Open Access   Article Go Back

Online Intrusion and Security Measures in Social Networking Environment – A Survey

Jamuna Rani S.1 , Vagdevi S.2

Section:Survey Paper, Product Type: Journal Paper
Volume-8 , Issue-12 , Page no. 39-45, Dec-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i12.3945

Online published on Dec 31, 2020

Copyright © Jamuna Rani S., Vagdevi S. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jamuna Rani S., Vagdevi S., “Online Intrusion and Security Measures in Social Networking Environment – A Survey,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.39-45, 2020.

MLA Style Citation: Jamuna Rani S., Vagdevi S. "Online Intrusion and Security Measures in Social Networking Environment – A Survey." International Journal of Computer Sciences and Engineering 8.12 (2020): 39-45.

APA Style Citation: Jamuna Rani S., Vagdevi S., (2020). Online Intrusion and Security Measures in Social Networking Environment – A Survey. International Journal of Computer Sciences and Engineering, 8(12), 39-45.

BibTex Style Citation:
@article{S._2020,
author = {Jamuna Rani S., Vagdevi S.},
title = {Online Intrusion and Security Measures in Social Networking Environment – A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2020},
volume = {8},
Issue = {12},
month = {12},
year = {2020},
issn = {2347-2693},
pages = {39-45},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5276},
doi = {https://doi.org/10.26438/ijcse/v8i12.3945}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i12.3945}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5276
TI - Online Intrusion and Security Measures in Social Networking Environment – A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Jamuna Rani S., Vagdevi S.
PY - 2020
DA - 2020/12/31
PB - IJCSE, Indore, INDIA
SP - 39-45
IS - 12
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
274 349 downloads 124 downloads
  
  
           

Abstract

Social networking has become the topmost application among users to share and communicate information. With the advancement in communication and smartphone capabilities increasing number of users are connected to social network. News items, memes and marketing campaigns are all hosted on social network. Enterprises are also using social network to reach to more customer bases. The popular online social networking platforms such as Twitter, Facebook, Instagram etc. have attracted public helping them connected to family, friends, and relatives. People share videos, texts, pictures, and some confidential information knowingly or unknowingly through these sites and thus, OSNs have become the main source of targets for cyber attackers. Cyberattacks have been increasing for the last few decades throwing a serious threat to the internet world. Security of personal data on social network user is important. In this survey, the various methods of intrusion of social networks for gaining access to private information and the countermeasures are studied. The goal of study is to identify open issues, so that a more secure solution can be designed to solve the problem and discuss about various OSN threats such as misuse of identity, malware, phishing attacks etc. and recommends some of the threat’s preventive measures.

Key-Words / Index Term

Online Social Networks, Cyberattack, Identity theft, Security

References

[1] Shin, D., R. Lopes, W. Claycomb, G. Ahn, “A Framework for Enabling User-controlled Persona in Online Social Networks,” in 33rd Annual IEEE International Computer Software and Applications Conference, pp. 292–297, 2009.
[2] Luo, W., Q. Xie, and U. Hengartner, “FaceCloak: An Architecture for User Privacy on Social Networking Sites,” in Proc. of PASSAT-09, pp. 26-33, August 2009.
[3] Carminati, B., E. Ferrari, R. Heatherly, M. Kantarcioglu, B. Thurainsingham, “A Semantic Web Based Framework for Social Network Access Control” in Proc. SACMAT’09, pp. 177-186, June 2009
[4] Bo Feng, Qiang Li, Xiaowen Pan GroupFound: “An effective approach to detect suspicious accounts in online social networks”, International journal of distributed sensors 19 February 2017.
[5] Viswanath B, Bashir MA, Crovella M, et al. Towards detecting anomalous user behavior in online social networks. In: Proceedings of the 23rd USENIX security symposium (USENIX security 14), San Diego, CA, 20–22 pp.223–238, August 2014. USENIX Association
[6] K. Singh, S. Bhola, and W. Lee, “XBook: Redesigning Privacy Control in Social Networking Platforms,” Proc. 18th Usenix Security Symp. (SSYM 09), Usenix Assoc., pp. 249–266, 2009.
[7] LinqingLiu, YaoLu, YeLuo "Detecting Smart spammers On Socia lNetwork: A Topic Model Approach" Proceedings of NAACL-HLT 2016
[8] L., Molva, R., Strufe, T.: Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47(12), 94–101, 2009.
[9] Claudia Wagner "When social bots attack: Modeling susceptibility of users in online social networks" 1012 Proceedings on International conference on World Wide Web
[10] Jack Lindamood, Raymond Heatherly "Inferring Private Information Using Social Network Data" WWW 2009, April 20–24, 2009
[11] Richmond Hill "A trust-based approach for protecting user data in social networks" CASCON `07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
[12] Bo Luo; Lee, D., "On Protecting Private Information in Social Networks: A Proposal," Data Engineering, 2009. ICDE `09. IEEE 25th International Conference on, vol., no., pp.1603,1606, March 29, 2009-April 2, 2009
[13] M. Fire, G. Katz, and Y. Elovici," Strangers Intrusion Detection Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies", HUMAN, 1(1), pp: 26-39, 2012.
[14] Hua Shen, Xinyue Liu "Detecting Spammers on Twitter Based on Content and Social Interaction” International Conference on Network and Information Systems for Computers 2015
[15] Lee K, Caverlee J, Webb S. Uncovering social spammers: social honeypots+ machine learning. Proceeding of the 33rd international ACM (SIGIR) conference on Research and development in information retrieval, Geneva, Switzerland, 2010:435-442.
[16] Shareen Irshad1 and Tariq Rahim Soomro "Identity Theft and Social Media" IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.1, January 2018.
[17] Michael Fire, Dima Kagan, Aviad Elishar, and Yuval Elovici "Social Privacy Protector - Protecting Users’ Privacy in Social Networks" The Second International Conference on Social Eco-Informatics SOTICS 2012.
[18] M. Egele, A. Moser, C. Kruegel, and E. Kirda, “Pox: Protecting users from malicious facebook applications,” in Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on. IEEE, pp. 288–294, 2011.
[19] Y. Liu, K. Gummadi, B. Krishnamurthy, and A. Mislove, “Analyzing facebook privacy settings: User expectations vs. reality,” in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, pp. 61–70, 2011.