Detection of Attacks in Online Social Networks (OSN)

Authors

  • Prof. Rajesh R M  Seshadripuram Degree College Tumkur, Karnataka, India
  • Prof. Prathibha S. B.  Assistant Professor and HOD Seshadripuram Degree College Tumkur, Karnataka, India

Keywords:

OSN Online Social Networks, Risk Assessment, Attacks.

Abstract

Online Social Networks (OSN) attacks are most prevalent and practical attack that cannot be prevented easily. Due to increase in OSN population many users are exposed to many attacks. Attacker uses social media as a channel to launch the attacks. Due to this it is necessary to develop some mechanism to avoid the attacks. So it is essential to do the risk assessment in OSN by assigning the Risk Score to each user in OSN. Risk Score assignment is carried out in two ways. (i) One Phase Risk Assessment based on Group Identification features (ii) Two Phase Risk Assessment based on behaviour features mapping. After calculating the risk score users are categorized as below average (below normal), average (normal), and above average (Malicious) user.

References

  1. N. Laleh, B. Carminati, and E. Ferrari, “Risk assessment in social networks based on user anomalous behaviour,” IEEE Transactions on Dependable and Secure Com- puting, 2016.
  2. A. M. Kaplan and M. Haenlein, Users of the world, unite! the challenges and opportunities of social media," Business horizons, vol. 53, no. 1, pp. 59-68, 2010}.
  3. H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao, Detecting and char- acterizing social spam campaigns," in Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp. 35-47, ACM, 2010.
  4. C. Grier, K. Thomas, V. Paxson, and M. Zhang, @ spam: the underground on 140 characters or less," in Proceedings of the 17th ACM conference on Computer and communications security, pp. 27-37, ACM, 2010.
  5. J. Jiang, C. Wilson, X. Wang, W. Sha, P. Huang, Y. Dai, and B. Y. Zhao, “Under- standing latent interactions in online social networks,” ACM Transactions on the Web (TWEB), vol. 7, no. 4, p. 18, 2013.
  6. J. R. Douceur, The sybil attack," in International Workshop on Peer-to-Peer Systems, pp. 251-260, Springer, 2002.
  7. H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, “Sybilguard: defending against sybil attacks via social networks,” in ACM SIGCOMM Computer Communication Review, vol. 36, pp. 267- 278, ACM, 2006.
  8. H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, Sybillimit: A near-optimal social network defense against sybil attacks," in Security and Privacy, 2008. SP 2008. IEEE Symposium on, pp. 3,17, IEEE, 2008.
  9. D. N. Tran, B. Min, J. Li, and L. Subramanian, “Sybil-resilient online content voting.," in NSDI, vol. 9, pp. 15-28, 2009.
  10. G. Danezis and P. Mittal, “Sybilinfer: Detecting sybil nodes using social networks”, in NDSS, San Diego, CA, 2009.
  11. L. Jin, X. Long, H. Takabi, and J. Joshi, “Sybil attacks vs identity clone attacks in online social networks,” Pittsburgh: University of Pittsburgh, 2012. international conference on World wide web, pp. 551-560, ACM, 2009.
  12. M. Fire, R. Goldschmidt, and Y. Elovici, “Online social networks: threats and solutions” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 2019, 2036, 2014.
  13. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, “All your contacts are belong to us: automated identity theft attacks on social networks,” in Proceedings of the 18th
  14. B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove, “An analysis of social network-based sybil defenses,” ACM SIGCOMM Computer Communication Review, vol. 40, no. 4, pp. 363{374, 2010.
  15. V. Dave, S. Guha, and Y. Zhang, “Catching click-spam in search ad net- works,” in Proceedings of the 2013 ACM SIGSAC conference on Computer & com- munications security, pp. 765{776, ACM, 2013.

Downloads

Published

2019-10-12

Issue

Section

Research Articles

How to Cite

[1]
Prof. Rajesh R M, Prof. Prathibha S. B., " Detection of Attacks in Online Social Networks (OSN), IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 7, pp.187-193, September-October-2019.