SlideShare a Scribd company logo
1 of 14
A Survey on Deceptions
in Online Social
Networks (OSNs)
Shafiza Mohd Shariff
MIIT,
Universiti Kuala Lumpur
Presentation Outline
• Introduction
• Categorisation of Deceptions in OSNs
• Prevention and Detection Solution
• Trust Evaluation for Protection of
Deceptions
• Conclusions
• Q&A
Introduction
Categorisation of Deceptions in OSNs
• Harvesting Information
– Techniques:
• Phishing
 Email harvesting
 Send out email with a fake URL link.
• Account hijacking
 Hijack an existing user account through the OSN’s session
cookies hijacking.
 Attacker impersonate the victim and retrieve the required
information from the victim’s friends.
Categorisation of Deceptions in OSNs
• Identity Cloning Attacks (ICA)
Queen Elsa
Princess AnnaOlaf
Kristoff Prince Hans
Cinderella Rapunzel
Princess Charming
Elsa2014
Categorisation of Deceptions in OSNs
• Boosting Reputation in the OSNs
– Sybil Attack
• Attacker creates multiple fake profiles called Sybil
nodes.
• These Sybil nodes will ’like’ the attacker’s
post/link/comment or give ratings.
• This act unfairly increases the attacker’s rating,
gaining them the reputation and power to influence
and deceive other users in the same site.
Categorisation of Deceptions in OSNs
• Spam
– Sharing wall post, and spread itself to friend’s
wall post containing links or advertisements,
attracting OSN users to click them.
• Gaining numbers (esp. Twitter)
– To gain trust and support from the other users
and the public by deceiving them on the
number of followers.
Categorisation of Deceptions in OSNs
• Diffusion of Misinformation
Prevention and Detection Solution
Deception Threat Protection Solution
Identity Cloning Attack
(ICA)
User profile and friends’ link network similarity detection
- Similar identities are filtered using profile similarities,
friend list network and other attributes. If the similarities
exceed the set minimum value, the identities are
considered as suspicious and will be validated.
Spam Social message similarity detection
- Spammers’ message contents are similar towards their
friend lists or on their wall as they are advertisements and
containing URL links to certain websites.
Software application
- Barracuda Labs developed Barracuda Profile Protector
and a prototype by the researchers at University of
California analyses content posted by OSNs users. It will
detect, block or remove malicious or suspicious content.
Prevention and Detection Solution
Deception Threat Protection Solution
Sybil attack SybilGuard
- A technique that examines the entire social network to
cluster the Sybil nodes together base on the relationship
edge, limiting the attack edges by the Sybil nodes.
Diffusion of
misinformation
Social and engagement interactions
- Having high number of social interaction increases the
trust level between users. It will computes more
reasonable trust values that satisfy the source constraints
considering the impact of social aspects and the property
of trust.
Trust Evaluation for Protection of
Deceptions
• User trust propagation evaluation
– OSN users that receive a request from new OSN
user cannot determine the requestor’s identity
as the could be forged by the attacker based
from the original user.
– Propose:
• Doing cross social network profile from an external
and the internal source could help in evaluating the
user’s trust level and propagate trust to the other
users.
Trust Evaluation for Protection of
Deceptions
• Information credibility evaluation
– Users have to assess the credibility of information
sources by themselves.
– Current solution:
• The CredRank algorithm calculates users’ credibility by
computing the user’s message posts similarity and their
behaviour similarity in order to cluster them together
– Information shared by credible user really came from
them and not an impostor / the information is credible.
– Propose:
• To avoid misinformation diffused by a credible user, each post
should be reviewed externally and ranked through the reply
comments from the followers.
Conclusions
• Trust relationship in OSNs can be easily
deceived.
• However, trust mechanism can also be an
effective mean to prevent deceptions.
• OSN user trust and information credibility
evaluations are promising approaches to
prevent deception in OSNs.
Q
&
A

More Related Content

What's hot

Gam Documentation
Gam DocumentationGam Documentation
Gam Documentation
David Chen
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
ijistjournal
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 

What's hot (17)

Gam Documentation
Gam DocumentationGam Documentation
Gam Documentation
 
website phishing by NR
website phishing by NRwebsite phishing by NR
website phishing by NR
 
Phishing - Prevention and Detection and Remediation
Phishing - Prevention and Detection and RemediationPhishing - Prevention and Detection and Remediation
Phishing - Prevention and Detection and Remediation
 
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
 
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
 
Root conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbmRoot conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbm
 
Iy2515891593
Iy2515891593Iy2515891593
Iy2515891593
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)
 
Phishing
PhishingPhishing
Phishing
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 

Viewers also liked

Class assignnment 4
Class assignnment 4Class assignnment 4
Class assignnment 4
mitchellene
 
Costume Designs
Costume Designs Costume Designs
Costume Designs
Sammi Wilde
 
Fair assessment, Bulgaria
Fair assessment,  BulgariaFair assessment,  Bulgaria
Fair assessment, Bulgaria
Tanya Madjarova
 

Viewers also liked (20)

Edtc 6340-66 copyright crash course alberto tudon 3rd ed
Edtc 6340-66 copyright crash course  alberto tudon 3rd edEdtc 6340-66 copyright crash course  alberto tudon 3rd ed
Edtc 6340-66 copyright crash course alberto tudon 3rd ed
 
Class assignnment 4
Class assignnment 4Class assignnment 4
Class assignnment 4
 
Costume Designs
Costume Designs Costume Designs
Costume Designs
 
Takala: Juova vanhempi - pahoinvoiva nuori?
Takala: Juova vanhempi - pahoinvoiva nuori?Takala: Juova vanhempi - pahoinvoiva nuori?
Takala: Juova vanhempi - pahoinvoiva nuori?
 
Parent survey Lincoln Heights 2011
Parent survey Lincoln Heights 2011Parent survey Lincoln Heights 2011
Parent survey Lincoln Heights 2011
 
Программа здоровье опорно двигательного аппарата
Программа здоровье опорно двигательного аппарата Программа здоровье опорно двигательного аппарата
Программа здоровье опорно двигательного аппарата
 
Datafesta 20141004_05
Datafesta 20141004_05Datafesta 20141004_05
Datafesta 20141004_05
 
Don't be an altruistic angel. Be open about what is in it for you.
Don't be an altruistic angel.  Be open about what is in it for you.Don't be an altruistic angel.  Be open about what is in it for you.
Don't be an altruistic angel. Be open about what is in it for you.
 
Photos de Paris - France
Photos de Paris - France Photos de Paris - France
Photos de Paris - France
 
Pantheon basics
Pantheon basicsPantheon basics
Pantheon basics
 
Production log
Production logProduction log
Production log
 
Iubesc animalele-completat cu desene
Iubesc animalele-completat cu deseneIubesc animalele-completat cu desene
Iubesc animalele-completat cu desene
 
Declare independence from your it department sysadmin skills for symfony dev...
Declare independence from your it department  sysadmin skills for symfony dev...Declare independence from your it department  sysadmin skills for symfony dev...
Declare independence from your it department sysadmin skills for symfony dev...
 
Fair assessment, Bulgaria
Fair assessment,  BulgariaFair assessment,  Bulgaria
Fair assessment, Bulgaria
 
Ceramica
CeramicaCeramica
Ceramica
 
Pet photo workshop for shelter/rescue volunteers
Pet photo workshop for shelter/rescue volunteersPet photo workshop for shelter/rescue volunteers
Pet photo workshop for shelter/rescue volunteers
 
20110907102119431
2011090710211943120110907102119431
20110907102119431
 
E-democracy: Comparison of opportunities in the Western Balkan countries
E-democracy: Comparison of opportunities in the Western Balkan countriesE-democracy: Comparison of opportunities in the Western Balkan countries
E-democracy: Comparison of opportunities in the Western Balkan countries
 
Understanding the Simplicity of Curing Cancer
Understanding the Simplicity of Curing CancerUnderstanding the Simplicity of Curing Cancer
Understanding the Simplicity of Curing Cancer
 
Filmografia
FilmografiaFilmografia
Filmografia
 

Similar to Survey on deception in osn

INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloning
IJNSA Journal
 
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social Networks
IJNSA Journal
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
vinayakjadhav94
 

Similar to Survey on deception in osn (20)

A computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationA computational dynamic trust model for user authorization
A computational dynamic trust model for user authorization
 
Security and trust in semantic web
Security  and trust in semantic webSecurity  and trust in semantic web
Security and trust in semantic web
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A ServiceEducate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A Model
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloning
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social Networks
 
IJSRED-V2I4P0
IJSRED-V2I4P0IJSRED-V2I4P0
IJSRED-V2I4P0
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Network
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
 
HIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONHIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTION
 
Social Networking Software
Social Networking SoftwareSocial Networking Software
Social Networking Software
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systems
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

Survey on deception in osn

  • 1. A Survey on Deceptions in Online Social Networks (OSNs) Shafiza Mohd Shariff MIIT, Universiti Kuala Lumpur
  • 2. Presentation Outline • Introduction • Categorisation of Deceptions in OSNs • Prevention and Detection Solution • Trust Evaluation for Protection of Deceptions • Conclusions • Q&A
  • 4. Categorisation of Deceptions in OSNs • Harvesting Information – Techniques: • Phishing  Email harvesting  Send out email with a fake URL link. • Account hijacking  Hijack an existing user account through the OSN’s session cookies hijacking.  Attacker impersonate the victim and retrieve the required information from the victim’s friends.
  • 5. Categorisation of Deceptions in OSNs • Identity Cloning Attacks (ICA) Queen Elsa Princess AnnaOlaf Kristoff Prince Hans Cinderella Rapunzel Princess Charming Elsa2014
  • 6. Categorisation of Deceptions in OSNs • Boosting Reputation in the OSNs – Sybil Attack • Attacker creates multiple fake profiles called Sybil nodes. • These Sybil nodes will ’like’ the attacker’s post/link/comment or give ratings. • This act unfairly increases the attacker’s rating, gaining them the reputation and power to influence and deceive other users in the same site.
  • 7. Categorisation of Deceptions in OSNs • Spam – Sharing wall post, and spread itself to friend’s wall post containing links or advertisements, attracting OSN users to click them. • Gaining numbers (esp. Twitter) – To gain trust and support from the other users and the public by deceiving them on the number of followers.
  • 8. Categorisation of Deceptions in OSNs • Diffusion of Misinformation
  • 9. Prevention and Detection Solution Deception Threat Protection Solution Identity Cloning Attack (ICA) User profile and friends’ link network similarity detection - Similar identities are filtered using profile similarities, friend list network and other attributes. If the similarities exceed the set minimum value, the identities are considered as suspicious and will be validated. Spam Social message similarity detection - Spammers’ message contents are similar towards their friend lists or on their wall as they are advertisements and containing URL links to certain websites. Software application - Barracuda Labs developed Barracuda Profile Protector and a prototype by the researchers at University of California analyses content posted by OSNs users. It will detect, block or remove malicious or suspicious content.
  • 10. Prevention and Detection Solution Deception Threat Protection Solution Sybil attack SybilGuard - A technique that examines the entire social network to cluster the Sybil nodes together base on the relationship edge, limiting the attack edges by the Sybil nodes. Diffusion of misinformation Social and engagement interactions - Having high number of social interaction increases the trust level between users. It will computes more reasonable trust values that satisfy the source constraints considering the impact of social aspects and the property of trust.
  • 11. Trust Evaluation for Protection of Deceptions • User trust propagation evaluation – OSN users that receive a request from new OSN user cannot determine the requestor’s identity as the could be forged by the attacker based from the original user. – Propose: • Doing cross social network profile from an external and the internal source could help in evaluating the user’s trust level and propagate trust to the other users.
  • 12. Trust Evaluation for Protection of Deceptions • Information credibility evaluation – Users have to assess the credibility of information sources by themselves. – Current solution: • The CredRank algorithm calculates users’ credibility by computing the user’s message posts similarity and their behaviour similarity in order to cluster them together – Information shared by credible user really came from them and not an impostor / the information is credible. – Propose: • To avoid misinformation diffused by a credible user, each post should be reviewed externally and ranked through the reply comments from the followers.
  • 13. Conclusions • Trust relationship in OSNs can be easily deceived. • However, trust mechanism can also be an effective mean to prevent deceptions. • OSN user trust and information credibility evaluations are promising approaches to prevent deception in OSNs.
  • 14. Q & A