Atnaujinkite slapukų nuostatas

El. knyga: Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives [Taylor & Francis e-book]

, (National Institute of Technology Kurukshetra, India)
  • Formatas: 104 pages, 9 Tables, black and white; 10 Illustrations, black and white
  • Išleidimo metai: 26-Feb-2021
  • Leidėjas: CRC Press
  • ISBN-13: 9781003107378
  • Taylor & Francis e-book
  • Kaina: 68,31 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Standartinė kaina: 97,59 €
  • Sutaupote 30%
  • Formatas: 104 pages, 9 Tables, black and white; 10 Illustrations, black and white
  • Išleidimo metai: 26-Feb-2021
  • Leidėjas: CRC Press
  • ISBN-13: 9781003107378

In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another’s accounts. OSNs obliterate geographical distance and can breach economic barrier. This popularity has made OSNs a fascinating test bed for cyberattacks comprising Cross-Site Scripting, SQL injection, DDoS, phishing, spamming, fake profile, spammer, etc.

OSNs security: Principles, Algorithm, Applications, and Perspectives describe various attacks, classifying them, explaining their consequences, and offering. It also highlights some key contributions related to the current defensive approaches. Moreover, it shows how machine-learning and deep-learning methods can mitigate attacks on OSNs. Different technological solutions that have been proposed are also discussed. The topics, methodologies, and outcomes included in this book will help readers learn the importance of incentives in any technical solution to handle attacks against OSNs. The best practices and guidelines will show how to implement various attack-mitigation methodologies.

Preface xi
Acknowledgements xiii
About the Authors xv
1 Overview of OSNs and Their Impacts on Users
1(18)
1.1 Online Social Network Vulnerabilities
1(2)
1.1.1 Fundamentals of Online Social Networks
2(1)
1.2 Functional Parameters of Online Social Network
3(1)
1.3 Interaction Among Service Providers and Its Users
4(1)
1.4 Background and Motivation
4(2)
1.5 Statistical Analysis Based on Usage and Others
6(3)
1.6 Various Categories of Online Social Networks
9(2)
1.7 Rapid Growth of Social Network Environment
11(1)
1.8 Usage of Online Social Networks Based on Requirement
11(2)
1.9 Online Social Network Issues and Impact
13(1)
1.10 Difficulties in Detection and Mitigation of Various Attacks Against OSNs
14(2)
1.11
Chapter Summary
16(3)
References
16(3)
2 Security Challenges in Social Networking: Taxonomy, Statistics, and Opportunities
19(26)
2.1 The Dark Side of Online Social Networks and Media
19(1)
2.2 Mistakes and Wrong Responses by the People
20(1)
2.3 Once It's Out: It's Out
20(1)
2.4 Various Opportunities in OSNs
20(1)
2.5 Taxonomy of OSN-Based Attacks
21(7)
2.5.1 Advanced Persistent Threats
21(3)
2.5.2 Classical Threats
24(2)
2.5.3 Social Threats
26(2)
2.6 Taxonomy of Various Solutions Against OSN Attacks
28(10)
2.6.1 In-Built Security Solution
28(1)
2.6.2 Third-Party Software Solutions
28(3)
2.6.3 Other Security Solutions Against OSN Attacks
31(7)
2.7
Chapter Summary
38(7)
References
38(7)
3 Fundamentals of Online Social Networks (OSNs) and Opportunities
45(12)
3.1 Opportunities in Social Media
45(1)
3.2 Branding
46(1)
3.3 Building of Social Authority in Social Platform
47(1)
3.4 Customers' Engagement
48(1)
3.5 Sending the Word Out
48(1)
3.6 What to Say? and What Not to?
49(1)
3.7 Cobras (Consumer Brand-Related Activity)
50(1)
3.8 Hashtag
51(1)
3.9 Mistake in Replying to Users of Social Network
51(1)
3.10 Collective Intelligence
52(2)
3.11 Conclusion
54(3)
References
54(3)
4 Machine-Learning and Deep-Learning-Based Security Solutions for Detecting Various Attacks on OSNs
57(14)
4.1 Introduction
57(2)
4.2 Motivation Towards Working
59(1)
4.3 Problem Definition
59(1)
4.4 Proposed Approach for Fake-Account Detection
59(1)
4.5 Characteristics Analysis of Twitter Accounts
60(1)
4.6 Selection of Features and Computing Feature Sets
60(3)
4.7 Construction of a Raw Dataset and the Creation of a Labelled Dataset from Raw Data
63(1)
4.8 Petri Net-Based Analyser
63(1)
4.9 Simulation of Petri Net in PN2 Environment
64(1)
4.10 Verification Using SPIN Model Checker
65(1)
4.11 Evaluation of Result and Performance Analysis
66(1)
4.11.1 Execution Method and Result
66(1)
4.12
Chapter Summary
67(4)
References
68(3)
5 Various Threats and Threat-Handling Tools
71(12)
5.1 Introduction
71(1)
5.2 Why Attackers Love Social Media Platforms
72(4)
5.3 Categories of Social Media Attacks Based on Account Types
76(2)
5.3.1 Categories of Online Social Media Attacks
76(2)
5.4 Cyber Security Tools for Protecting User Account and Information
78(2)
5.5
Chapter Summary
80(3)
References
81(2)
6 Preventive Measures and General Practices
83(12)
6.1 Introduction
83(1)
6.2 Practice Tips to Protect Your System, Account, and Information
84(1)
6.3 Open Issues and Challenges in Existing Security Solutions
85(2)
6.4 Principles to Protect the User Account on a Social Platform
87(4)
6.5
Chapter Summary
91(4)
References
92(3)
7 Data Theft in Indonesia: A Case Study on Facebook
95(8)
7.1 Introduction
95(2)
7.2 Facebook Data Breaker in Indonesia
97(2)
7.2.1 Expert Opinion Regarding the Data Leak Case
97(1)
7.2.2 NGO Comments on the Privacy Issues
98(1)
7.2.3 Government Undertook Measures
99(1)
7.3 Violating of Rights to Privacy (Singapore Case Related to Facebook)
99(1)
7.4 Data Protection Based on International and National Law
100(1)
7.4.1 International Law Instrument---Based Evolution of Protection of Privacy Rights
100(1)
7.5 Conclusion
101(2)
References
102(1)
Index 103
Brij B. Gupta received PhD degree from Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. In 2009, he was selected for Canadian

Commonwealth Scholarship awarded by Government of Canada. He published more than 250research papers in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, Inderscience, etc. He has visited several countries, i.e. Canada, Japan, Malaysia, Australia, China, Hong-Kong, Italy, Spain etc to present his research work. His biography was selected and published in the 30th Edition of Marquis Who's Who in the World, 2012. Dr. Gupta also received Young Faculty research fellowship award from Ministry of Electronics and Information Technology, Government of India in 2017. He is also working as principal investigator of various R&D projects. He is serving as associate editor of IEEE Access, IEEE TII, Associate editor of IJICS, Inderscience and Executive editor of IJITCA, Inderscience, respectively. He is also serving as reviewer for Journals of IEEE, Springer, Wiley, Taylor & Francis, etc. He is also serving as guest editor of various reputed Journals. He was also visiting researcher with University of Murcia (UMU), Spain, Deakin University, Australia and Yamaguchi University, Japan in 2018, 2017 and 2015, respectively. At present, Dr. Gupta is working as Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes Information security, Cyber Security, Cloud Computing, Web security, Intrusion detection and Phishing.

Somya Ranjan Sahoo is a Research Scholar, Department of Computer Engineering, NIT Kurukshetra, India