Skip to main content

Security Issues of Online Social Networks

  • Conference paper
Advances in Computing, Communication, and Control (ICAC3 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 361))

Abstract

The number of users of the online social networks like facebook, twitter, google, linkedIn are going on increasing tremendously. Similarly the time spend by each user on such online social networks (OSN) is also increasing. These things clearly indicate that the popularity of these OSN is increasing like a wildfire. These OSN provide a very efficient platform for the user to establish contacts with others. These users are having frequent communication with each other. So the adversaries find the OSN as a soft target to attack easily and spread it to the large number of users in less time. In this paper we consider some of such threats to OSN as well countermeasures to some of these threats so as to make the OSN as well as the user secure in the digital world.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gladbeck, J.: Trust and nuanced profile similarity in online social networks. ACM Transactions on the Web 3(4), Article 12 (September 2009)

    Google Scholar 

  2. Nagy, J., Pecho, P.: Social network security. In: 2009 IEEE International Conference on Emergency Security Information Systems and Technologies, pp. 321–325 (2009)

    Google Scholar 

  3. Irani, D., Web, S., et al.: Large online social footprints-an emerging threat. In: 2009 IEEE International Conference on Computational Science and Engineering, pp. 271–277 (2009)

    Google Scholar 

  4. Irani, D., Web, S., et al.: Modeling unintended personal-information leakage from multiple online social networks, pp. 13–19. IEEE Computer Society

    Google Scholar 

  5. Gao, H., Hu, J., et al.: The status quo of online social network security: A survey. IEEE Internet Computing, 1–6 (2011)

    Google Scholar 

  6. Kontaxis, G., Polakis, I., et al.: Detecting social network profile cloning. In: 2011 IEEE Third International Conference on Security and Social Networking, pp. 295–299 (2011)

    Google Scholar 

  7. Huang, H., Tan, J., et al.: Countermeasure techniques for deceptive phishing attack. In: 2009 IEEE International Conference on New Trends in Information and Service Science, pp. 636–641 (2009)

    Google Scholar 

  8. Soni, P., Phirake, S., Meshram, B.B.: A phishing analysis of web based systems. In: ACM ICCCS, pp. 527–530 (February 2011)

    Google Scholar 

  9. Badra, M., Ei-Sawda, S., Hajjeh, I.: Phishing attacks and solutions. In: Mobimedia (2007)

    Google Scholar 

  10. Joshi, Y., Saklikar, S.: PhishGuard: A browser plug-in for protection from phishing. In: IMSAA (2008)

    Google Scholar 

  11. Yue, C., Wang, H.: BogusBiter: A transparent protection against attacks. ACM Transactions on Internet Technology 10(2), Article 6 (May 2010)

    Google Scholar 

  12. Yu, H., Michael, K., et al.: SybilGuard: Defending Against Sybil At-tacks Via Social Networks. In: ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (2006)

    Google Scholar 

  13. Huber, M., Mulazzani, M., et al.: Friend-in-the-middle attacks. IEEE Internet Computing (2011)

    Google Scholar 

  14. Devmane, M.A., Meshram, B.B.: Attacks on wired and wireless networks and mobile devices. International Journal of Computer Applications in Engineering, Technology and Sciences 3(2), 208–215 (2011)

    Google Scholar 

  15. Athanasopoulos, E., Makridakis, A.: Antisocial Networks: turning a social network into botnet. In: Proceedings of the 11th International Conference on Information Security (2008)

    Google Scholar 

  16. Makridakis, A., Athanasopoulos, E., et al.: Understanding the behavior of malicious applications in social networks. IEEE Network (October 2010)

    Google Scholar 

  17. Abu Rajah, M., Zarfoss, J., et al.: A multifaceted approach to understanding the botnet phenomenon. In: SIGCOMM Conference on Internet Measurement (2006)

    Google Scholar 

  18. Thomas, K., Nicol, D.M.: The Koobface botnet and the rise of social malware. In: IEEE 5th International Conference on Malicious and Unwanted Software, pp. 63–70 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Devmane, M.A., Rana, N.K. (2013). Security Issues of Online Social Networks. In: Unnikrishnan, S., Surve, S., Bhoir, D. (eds) Advances in Computing, Communication, and Control. ICAC3 2013. Communications in Computer and Information Science, vol 361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36321-4_69

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36321-4_69

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36320-7

  • Online ISBN: 978-3-642-36321-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics