SOCIAL NETWORKS
Maria Agroti EPL682
1
NETWORKS Maria Agroti EPL682 1 1: All Your r Conta tacts ts - - PowerPoint PPT Presentation
SOCIAL NETWORKS Maria Agroti EPL682 1 1: All Your r Conta tacts ts Are Belong ng to Us: Aut utomated ted Identi tity The heft t At Attac acks on Social al Networ orks by: Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin
Maria Agroti EPL682
1
2
information.
sending friend requests to their contacts.
the contacts to achieve a theft and access sensitive information.
network where the victim does not have an account and tries to reach the victims contacts that are already registered on both networks.
3
Career based Social Networks
German Market.
Germany in 2008)
2005)
4
5
more and more in that way to other users.
MSKERNEL32.VBS in the Windows_system_folder and WIN32DLL.VBS in the Windows directory.
adds the value MSKERNEL32.VBS to it.
content.
6
forged profile can not tell the difference between a fake and a real profile on a social network site.
profile tend to accept requests if the profile is already part of the friends’ contact list.
7
to create cloned profiles automatically.
Facebook and XING.
8
Completely Automated Public Turing test to tell Computers and Humans Apart
9
background, foreground colours change and may be blurred.
10
recognized by an OCR program(Optical Character Recognition)
recognised by an automated program.
time (number)
11
request easily.
again”
accepted then the attacker has successfully managed to access and copy the information from that profile.
12
detect it
sure the associated user is indeed registered or not.
13
14
find the correct profile
will have similar information
friend request to these users but this time the person sending the request is not yet a friend in that particular social network.
users.
contacting 700 users
(request) daily
accessed
profiles daily
15
before the account was disabled
achieve a higher degree of success in establishing contacts with honest users than when using fictitious accounts.
16
used for spamming users and directing a large number of users to web sites under the control of the attacker with no regards to the relationships between the users.
17
amount of contacts of the profile to the other network already registered.
18
profile creation
personal information
19
and SybilLimit (Below) ** Sybil profiles are pseudonymous accounts with the purpose to gain influence through the social network**
trust relations in the real world.
acceptable limits for the number of sybil nodes in the network.
and the system is trying to contact to a high number of existing “honest” nodes. Therefore, our fake accounts would not be detected by the previous approaches.
20
site (e.g., LinkedIn and Facebook).
theft like cloning attacks against five popular social networking sites.
the victim’s contacts are stolen and reestablished in a social network where she is not registered yet.
about the privacy and security risks that are involved.
21
22
23
accounts.
affect in the network.
24
their affect on the network.
25
behavioural profile of the users accordingly.
many compromised accounts.
26
applications or languages
application)
27
28
the feature
1. Time of the day 2. Source 3. Proximity 4. Language
29
30
element, the message is considered to match the behavioural profile, and an anomaly score of 0 is returned.
as the probability p for the account to have a null value for this model
violates the behavioural profile by calculating a score
a first element, then the tuple < fv , c > is extracted from M.
considered anomalous.
here and an anomaly score of 1 is returned.
models
exceeds a threshold.
31
with the known history of the victim’s profile.
that is hard and will not match the history of the victim.
malicious messages.
32
interval.
messages have similarities.
33
suspicious.
groups is too low
their behavioural profiles.
34
generate messages that will be grouped as suspicious,
similarity between 2 strings.
messages do not indicate a change in behaviour if users are not new.
application before it has sent the first message that violates a user’s behavioural profile.
35
36
Twitter:
API calls in the span of an hour
recent three days, or the user’s 400 most recent tweets, whatever resulted in more tweets.
Facebook:
easily gives ability for collection of data
newer datasets from their platform or pursue legal action.
that live on the same area)
networks (i.e., London, New York, Los Angeles, Monterey Bay, and Santa Barbara)
their associated feature values as follows:
37
behavioural profiles
38
group is at least 0.8.
either Twitter or the user herself removed the message.
39
violations by COMPA is that they posted an update in an hour during which they had never been active before.
typically set up for spamming.
the behavioural profile shows that COMPA produces less false positives for accounts whose historical data is comprehensive. Therefore the more data we have the more accuracy.
40
either fake or compromised.
Exposure
messages were too small to be evaluated.
by Stringhini.
41
42
advertise more followers to the victims.
normal behaviour.
43
detected.
information
44
identifying fake accounts and spam messages by leveraging features that are used for recognizing characteristics of spam accounts
interconnected groups of profiles.
spam before it can classify it as fake or compromised.
involved in spam campaigns.
social networks based on URLs that link to malicious sites. But it misses other types of malicious messages.
detected.
45
message exchanged on Facebook and Twitter
46
47