A survey on : Online Social Networking Attacks Detection Techniques (original) (raw)
Related papers
Classification of various attacks and their defence mechanism in online social networks: a survey
Enterprise Information Systems, 2019
Due to the popularity and user friendliness of the Internet, numbers of users of online social networks (OSNs) and social media have grown significantly. However, globally utilised, social networks are the consequence of the lack of understanding of secrecy and protection on OSN and media has increased. Secrecy and surety of OSNs need to be inquired from various positions. According to recent studies, OSN users expose their private information such as email address, phone number etc. In this paper, we have presented a high-level classification of recent OSN attacks for recognising the problem and analysing the blow of such attacks on World Wide Web. We have also discussed OSN attacks on different social networking web applications by citing certain recent reports such as Kaspersky security network and Sophos security threat report. We also offer some simple-to-implement user practice tips to protect the system and user's information. In addition to this, we have discussed a comprehensive analysis of numerous defensive approaches on OSN security. Lastly, based on the acknowledged strength and faults of these defensive approaches, we have explained open research issues.
IRJET-Analysis of Social Media Attacks and Classify Advances to Preserve
The growth of Internet is increasing day by day and users of internet are also increasing regularly. The tremendous growth of internet also leads to increment in cyber attacks. Security threats and attacks are violating cyber rules and regulations. It also affects data and information available on internet and steals personal information of users who are locating their secret information online. The major problem is there when threats and attacks are affecting to financial transaction performed by user online and secret information available online on social media. The standard rules and regulation for internet and cyber security are there but not enough to protect data online available on social media and it is also not useful to get defence from threats and attacks by legitimate or unlawful users of social networking sites and applications. This leads to study of threats and attacks of social media and approaches to defend it from others. This paper presents depth study of threats and attacks available on social media webs and applications and various ways to defend it. The paper discusses characteristics of threats and attacks on social media and also discusses about vulnerable sites and applications. Paper is useful to protect their data and information to them who are providing their personal and secret data as well as information online via social media. This paper is also discusses about the case study of threats and attacks available on Facebook, largest popular site of social media, and various way to defend it.
Comprehensive Analysis of Privacy Attacks in Online Social Network: Security Issues and Challenges
International Journal of Safety and Security Engineering
Nowadays, users value their privacy of information is more than money but the Online Social Network is creating new platforms for cybercrime to intimidate innocent users of countries because of the privacy pitfalls in the present traditional centralized architecture like Facebook, WhatsApp, and Twitter, Instagram, and many more. Third-party apps and malicious attackers breach innocent users' private information, especially adolescent users for their personal purpose. Many Asian countries have no special data protection laws like a European. The main objectives of this research paper are to study the different types of privacy attacks for data confidentiality in the Online Social networks with analyzed mitigation techniques and discussed future proposed work on how to control and detect the user’s private information from unreliable people. Even then, few privacy destructions are unresolved!
Social Media Network Attacks and their Preventive Mechanisms: A Review
Computing Advances & Trends, 2021
We live in a virtual world where actual lifestyles are replicated. The growing reliance on the use of social media networks worldwide has resulted in great concern for information security. One of the factors popularizing the social media platforms is how they connect people worldwide to interact, share content, and engage in mutual interactions of common interest that cut across geographical boundaries. Behind all these incredible gains are digital crime equivalence that threatens the physical socialization. Criminal minded elements and hackers are exploiting social media platforms (SMP) for many nefarious activities to harm others. As detection tools are developed to control these crimes so also hackers’ tactics and techniques are constantly evolving. Hackers are constantly developing new attacking tools and hacking strategies to gain malicious access to systems and attack social media network thereby making it difficult for security administrators and organizations to develop and...
Threats and Anti-threats Strategies for Social Networking Websites
International journal of Computer Networks & Communications, 2013
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
A Study On Social Networking Malicious Activities and Prevention Techniques
2016
With the increasing use of social networking site, there are increments in the malicious, fake, and viruses. Daily approximately 20 million users will register in one day on different social networking site. Unfortunately, hackers have realized the potential of using apps for spreading malware and spam. And now days this problem is more critical, as our survey find that at least 13% of apps in our dataset are malicious. And due to this the research community has focused on detecting malicious posts and campaigns. In this paper, we took the survey of some social networking sites and application and malicious activity relates to it. Also we mention the different techniques to control malicious activities for different social networking sites like Twitter, Facebook. Keywords— Facebook Apps, Malicious Apps, Profiling Apps, Online Social Networks, Social Network Security, Spam profiles
IJERT-Review of Security Approaches for Social Networking
International Journal of Engineering Research and Technology (IJERT), 2014
https://www.ijert.org/review-of-security-approaches-for-social-networking https://www.ijert.org/research/review-of-security-approaches-for-social-networking-IJERTV3IS040614.pdf Social networking uses different applications and dedicated websites for the communication to the user located at remote site. People having similar interest are connected through social networking. Online social networking uses different websites. Such websites are called as social networking sites. Social networking creates community of interested users. Online communities shares hobbies, common interest, lifestyle, views, politics, and knowledge. Sharing will helps even reading the profiles of other users, commenting on status, contacting others users indirectly. Ultimately personal information of any user can be known by any other easily. Misuse of personal information disturbs the mental, physical, social, psychological state of mind of user. Economical loss is major impact .Rapid growth in social networking are responsible for giving rise to many attacks that are entering from cyber world to real life. Structural anomaly and psychological profiling helps to identify behavior of attacker. Using Psycho-linguistic cues deception is identified. Protection motivation theory helps to motivate online social networking user for safe surfing. Proposed incident handing framework helps learners to feel confident while online and alerts adults to manage secure online environment. All above approaches will helps social networking users to be secure in online environment.
Survey on Online Social Networking Threats and Solutions
Online social Networking has become the most appreciated form of social surfing and browsing. Day by day it's increasing and gaining fame through its attractive applications and social sites. The online surfing has become a part of entertainment. The valuable information such as people's likings, disliking and interests are shared on several different OSN sites. Hence, OSN (Online social Networks) provides a platform to share the information on broader way to be in connection with different people. Accordingly there existing threats to these networking sites which need to dealt with an appropriate solutions in order to secure the private and social information of the respective candidate.
A Survey of Various Security Issues in Online Social Networks
The most emerging communication medium for the last decade of years is Online Social Networks (OSNs). Online Social Network makes the communication quicker and cheaper. Facebook, Twitter, Google Plus, MySpace, Orkut, etc are the various existing online social networks. Among all the online social networks very few could turn the attention of the people towards them. However, all these social networks are available on the publicly accessible communication medium called internet. When these social networks are available in the internet, it will lead to various types of security issues. This paper discusses the various security related issues persists in online social networks.
Vulnerabilities of Social Networking Sites-An Open Attack Vector for Cyber Criminals
Journal of Network and Information Security, 2018
A social networking service is an online service that focuses on facilitating the building of social networks or social relations among people who can share images, activities, backgrounds, or real-life connections. Once information is posted to a social networking site, it is no longer private. The more information shared, the more likely someone could impersonate the user and trick one of their friends into sharing personal information, downloading malware, or providing access to restricted sites. Predators, hackers, business competitors, and foreign state actors troll social networking sites looking for information or people to target for exploitation. Information gleaned from social networking sites may be used to design a specific attack that does not come by way of the social networking site. Users of online social media become victims for various types of cybercrimes; this may be due to the vulnerabilities present in the application. The advancement in technology provides the social networking sites to be user friendly and quick accessible but there are so many vulnerabilities that can make the users as victim to different types of cybercrimes. This article analysis the various vulnerabilities of social networking sites and how the attackers use this vulnerabilities to take control of the users account and their personal information. Social networking is a magnificent means to hook up with people, create new contacts, share what we familiar with others, and study new things. User must, on the other hand, be conscious of the fact that the web has its own fair share of good and bad components which pulls users to be victim of the vulnerabilities.