Detection of Attacks in Online Social Networks (OSN)
Keywords:
OSN Online Social Networks, Risk Assessment, Attacks.Abstract
Online Social Networks (OSN) attacks are most prevalent and practical attack that cannot be prevented easily. Due to increase in OSN population many users are exposed to many attacks. Attacker uses social media as a channel to launch the attacks. Due to this it is necessary to develop some mechanism to avoid the attacks. So it is essential to do the risk assessment in OSN by assigning the Risk Score to each user in OSN. Risk Score assignment is carried out in two ways. (i) One Phase Risk Assessment based on Group Identification features (ii) Two Phase Risk Assessment based on behaviour features mapping. After calculating the risk score users are categorized as below average (below normal), average (normal), and above average (Malicious) user.
References
- N. Laleh, B. Carminati, and E. Ferrari, “Risk assessment in social networks based on user anomalous behaviour,” IEEE Transactions on Dependable and Secure Com- puting, 2016.
- A. M. Kaplan and M. Haenlein, Users of the world, unite! the challenges and opportunities of social media," Business horizons, vol. 53, no. 1, pp. 59-68, 2010}.
- H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao, Detecting and char- acterizing social spam campaigns," in Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp. 35-47, ACM, 2010.
- C. Grier, K. Thomas, V. Paxson, and M. Zhang, @ spam: the underground on 140 characters or less," in Proceedings of the 17th ACM conference on Computer and communications security, pp. 27-37, ACM, 2010.
- J. Jiang, C. Wilson, X. Wang, W. Sha, P. Huang, Y. Dai, and B. Y. Zhao, “Under- standing latent interactions in online social networks,” ACM Transactions on the Web (TWEB), vol. 7, no. 4, p. 18, 2013.
- J. R. Douceur, The sybil attack," in International Workshop on Peer-to-Peer Systems, pp. 251-260, Springer, 2002.
- H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, “Sybilguard: defending against sybil attacks via social networks,” in ACM SIGCOMM Computer Communication Review, vol. 36, pp. 267- 278, ACM, 2006.
- H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, Sybillimit: A near-optimal social network defense against sybil attacks," in Security and Privacy, 2008. SP 2008. IEEE Symposium on, pp. 3,17, IEEE, 2008.
- D. N. Tran, B. Min, J. Li, and L. Subramanian, “Sybil-resilient online content voting.," in NSDI, vol. 9, pp. 15-28, 2009.
- G. Danezis and P. Mittal, “Sybilinfer: Detecting sybil nodes using social networks”, in NDSS, San Diego, CA, 2009.
- L. Jin, X. Long, H. Takabi, and J. Joshi, “Sybil attacks vs identity clone attacks in online social networks,” Pittsburgh: University of Pittsburgh, 2012. international conference on World wide web, pp. 551-560, ACM, 2009.
- M. Fire, R. Goldschmidt, and Y. Elovici, “Online social networks: threats and solutions” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 2019, 2036, 2014.
- L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, “All your contacts are belong to us: automated identity theft attacks on social networks,” in Proceedings of the 18th
- B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove, “An analysis of social network-based sybil defenses,” ACM SIGCOMM Computer Communication Review, vol. 40, no. 4, pp. 363{374, 2010.
- V. Dave, S. Guha, and Y. Zhang, “Catching click-spam in search ad net- works,” in Proceedings of the 2013 ACM SIGSAC conference on Computer & com- munications security, pp. 765{776, ACM, 2013.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.