Difficulties in Detection and Mitigation of Various Attacks Against OSNs

Table of Contents:

Due to the various technical complications, the detection and mitigation of various threats in social network platforms have become difficult. Some of the complications are described below:

  • Privacy problems and alarms: Various service providers provide different privacy and security settings to different users for their account protection. We have detected various privacy mechanisms provided by OSNs for securing the accounts. There could be a wide range of discrimination that endures in OSN privacy. It has been noted that many of the OSN users are not aware of the privacy settings (Fang & LeFevre, 2010). Some of the features related to privacy settings on OSNs are depicted in Table 1.3.
  • Guessing the behaviour of OSN users: The behaviour of different OSN users varies based on their usage and the features provided by the service provider. Li (2012) describes the regard in which users

TABLE 1.3 Various privacy settings on online social networks

VARIOUS PRIVACY OPTIONS FOR OSN USERS

FACEBOOK

TWITTER

LINKEDIN

GOOGLE+

Visibility mode (active user visibility)

Yes

No

No

No

Medium by which another user finds you

Yes

Yes

Yes

No

Blocking account images

Yes

No

No

Yes

Login alerts

Yes

No

No

Yes

Blocking of spam user

Yes

Yes

Yes

Yes

Message control system

Yes

No

Yes

Yes

hold different OSNs with respect to privacy concerns. As a sample, 250 understudies were chosen randomly from different social network sites and 185 polls are filled effectively. Out of all the content, three-fourths of respondents are male account holders and one- fourth are female. Subsequently, more than 75% of male users are below the age of 40 years. All most all users are using Facebook, and around 45% users are using Twitter for message sharing and information broadcast. Based on the user’s behaviour, the personality of the user is predicted. Also, the use of text and style describes the user’s behaviour.

  • Different threats in OSNs: Nowadays, various security issues exist in social network platform based on privacy. It is a challenging task for security analysts and the researchers to protect the user contents and their accounts from various threats. These threats are broadly classified into various groups such as active attacks, passive attacks, and privacy breaches. All these attacks exploit various functionalities provided by social network platform.
  • Security setting on the user’s side: To protect user account and their information in social network platform, security setting is one of the major concerns by the user. Different OSNs like Facebook and Twitter limit protections as a default setting. It is highly crucial for all users to go through their profile security options and set their protection choices as per their uses. By improving the security setting, users on Facebook can limit their account access. However, all these features are not sufficient to protect user’s information and accounts from various threats.
  • Lack of security solutions at developers end: Deployment of total security solution is not possible by the developer team of social networks due to public access. In addition, such developers focus mainly on the development of products and their compatibility with the users.
  • Maintaining QoS during attack: During various attacks on OSNs, the resources are exhausted and legitimate user’s quality of service (QoS) degrades based on the uses (Liu et al., 2017). Hence, it is a big challenge to maintain the desired QoS for every user over the OSN.
  • High false-positive rate with low detection: Reducing the impact of attack, detection, and mitigation of various threats in OSNs requires timely detection (Freeman, 2017). Faster detection mechanism may lead to an increase in the misclassification rate and vice versa. Hence, it is required to detect the threats quickly with high detection and less false-positive rate.

Summary

For communication and information sharing, OSN is a prominent gateway for people nowadays. The users of the OSNs enjoy a lot while using social network platforms. This leads to attracting various attackers to engage in some malicious activities. Therefore, the main focus of this chapter is to describe the rapid growth of OSNs in different domains. It also illuminates various statistics unveiled by different security organisations. This chapter also provides a comprehensive detail regarding the various usages of OSNs based on different requirements and some of the harmful vulnerabilities. It concludes that there are some security issues in various OSN domains which hamper user credentials and reputation. Furthermore, this chapter describes some difficulties related to the detection and mitigation of various attacks against OSNs.

References

Chen, C., Wu, K., Srinivasan, V., & Zhang, X. (2013. August). Battling the internet water army: Detection of hidden paid posters. In 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013) (pp. 116-120). IEEE.

Dorgham, O., Al-Rahamneh, B., Almomani, A., & Khatatneh, K. F. (2018). Enhancing the security of exchanging and storing DICOM medical images on the cloud. International Journal of Cloud Applications and Computing (IJCAC), 8(1), 154-172.

Facebook. (n.d.). https://www.facebook.com/

Fang, L., & LeFevre, K. (2010). Privacy wizards for social networking sites (p. 351). https://doi.org/10.1145/1772690.1772727

Freeman, D. M. (2017). Can you spot the fakes? On the limitations of user feedback in online social networks. In 26th International World Wide Web Conference, WWW2017, 1093-1102. https://doi.Org/10.l 145/3038912.3052706

Global Social Media Users, (n.d.). http://www.smartinsights.com/social-media-marketing/ social-media-strategy/new-global-social-media-research/

Google+ Available At. (n.d.). https://plus.google.com

Campos, S. B. Jr. Tavares. G. F. C„ Igawa. G. M.. & Guido, M. L. P. Jr. R. C. (2018). Detection of human, legitimate bot, and malicious bot in online social networks based on wavelets. ACM Transactions on Multimedia Computing, Communications, and Applications, Mis), 1-17. https://doi.org/10.1145/3183506

Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481.

Linkedln. (n.d.). https://in.linkedin.com/

Liu, P., Xu, Z., Ai, J., & Wang, F. (2017). Identifying indicators of fake reviews based on spammer’s behavior features. In Proceedings - 2017 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2017, 61502299, 396-403. https://doi.org/10.1109/QRS-C2017.72

Ouaguid, A., Abghour, N., & Ouzzif, M. (2018). A novel security framework for managing android permissions using blockchain technology. International Journal of cloud Applications and Computing (IJCAC), 8( 1), 55-79.

Rathore, S., Sharma, P. K., Loia. V., Jeong, Y. S„ & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information Sciences, 421 43-69. https://doi.Org/10.1016/j.ins.2017.08.063

Sahoo, S. R., & Gupta, В. B. (2018). Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective. Computer and Cyber Security, 591-606.

Sahoo, S. R., & Gupta, В. B. (2019). Classification of various attacks and their defence mechanism in online social networks: A survey. Enterprise Information Systems, 00(00), 1-33. doi: https://doi.org/10.1080/17517575.2019.1605542.

Sahoo, S. R., & Gupta., В. B. (2020). Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection. Enterprise Information Systems, 14(5), 710-736. https://doi.org/10.1080/175175 75.2020.1712742

Social Media Statistics Report, (n.d.). https://socialpilot.co/blog/151-amazing-social- media-statistics-know-2018.

Statista Report about Online Social Networking Users, (n.d.). https://www.statista. com/statistics/278414/number-of-worldwide-social-network-users/

Tucker, С. E. (2010). Social networks, personalized advertising, and privacy controls. Social Science Research Network, 51(5), 546-562. doi: https://doi.org/10.2139/ ssrn.1694319.

Twitter, (n.d.). https://twitter.com/

Woungang, I., Eds, A. A., Hutchison, D., Marra, F., Gragnaniello, D., Cozzolino,

D., Verdoliva, L.....Alfaro, L. De. (2018). Supervised learning for fake News

detection. Proceedings - IEEE 1st Conference on Multimedia Information Processing and Retrieval, MIPR 2018, 4(1), 76-81. https://doi.org/10.1109/ MIS.2019.2899143

Zeidanloo, H. R., Zadeh. M. J., Shooshtari. A.. Safari, P V., & Zamani. M.. M. (2010). A taxonomy of botnet detection techniques. Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, 2, 158-162. https://doi.org/10.1109/ICCSIT.2010.5563555

Zhu, S., & Han, Y. (2018). Secure data outsourcing scheme in cloud computing with attribute-based encryption. International Journal of High Performance Computing and Networking, 12(2), 128-136.

Zophoria Statistics Report, (n.d.). https://zephoria.com/top-15-valuable-facebook-statistics/

Security Challenges in Social Networking

 
Source
< Prev   CONTENTS   Source   Next >