defending against
play

Defending Against Malicious Socialbots Position Paper Yazan - PowerPoint PPT Presentation

Key Challenges in Defending Against Malicious Socialbots Position Paper Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu Laboratory for Education and Research in Secure Systems Engineering (LERSSE) Networked Systems


  1. Key Challenges in Defending Against Malicious Socialbots Position Paper Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu Laboratory for Education and Research in Secure Systems Engineering (LERSSE) Networked Systems Laboratory (NetSysLab) Department of Electrical & Computer Engineering

  2. Outline Problem Socialbots Motivation OSN Security Challenges 2

  3. Problem Motivation 3

  4. Reaching Out to Millions Obama Raised Half a Billion Online in 2008 (Source: Jose Vargas, Voices on The Washington Post, November, 2008) 4

  5. Mobilizing the Masses The Arab Spring, January 2011 - Now Photo credit: Peter Macdiarmid, Getty Images Photo credit: Steve Crisp, Reuters Salem et al. Civil movements: The impact of Facebook and Twitter. The Arab Social Media Report, 2011 5

  6. Predicting the Future: Elections Twitter elections predictions ( Tweetminster ) outperform market research ( YouGov ) Conservative 2010 UK General Elections Lib Dem Labour 40% 35% 30% 25% 20% 15% 10% 5% 0% YouGov Tweetminster Actual (Source: Jemima Koss, The Guardian, May 2010)

  7. Predicting the Future: Markets Twitter mood ( Calm ) predicts Dow Jones Industrial Average ( DJIA ) Day-to-day Calm lagged Overlap by 3 days Bollen et al. Twitter mood predicts the stock market. J. Comp. Sc. March, 2011. 7

  8. Socialbots 8

  9. Bots and Socialbots Computer program used to perform highly repetitive operations (AI?) + Socialbot Automation Social media software account (to pass off as human) 9

  10. Rise of the Socialbots Zack Coburn and Greg Marra, Olin College, 2010 ACM Interactions Magazine Cover Story, April 2012 The Web Ecology Project (Social Engineering), 2011 10

  11. Misusing Socialbots on a Large Scale? An automated social engineering tool for: Infiltration Misinformation Data collection Boshmaf et al. The Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 11

  12. OSN Security 13

  13. Tolerate Socialbots 14

  14. erfit superficial Adversarial Machine Learning Initial Attack Detect Detection classifications Attacker Controls classifiers Begin Defender Attack Responds Defender Controls Attacker Mutate Defense Detects Stein et al., The Facebook Immune System, EuroSys – SNS, 2011 15 influence classifier indefinitely profit filter filtering, first specific

  15. Graph-theoretic Defense Techniques Honest node Attack edges Sybil region Honest region Sybil detection via With adversary running social networks 1 large-scale infiltration 2 1 Haifeng Yu. Sybil Defenses via Social Networks: A Tutorial and Survey. ACM SIGACT News’11 16 2 Boshmaf et al. The Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11

  16. Prevent Socialbots 17

  17. Observation: It’s all about automation Prevent it and the socialbot threat will go away (almost surely) Not an easy job! 18

  18. Challenges Solve at least one 19

  19. OSN Vulnerabilities: Ineffective CAPTCHAs CAPTCHA-solving businesses Koobface Botnet 20

  20. #1 Design a reverse Turing test that is usable and effective even against “illegitimate” human solvers 21

  21. How about Social Authentication? Use “personal” social knowledge to challenge users Kim et al. Social authentication: Harder than it looks. FC’12 22

  22. 23

  23. OSN Vulnerabilities: Fake (Sybil) User Accounts and Profiles 24

  24. #2 Guarantee an anonymous, yet credible, online- offline identity binding in online and open-access systems 25

  25. How can we deal with Sybils? Centralized trusted Tie identities to Use external authority resources information 26

  26. OSN Vulnerabilities: Large-Scale Network Crawls 27

  27. #3 Effectively limit large-scale Sybil crawls of OSNs without restricting users’ social experience. 28

  28. How about using a credit network? 29

  29. Assumption #2 Small edge cut Assumption #1 30

  30. OSN Vulnerabilities: Exploitable Platforms and APIs 31

  31. #4 Detect abusive and automated usage of OSN platforms and their social APIs across the Internet 32

  32. OSN Vulnerabilities: Poorly Designed Privacy/Security Controls 33

  33. #5 Develop usable OSN security and privacy controls that help users make more informed decisions 34

  34. 35

  35. Take-home message(s) • Large-scale infiltration is feasible – has serious privacy and security implications • Socialbots make it difficult for OSN security defenses and their users to detect their true nature – defending against such bots raises a set of unique challenges • Effective, socio-technical defenses less vulnerable to both human and technical exploits are needed 36

  36. Key Challenges in Defending Against Malicious Socialbots Ildar Konstantin Matei Yazan Muslukhov Beznosov Ripeanu Boshmaf Funded by: 37

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend