Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks

Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks

Sanjeev Rao, Anil Kumar Verma, Tarunpreet Bhatia
Copyright: © 2021 |Pages: 17
DOI: 10.4018/978-1-7998-5728-0.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Online social networks (OSNs) are renowned powerful web tools that allow worldwide users to connect with their friends, families, professional groups, and social circle through social interaction for sharing common interests. With the proliferation, ease, and efficacy of OSNs, these are becoming an essential tool for communication. But many OSN users innocently uncover their personal information such as their home address, phone numbers, email id, etc. that can be used by the malicious user to perform various kind for cyber-crimes like cyber-bullying, spamming, click-jacking, identity theft, phishing, distrust, fake profiles, spreading malicious content, etc. This chapter presents a review of various privacy and security threats/attacks associated with OSN users and recommended combating techniques based on data-mining and machine learning algorithms. Also, the future directions for upcoming researchers in this field are suggested.
Chapter Preview
Top

Introduction

From the last few years, the usage and popularity of OSNs have increased at a tremendous rate. It becomes a necessary tool to facilitate communication for every online social user (Boyd & Ellison, 2007). Some of the very popular OSNs are Facebook, Twitter, Google+, Myspace, Tumblr, Sina-Weibo, Snapchat, Pinterest, and Instagram, etc. have millions of daily active users. As of the first quarter of 2020, Facebook has a maximum, i.e., more than 2.5 billion monthly active users (Statista, 2020). The preliminary characteristics of social networking are based on 3C’s, i.e., creation, curation, and consumption. OSNs generally have synonyms like Online Social Media (OSM), Social Network Sites (SNS) that were used interchangeably in many research papers. Social media is like a vehicle for communication. It’s a place that can be used to transmit information to other people like newspaper agencies publish and spread the news in the form of a newspaper to many people. But with the advent of the internet, media is no longer static and can be used as blogs, apps, websites, videos, etc. Social media is a broader term, and the OSN is part of Social Media. OSN allows users to connect with their friends, families, professional groups and social circle through social interaction for sharing common interests by first connecting with other members through sending and receiving friend request, later in the form of posts, comments, likes, dislikes, tags, sharing posts, followers, following, etc. OSNs are helping many other business sectors like marketing, advertising, promotions, product reviews, knowing public opinion in political elections, online learning, growing business reputation, disaster management, healthcare, professional network, and recommender systems, etc. (Fire, Goldschmidt, & Elovici, 2014; Penni, 2017). The challenges associated with OSNs are an ever-increasing amount of users’ leads to the accumulation of Bigdata in the form of textual data, data related to their connections, multimedia data that they share, and personal information (Persia & D’Auria, 2017). These further give rise to issues such as data storage, data management, and data analyses. Users trust these OSNs and users within these social networks that lead them to make their social network by sending and receiving friendship requests from people whom they know and don’t know or but having some friends in common. By accepting these friend requests, users innocently reveal their personal information (age, religion, income, relationships, location, phone numbers, sexuality, habits, financial details, etc.) and professional in-formation like (company, project, work-culture, team, reports, earning, etc.) to strangers. This information could be exposed and abused maliciously and hurting the users both in the cyber and in the real world (Bilge, Strufe, Balzarotti, & Kirda, 2009; Gangavarapu, Jaidhar, & Chanduka, 2020). The vast Number of OSN users and huge volumes of personal details have attracted malicious people, hackers, computer criminals, and third-party companies, etc. These malicious users conduct illegal practices such as data stealing, ransomware, false accounts, spamming, invading viruses, phishing, cyber-bullying and sexual assault, and fake reviews, etc.(Persia & D’Auria, 2017). These challenges give rise to new research directions to secure the privacy of OSN users that is at stake due to misuse of personal information, spreading viruses, fake news, rumors, and spam by malicious users and hackers. The success of any OSN is influenced by the number factors like Number of active users, design, privacy and security of users, other useful features like searching, profile tagging, messaging, calling, photo and text editing options, etc. OSN developers give much emphasis on design and features, and decidedly less focus is given to the security and privacy of OSN users. So studying, analyzing, and combating OSN’s privacy and security issues have now become a wide area of research. The motive of this chapter is to provide useful information regarding privacy and security threats/attacks in the OSNs. In this chapter, a survey of some paramount cyber threats associated with Social Networking Sites, the primary reasons behind these threats and counter-measures to combat the security risks to users have been presented.

Key Terms in this Chapter

Socware: Socware as malicious software links propagated by cyber-criminals through malicious URLs embedded in posts and messages to perform illegal activities such as phishing, compromising accounts, etc.

Part-of-Speech (POS) Tagging: The part-of-speech (POS) tagging is to assign grammatical categories (noun, verb, adjective, etc.) to words in a natural language sentence.

Machine Learning: Machine Learning is a subdivision of artificial intelligence. Machine learning is the study of computer algorithms which, through experience, automatically improve.

Crowdsourcing: Crowdsourcing is a marketing strategy in which an organization outsources part of its operational activities to an ambiguous group of many individual contributors for advertisements, spamming, influencing people by increasing number of followers, friends, etc.

Online Social Networks: It is an online platform which people use to build social networks or social connections with others to share similar personal or career interests, activities, experiences, or real-life relations.

Natural Language Processing: It is a sub-discipline of linguistics, computer science, information engineering and artificial intelligence involved with computer and human language interactions, in specific to how computers can be programmed to process and examine huge volumes of natural language data.

Sentiment Analysis: Sentiment analysis is the interpretation and classification of emotions (positive, negative, and neutral) within text data using text analysis techniques. Sentiment analysis allows businesses to identify customer sentiment toward products, brands or services in online conversations and feedback.

Sybil Attack: In the sybil attack, a single entity imitates several user activities and attempts to cause complications for users on online social networks.

Spam: Spam in social networks refers to undesirable, malevolent, unsolicited content or behavior, exhibiting in different ways, comprising microblogs, tweets, malicious links, fake contacts, false reviews, etc.

Social Network Attacks: The attacks performed on Online Social Networks by cyber-criminals is known as Social Network attacks.

Social Bots: A social bots are automated programs/agents who interact on social networks to influence the course of conversation/discussions and their readers' opinions.

Complete Chapter List

Search this Book:
Reset