In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one anothers accounts. OSNs obliterate geographical distance and can breach economic barrier. This popularity has made OSNs a fascinating test bed for cyberattacks comprising Cross-Site Scripting, SQL injection, DDoS, phishing, spamming, fake profile, spammer, etc.
OSNs security: Principles, Algorithm, Applications, and Perspectives describe various attacks, classifying them, explaining their consequences, and offering. It also highlights some key contributions related to the current defensive approaches. Moreover, it shows how machine-learning and deep-learning methods can mitigate attacks on OSNs. Different technological solutions that have been proposed are also discussed. The topics, methodologies, and outcomes included in this book will help readers learn the importance of incentives in any technical solution to handle attacks against OSNs. The best practices and guidelines will show how to implement various attack-mitigation methodologies.
Preface |
|
xi | |
Acknowledgements |
|
xiii | |
About the Authors |
|
xv | |
|
1 Overview of OSNs and Their Impacts on Users |
|
|
1 | (18) |
|
1.1 Online Social Network Vulnerabilities |
|
|
1 | (2) |
|
1.1.1 Fundamentals of Online Social Networks |
|
|
2 | (1) |
|
1.2 Functional Parameters of Online Social Network |
|
|
3 | (1) |
|
1.3 Interaction Among Service Providers and Its Users |
|
|
4 | (1) |
|
1.4 Background and Motivation |
|
|
4 | (2) |
|
1.5 Statistical Analysis Based on Usage and Others |
|
|
6 | (3) |
|
1.6 Various Categories of Online Social Networks |
|
|
9 | (2) |
|
1.7 Rapid Growth of Social Network Environment |
|
|
11 | (1) |
|
1.8 Usage of Online Social Networks Based on Requirement |
|
|
11 | (2) |
|
1.9 Online Social Network Issues and Impact |
|
|
13 | (1) |
|
1.10 Difficulties in Detection and Mitigation of Various Attacks Against OSNs |
|
|
14 | (2) |
|
|
16 | (3) |
|
|
16 | (3) |
|
2 Security Challenges in Social Networking: Taxonomy, Statistics, and Opportunities |
|
|
19 | (26) |
|
2.1 The Dark Side of Online Social Networks and Media |
|
|
19 | (1) |
|
2.2 Mistakes and Wrong Responses by the People |
|
|
20 | (1) |
|
2.3 Once It's Out: It's Out |
|
|
20 | (1) |
|
2.4 Various Opportunities in OSNs |
|
|
20 | (1) |
|
2.5 Taxonomy of OSN-Based Attacks |
|
|
21 | (7) |
|
2.5.1 Advanced Persistent Threats |
|
|
21 | (3) |
|
|
24 | (2) |
|
|
26 | (2) |
|
2.6 Taxonomy of Various Solutions Against OSN Attacks |
|
|
28 | (10) |
|
2.6.1 In-Built Security Solution |
|
|
28 | (1) |
|
2.6.2 Third-Party Software Solutions |
|
|
28 | (3) |
|
2.6.3 Other Security Solutions Against OSN Attacks |
|
|
31 | (7) |
|
|
38 | (7) |
|
|
38 | (7) |
|
3 Fundamentals of Online Social Networks (OSNs) and Opportunities |
|
|
45 | (12) |
|
3.1 Opportunities in Social Media |
|
|
45 | (1) |
|
|
46 | (1) |
|
3.3 Building of Social Authority in Social Platform |
|
|
47 | (1) |
|
3.4 Customers' Engagement |
|
|
48 | (1) |
|
|
48 | (1) |
|
3.6 What to Say? and What Not to? |
|
|
49 | (1) |
|
3.7 Cobras (Consumer Brand-Related Activity) |
|
|
50 | (1) |
|
|
51 | (1) |
|
3.9 Mistake in Replying to Users of Social Network |
|
|
51 | (1) |
|
3.10 Collective Intelligence |
|
|
52 | (2) |
|
|
54 | (3) |
|
|
54 | (3) |
|
4 Machine-Learning and Deep-Learning-Based Security Solutions for Detecting Various Attacks on OSNs |
|
|
57 | (14) |
|
|
57 | (2) |
|
4.2 Motivation Towards Working |
|
|
59 | (1) |
|
|
59 | (1) |
|
4.4 Proposed Approach for Fake-Account Detection |
|
|
59 | (1) |
|
4.5 Characteristics Analysis of Twitter Accounts |
|
|
60 | (1) |
|
4.6 Selection of Features and Computing Feature Sets |
|
|
60 | (3) |
|
4.7 Construction of a Raw Dataset and the Creation of a Labelled Dataset from Raw Data |
|
|
63 | (1) |
|
4.8 Petri Net-Based Analyser |
|
|
63 | (1) |
|
4.9 Simulation of Petri Net in PN2 Environment |
|
|
64 | (1) |
|
4.10 Verification Using SPIN Model Checker |
|
|
65 | (1) |
|
4.11 Evaluation of Result and Performance Analysis |
|
|
66 | (1) |
|
4.11.1 Execution Method and Result |
|
|
66 | (1) |
|
|
67 | (4) |
|
|
68 | (3) |
|
5 Various Threats and Threat-Handling Tools |
|
|
71 | (12) |
|
|
71 | (1) |
|
5.2 Why Attackers Love Social Media Platforms |
|
|
72 | (4) |
|
5.3 Categories of Social Media Attacks Based on Account Types |
|
|
76 | (2) |
|
5.3.1 Categories of Online Social Media Attacks |
|
|
76 | (2) |
|
5.4 Cyber Security Tools for Protecting User Account and Information |
|
|
78 | (2) |
|
|
80 | (3) |
|
|
81 | (2) |
|
6 Preventive Measures and General Practices |
|
|
83 | (12) |
|
|
83 | (1) |
|
6.2 Practice Tips to Protect Your System, Account, and Information |
|
|
84 | (1) |
|
6.3 Open Issues and Challenges in Existing Security Solutions |
|
|
85 | (2) |
|
6.4 Principles to Protect the User Account on a Social Platform |
|
|
87 | (4) |
|
|
91 | (4) |
|
|
92 | (3) |
|
7 Data Theft in Indonesia: A Case Study on Facebook |
|
|
95 | (8) |
|
|
95 | (2) |
|
7.2 Facebook Data Breaker in Indonesia |
|
|
97 | (2) |
|
7.2.1 Expert Opinion Regarding the Data Leak Case |
|
|
97 | (1) |
|
7.2.2 NGO Comments on the Privacy Issues |
|
|
98 | (1) |
|
7.2.3 Government Undertook Measures |
|
|
99 | (1) |
|
7.3 Violating of Rights to Privacy (Singapore Case Related to Facebook) |
|
|
99 | (1) |
|
7.4 Data Protection Based on International and National Law |
|
|
100 | (1) |
|
7.4.1 International Law Instrument---Based Evolution of Protection of Privacy Rights |
|
|
100 | (1) |
|
|
101 | (2) |
|
|
102 | (1) |
Index |
|
103 | |
Brij B. Gupta received PhD degree from Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. In 2009, he was selected for Canadian
Commonwealth Scholarship awarded by Government of Canada. He published more than 250research papers in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, Inderscience, etc. He has visited several countries, i.e. Canada, Japan, Malaysia, Australia, China, Hong-Kong, Italy, Spain etc to present his research work. His biography was selected and published in the 30th Edition of Marquis Who's Who in the World, 2012. Dr. Gupta also received Young Faculty research fellowship award from Ministry of Electronics and Information Technology, Government of India in 2017. He is also working as principal investigator of various R&D projects. He is serving as associate editor of IEEE Access, IEEE TII, Associate editor of IJICS, Inderscience and Executive editor of IJITCA, Inderscience, respectively. He is also serving as reviewer for Journals of IEEE, Springer, Wiley, Taylor & Francis, etc. He is also serving as guest editor of various reputed Journals. He was also visiting researcher with University of Murcia (UMU), Spain, Deakin University, Australia and Yamaguchi University, Japan in 2018, 2017 and 2015, respectively. At present, Dr. Gupta is working as Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes Information security, Cyber Security, Cloud Computing, Web security, Intrusion detection and Phishing.
Somya Ranjan Sahoo is a Research Scholar, Department of Computer Engineering, NIT Kurukshetra, India