Yes Yes Yes No No No No
MyPageKeeper
application
Yes Yes Yes No No Yes No No No
Solutions Threats
Information
Leakage
Location
Leakage
Socware Cyberbullying Internet Fraud Spammers Fake profiles Face
Recognization
Identify clone
attack
Photo-based
social
authentication ;
including node
attributes and
edge attributes
No No No No Yes No Yes Yes Yes
Application and
stage wise
approach
No No No No No No Yes Yes No
Solutio
ns
Threats
Information
Leakage
Location
Leakage
Socware Cyberbullyin
g
Internet
Fraud
Spammers Fake profiles Face
Recognizatio
n
Identify
clone attack
Prototype
architectural
system and
design
implementati
on
No No No No No No Yes Yes Yes
The three
filter
modules
Yes Yes No No No No No No No
References
1. Online Social Networks: Threats and Solutions, Michael Fire, Roy
Goldschmidt, and Yuval Elovici, 2014
2. Information Leakage through Online Social Networking: Opening the
Doorway for Advanced Persistence Threats, Nurul Nuha Abdul Molok
University of Melbourne Shanton Chang, 2010
3. Efficient and Scalable Socware Detection in Online Social Networks, Md
Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis
Faloutsos.
Contd.
4. New Directions in Social Authentication, Sakshi Jain ,Juan Lang, Neil
Zhenqiang Gong, Dawn Song, Sreya Basuroy, Prateek Mittal
5. The Failure of Online Social Network Privacy Settings, Michelle Madejskiy
Maritza Johnson, Steven M. Bellovin.
6. Detecting Social Network Profile Cloning, Georgios Kontaxis, Iasonas
Polakis, Sotiris Ioannidis and Evangelos P. Markatos, Georgios Kontaxis,
Iasonas Polakis, Sotiris Ioannidis and Evangelos P. Markatos, 2011
Contd.
7. Loose Tweets: An Analysis of Privacy Leaks on Twitter, Huina Mao, Xin
Shuai, Apu Kapadia
8. An Access Control Model for Online Social Networks Using User-to-User
Relationships, Yuan Cheng, Jaehong Park, and Ravi Sandhu, 2015.
THANK YOU

More Related Content

Viewers also liked

lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkingHamid Zainudin
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry BenRay95
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyPECB
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Viewers also liked (16)

lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to osn-threats-solutions-2

Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
 
Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...IJECEIAES
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxdanielloberiz1
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
E0334035040
E0334035040E0334035040
E0334035040theijes
 
A research of software vulnerabilities
A research of software vulnerabilitiesA research of software vulnerabilities
A research of software vulnerabilitiesAlireza Aghamohammadi
 
The Anatomy of an Anonymous Attack
The Anatomy of an Anonymous AttackThe Anatomy of an Anonymous Attack
The Anatomy of an Anonymous AttackImperva
 
A Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on TwitterA Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on Twitterijtsrd
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Chandrakanth Narreddy
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 

Similar to osn-threats-solutions-2 (20)

Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
E0334035040
E0334035040E0334035040
E0334035040
 
A research of software vulnerabilities
A research of software vulnerabilitiesA research of software vulnerabilities
A research of software vulnerabilities
 
The Anatomy of an Anonymous Attack
The Anatomy of an Anonymous AttackThe Anatomy of an Anonymous Attack
The Anatomy of an Anonymous Attack
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on TwitterA Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on Twitter
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
unit 2.pptx
unit 2.pptxunit 2.pptx
unit 2.pptx
 
6356152.pdf
6356152.pdf6356152.pdf
6356152.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 

osn-threats-solutions-2

  • 1. Online Social Networks Threats and Solutions By Smita V More Under the guidance of Dr. Madhumitta Chatterjee
  • 2. INDEX • ONLINE SOCIAL NETWROKS (OSN) • THREATS IN OSN AND ITS TAXONOMY • ONLINE SOCIAL NETWORK THREATS SOLUTIONS TAXONOMY • USER ORIENTED SOLUTIONS TAXONOMY • IMPORTANCE OF ACCESS CONTROL SOLUTIONS • ACCESS CONTROL SOLUTIONS • REFERENCES
  • 3. Online Social Networks[1] • A social network (SN) is a set of people connected to each other by social relationships. • Offline Social Networks refer to real-world social communities. • Online Social Networks (OSNs) are web-based services that offer the functionality of creating a personal representation of one’s self through which one can socialize with others. • A main feature of OSNs is the articulation of various types of relationships between profiles to facilitate the social communication with others. • The social communication includes various activities such as sharing objects, creating groups, organizing online and offline events, etc. • For example Facebook, Twitter, Foursquare, Linked etc.
  • 4. Threats classification Threats Classic threats, (privacy and security threats) Modern threats(unique threats) Combination threats Threats specifically targeting children
  • 5. Classic Threats[1] • Often referred to as malware, spam, cross-site scripting (XSS) attacks, or phishing, they continue to be an ongoing issue. • Classic threats take advantage of a user’s personal information published in a social network to attack not only the user but also their friends simply by adjusting the threat to accommodate the user’s personal information.
  • 6. Contd. • For example, in many cases, these threats target essential and everyday user resources such as credit card numbers, account passwords, computing power, and even computer bandwidth (in order to send spam emails).
  • 7. Types of Classic Threats[1] • I. Malware: Malware is malicious software developed to disrupt a computer operation in order to collect a user’s credentials and gain access to his or her private information. For example: Koobface was the first malware to successfully propagate through OSNs such as Facebook, MySpace, and Twitter. Koobface attempts to collect login information and join the infected computer in order to be part of a botnet, a so-called “zombie army” of computers.
  • 8. Existing malwares Recent malware milestones Operation Aurora Mariposa Conficker Short URLs Search engine optimization Hactivism Click fraud
  • 9. Control and sustainability for malwares Methods Description Command-and-control Command-and-control botnets are managed by a single central controller, often a purpose-built botnet control console such as Zunker, WebAttacker, MPack, or IcePack.. Drive-by attacks Cybercriminals use a couple of different drive-by attack mechanisms. In one, a bogus website scans a site visitor’s system for specific vulnerabilities. HTTP Here it is hiding their command-and-control messages to zombie armies inside innocent web communications protocols. Internet relay chat (IRC) This mature communications protocol from early network bulletin boards lets anyone hold live keyboard conversations with other computers.
  • 10. Contd. Methods Description Peer-to-peer A botnet fault-tolerant strategy, peer-to-peer botnets ignore the loss of any controller and continue operating standalone until a new manager emerges. Pull propagation A classic bot attack “pushes” spam with a special offer or lure containing a malicious payload. Zero-day exploit A zero-day exploit refers to the release of code whose purpose it is to exploit a just-published or unpublished vulnerability within an OS Zero-day window of opportunity Zero-day window refer to the time between announcement of a vulnerability and the release and installation of its associated patch.
  • 11. Contd. • II. Phishing Attacks: Phishing attacks are a form of social engineering to acquire user-sensitive and private information by impersonating a trustworthy third party.
  • 12. Contd. [1] • III. Spammers: Spammers are users who use electronic messaging systems in order to send unwanted messages, like advertisements, to other users. An example of the prevalence of network spamming can be found on Twitter, which has suffered from a massive amount of spam and in August 2009, 11% of Twitter messages were spam messages. Nevertheless, a 2013 article states, “Social spam, as it already exists on Twitter, will continue to grow and unless the company addresses the problem quickly, it may be the one thing that sinks it.”
  • 13. Cont.[1] • IV. Cross-Site Scripting (XSS): An XSS attack is an assault against web applications. • The attacker who uses the XSS exploits the trust of the web client in the web application and causes the web client to run malicious code capable of collecting sensitive information. XSS worm, called Mikeyy, rapidly transmitted automated tweets across Twitter and infected many users.  The Mikeyy worm used an XSS weakness and the Twitter network structure to spread through Twitter user profiles .
  • 14. Contd.[1] • V. Internet Fraud: Internet fraud, also known as cyber fraud, refers to using Internet access to scam or take advantage of people. For example, fraudsters have been hacking into the accounts of Facebook users who travel abroad. Once they manage to log into a user’s account, the scammers cunningly ask the user’s friends for assistance in transferring money to the scammer’s bank account.
  • 15. Modern Threats[1] • Modern threats are typically unique to OSN environments. • Usually these threats specifically target users’ personal information as well as the personal information of their friends.  For example, an attacker who is trying to gain access to a Facebook user’s high school name—view able only by the user’s Facebook friends—can create a fake profile with pertinent details and initiate a friend request to the targeted user.  If the user accepts the friend request, his or her details will be exposed to the attacker.  Alternatively, the attacker can collect data from the user’s Facebook friends and employ an inference attack to infer the high school name from the data collected from the user’s friends.
  • 16. Types of Modern Threats[1] • I. Clickjacking: Clickjacking is a malicious technique which tricks users into clicking on something different from what they intended to click. An example of a click-jacking attack occurred on Twitter in 2009 when Twitter was plagued by a “Don’t Click” attack. The attacker tweeted a link with the message “Don’t Click” along with a masked URL (the actual URL domain was hidden). When Twitter users clicked on the “Don’t Click” message, the message automatically spread virally and was posted onto their Twitter accounts.
  • 17. Contd. [1] • II. De-Anonymization Attacks: This attacks use techniques such as tracking cookies, network topology, and user group memberships to uncover the user’s real identity. Most recent example was presented by Peled et al; who introduced a method for matching user profiles across several OSNs. The method was evaluated by matching profiles across Facebook and Xing.
  • 18. Contd.[1] • III. Face Recognition: Many people use OSNs for uploading pictures of themselves and their friends. Millions and millions of photos are uploaded to Facebook each Day.
  • 19. Survey Results Experiments Types Observation 1 online to online image datasets by using publicly accessible 2 offline to online image datasets can also be matched. namely, they used publicly available images 3 personal and sensitive information from a face; an individual’s interests, activities, and even his or her social security number could be automatically predicted by matching the face image with the person’s Facebook image to obtain the person’s full name.
  • 20. Contd. • IV. Fake Profiles: Fake profiles (also referred to as sybils or socialbots) are automatic or semi-automatic profiles that mimic human behaviours in OSNs. • These can be used to harvest users’ personal data from social networks. For example: From one of the survey, it was found that an army of more than a 100 Facebook socialbots was created which attempted to infiltrate innocent Facebook profiles, by initiating a series of friend requests. The socialbot army succeeded in generating approximately 250 GB of inbound Facebook traffic.
  • 21. Contd. • V. Identity Clone Attacks: The attackers duplicate a user’s online presence either in the same network, or across different networks, to deceive the cloned user’s friends into forming a trusting relationship with the cloned profile. An example of an identity clone attack occured with NATO’s most senior commander, Admiral James Stavridis, where his profile details were cloned and then used to collect data on defence ministry officials.
  • 22. Contd. • VI. Inference Attacks: These are used to predict a user’s personal, sensitive information that the user has not chosen to disclose, such as religious affiliation or sexual orientation. An inference attack was demonstrated by Mislove et al, who presented techniques for predicting a user’s attributes based on other users’ attributes in the OSN, where they tested their techniques and inferred different Facebook users’ attributes, such as educational, geographical, and their personal information.
  • 23. Contd.[1] • VII. Information Leakage: Users willingly share sensitive information about themselves and other people, such as health related information, and sobriety status. For example, insurance companies may use OSN data to identify risky clients, as this companies can use OSN leaked information to detect clients with medical conditions, consequently increasing their premium or denying the coverage.
  • 24. Information leakage in OSN[2] Table:- OSN functions and potential problems to organisations [2]
  • 25. Factors responsible for information leakages • The Decomposed Theory of Planned Behaviour an extension to Theory of Planned Behaviour comprises the following factors for information scanning and leakages:- • Attitude towards OSN use • Social Influence • Perceived Behavioural Control • One of the existing example is APT ADVANCED PERSISTENT THREATS
  • 26. Control measures for Prevention • Information Security Policy (ISP) • Security Education, Training and Awareness • Preventive Security Systems
  • 27. Contd.[1] • VIII. Location Leakage: Many people use OSNs to willingly share private and sometimes sensitive information about their (or their friends’) current or future whereabouts. One such example of location leakage threats is given by the website Pleaserobme.com, which shows a way to find the location information of specific Twitter and Foursquare users.
  • 28. Contd.[1] • IX. Socware: Socware entails fake and possibly damaging posts and messages from friends in OSNs. • Socware may lure victims by offering false rewards to users who install socware-related malicious Facebook applications or visit questionable socware websites. For example: In 2012, Rahman et al, investigated over 40 million posts and discovered that 49% of the studied users were exposed to at least one socware post in a four-month period.
  • 29. Working of socware Mechanisms :- Propagation mechanism Exploitation mechanism Socware Post consisting of URLs posts typically contain a catchy text message
  • 30. How does socware work? (a) Application installation process on Facebook
  • 32. Prevention techniques • Socware was indentified and detected through MyPageKeeper, which is an application. • Following are the basic components on which this application works:-  User authorization module  Crawling module  Feature extraction module  Classification module  Notification module  User feedback module
  • 33. Combination Threats [1] For example, an attacker can use a phishing attack to collect a targeted user’s Facebook password and then post a message containing a clickjacking attack on the targeted user’s timeline, thus luring the user’s Facebook friends to click on the posted message and install a hidden virus onto their own computers. Classic threats Modern threats Combination threats
  • 34. Threats Targeting Children • Due to the critical nature of this topic, this section highlights those threats, as well as describes specific findings from current studies.
  • 35. Types of Threats Targeting Children[1] • Online Predators: The greatest concern regarding the personal information safety of children relates to Internet pedophiles, also referred to as online predators. Types of harm Categorization harm from content a child’s exposure to pornography or harmful sexual content harm from contact a child who is contacted by an adult or another child for the purpose of sexual abuse harm from conduct the child as an active initiator of abusive or risky behaviours
  • 36. Contd. • Risky Behaviours: Potential risky behaviours of children may include direct online communication with strangers, use of chat rooms for interactions with strangers, sexually explicit talk with strangers, and giving private information and photos to strangers. Re-searchers contend that victims of Internet abuse are very often vulnerable children, such as youths with a history of physical or sexual abuse or those who suffer from depression or social interaction problems.
  • 37. Contd. • Cyberbullying: Cyberbullying (also referred to as cyber abuse) is bullying that takes place within technological communication platforms, emails, chats, phones conversations, and OSNs, by an attacker.
  • 38. Threats to Online Social Networks Users Classic Threats Modern Threats Combination Threats Threats targeting Children Malware Phishing Attacks Spammers Cross Site Scripting (XSS) Internet Fraud Clickjacking De anonymization Attacks Face Recognition Fake Profiles (Socialbots) Identify Clone Attacks Inference Attacks Information Leakage Location Leakage Socware Online Predators Risky Behaviours Cyberbullying Taxonomy of Online Threats[1] Combination of clickjacking and phishing attacks
  • 40. User Threats Solutions Some crucial threats Operator solutions Commercial Solutions Academic Solutions Authentication mechanisms Security and Privacy settings Internal Protection Mechanisms Report Users MinorMonitor Defensio MyPermissions FB Phishing Protector Preventing Information and Location Leakage Cloned Profile Detection
  • 41. Operator Solutions Taxonomy[1] • OSN operators attempt to protect their users by activating safety measures, such as employing user authentication mechanisms and applying user privacy settings. Several of these techniques are described in detail below.
  • 42. I. Authentication Mechanisms[1] • OSN operators use authentication mechanisms, such as CAPTCHA, photos- of-friends identification, multi-factor authentication, and in some cases even requesting that the user send a copy of his or her government issued ID.
  • 43. Design implementation of Facebook’s photo- based authentication mechanism Design Implementation
  • 44. II. Security and Privacy Settings[1] • Many OSNs support various configurable user privacy settings that enable users to protect their personal data from other users or applications.
  • 45. Procedural Approach [5] Stages Steps Description 1 Survey of Privacy Attitude Survey the participant’s privacy attitudes and their experience with Facebook. 2 Collection of Intentions Gather participant’s sharing intentions for each profile group per information category using a table of information categories and profile groups. 3 Identification of Potential Violations Examine participant’s Facebook data to identify potential violations based on the intentions stated in Stage 2. 4 Confirmation of Violations Present participant with their potential violations, allow them to confirm the actual violations, and survey their intent to act on the violation.
  • 46. Collection of Intentions Figure:- The color user interface to collect participant’s sharing intentions in Stage 2.
  • 47. III. Internal Protection Mechanisms[1] • Several OSNs protect their users by implementing additional internal protection mechanisms for defence against spammers, fake profiles, scams, and other threats. • Facebook, for example, protects its users from malicious attacks and information collecting by activating the Facebook Immune System (FIS). • The FIS is described as an adversarial learning system that performs real- time checks and classifications on read-and-write actions on Facebook’s database.
  • 48. IV. Report Users Procedure: • To report a user, go to their user page, and click on the Report this User button below the What I've Been Doing section. • One you have selected what you are reporting, you can either press Send to send the report to the Scratch Team or press Cancel to cancel the report. When should a user be reported?  If his/her username is inappropriate  If he/she has an inappropriate icon or inappropriate text in the description fields  The "user" is impersonation of another user
  • 49. Commercial solutions Taxonomy[1] • Various commercial companies have expanded their traditional Internet security options and now offer software solutions specifically for OSN users to better protect themselves against threats.
  • 50. I. FB Phishing Protector • FB Phishing Protector is a Firefox add-on which warns Facebook users when a suspicious activity is detected, such as a script-injection attempt. • This add-on provides protection against various phishing attacks • The FB Phishing Protector add-on works by detecting and blocking XSS (cross side script) injection in the Facebook content.
  • 51. II. Mypermissions • Online Permissions Technologies’ MyPermissions is a web service that provides its users with convenient links to the permissions pages for many OSNs, such as Facebook, Twitter, and LinkedIn. • These links can help users view and revoke the permissions they had given in the past to various applications, thus better protecting their privacy.
  • 52. Setting for Mypermissions Figure:- Mypermission app settings
  • 53. III. Defensio • Websense’s Defensio web service helps protect social network users from threats like links to malware that could be posted on the user’s Facebook page. • The Defensio service also assists in preventing information leakage by controlling the user’s published content by removing certain words from posts or filtering specific comments. • Following are some of the malicious contents which Defensio detects:-  Spam content  Attempts to distribute malware  Links to undesirable content categories (e.g., adult material, gambling, etc.)  Links to executable files  The inclusion of JavaScript or VBScript
  • 54. Controlling of comments through Defensio Figure:- Defensio mechanisms
  • 55. IV. MinorMonitor • Infoglide’s MinorMonitor is a parental control web-service which gives parents a quick dashboard view of their child’s Facebook activities and online friends. • By using MinorMonitor, parents can be informed about questionable content that may have been revealed to their child, and they can identify overage friends in their child’s Facebook friends list.
  • 57. Academic solutions[1] • These solutions have primarily focused on identifying malicious users and applications. • These academic solutions provide cutting-edge insight into dealing with social network threats. • They can be used by OSN operators to improve their users’ security and privacy, by security companies to offer the customers better OSN protection, or by early-adopter OSN users who want to better protect themselves.
  • 58. I. Cloned Profile Detection • A cloned profile could be used to send falsified messages in order to harm the original user. • The victimized user has no way of knowing the existence of the fake profiles (especially if across social networks). Methodology[6]:- • It’s a prototype which can be employed to investigate whether or not users have fallen victim to clone attacks.
  • 59. System design and its working [6] Figure:- Methodogy to detect cloned profiles
  • 60. II. Preventing Information and Location Leakage[7]
  • 61. Module wise working approach • Here “guardian angel service” that can monitor users’ tweets and alert users to potential privacy violations.  The Classifier module is used to automatically detect sensitive tweets.  The Content Analysis module provides information about what private topics are revealed from drunk and disease related tweets, which also can be utilized by Classifier to select classification labels.  The system thus outputs a stream of sensitive tweets leaking private information through the Classifier.
  • 62. Taxonomy of Access control solutions • Access control Solutions Operator solutions Commercial solutions MyPermissions Defensio MinorMonitor
  • 63. Importance of Access control [8] • Online social networks (OSNs) have analyses large growth in recent years and become a saturation for hundreds of millions of Internet users. • These OSNs offer to enforce attractive means for digital social interactions and information contribution, but also increase a number of security and privacy issues. • Right to use manage mechanism is provide to restrict shared data, they currently do not provide any mechanism to minimize problem of multiuser shared data. • Hence access control mechanisms has become the prime need in order to secure the Online social networking.
  • 64. Access Control Policy Taxonomy Figure:- Access Control Policy Taxonomy
  • 65. Access Control Models Figure : Model Components Figure:- Access control Models
  • 66. COMPARATIVE ANALYSIS Solutions Threats Information Leakage Location Leakage Socware Cyberbullying Internet Fraud Spammers Fake profiles Face Recognization Identify clone attack Information Security Policy(ISP), Security Education, Training And Awareness (SETA) & Preventive security systems. Yes Yes Yes Yes Yes No No No No MyPageKeeper application Yes Yes Yes No No Yes No No No
  • 67. Solutions Threats Information Leakage Location Leakage Socware Cyberbullying Internet Fraud Spammers Fake profiles Face Recognization Identify clone attack Photo-based social authentication ; including node attributes and edge attributes No No No No Yes No Yes Yes Yes Application and stage wise approach No No No No No No Yes Yes No
  • 68. Solutio ns Threats Information Leakage Location Leakage Socware Cyberbullyin g Internet Fraud Spammers Fake profiles Face Recognizatio n Identify clone attack Prototype architectural system and design implementati on No No No No No No Yes Yes Yes The three filter modules Yes Yes No No No No No No No
  • 69. References 1. Online Social Networks: Threats and Solutions, Michael Fire, Roy Goldschmidt, and Yuval Elovici, 2014 2. Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats, Nurul Nuha Abdul Molok University of Melbourne Shanton Chang, 2010 3. Efficient and Scalable Socware Detection in Online Social Networks, Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.
  • 70. Contd. 4. New Directions in Social Authentication, Sakshi Jain ,Juan Lang, Neil Zhenqiang Gong, Dawn Song, Sreya Basuroy, Prateek Mittal 5. The Failure of Online Social Network Privacy Settings, Michelle Madejskiy Maritza Johnson, Steven M. Bellovin. 6. Detecting Social Network Profile Cloning, Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis and Evangelos P. Markatos, Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis and Evangelos P. Markatos, 2011
  • 71. Contd. 7. Loose Tweets: An Analysis of Privacy Leaks on Twitter, Huina Mao, Xin Shuai, Apu Kapadia 8. An Access Control Model for Online Social Networks Using User-to-User Relationships, Yuan Cheng, Jaehong Park, and Ravi Sandhu, 2015.