Abstract
The number of users of the online social networks like facebook, twitter, google, linkedIn are going on increasing tremendously. Similarly the time spend by each user on such online social networks (OSN) is also increasing. These things clearly indicate that the popularity of these OSN is increasing like a wildfire. These OSN provide a very efficient platform for the user to establish contacts with others. These users are having frequent communication with each other. So the adversaries find the OSN as a soft target to attack easily and spread it to the large number of users in less time. In this paper we consider some of such threats to OSN as well countermeasures to some of these threats so as to make the OSN as well as the user secure in the digital world.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gladbeck, J.: Trust and nuanced profile similarity in online social networks. ACM Transactions on the Web 3(4), Article 12 (September 2009)
Nagy, J., Pecho, P.: Social network security. In: 2009 IEEE International Conference on Emergency Security Information Systems and Technologies, pp. 321–325 (2009)
Irani, D., Web, S., et al.: Large online social footprints-an emerging threat. In: 2009 IEEE International Conference on Computational Science and Engineering, pp. 271–277 (2009)
Irani, D., Web, S., et al.: Modeling unintended personal-information leakage from multiple online social networks, pp. 13–19. IEEE Computer Society
Gao, H., Hu, J., et al.: The status quo of online social network security: A survey. IEEE Internet Computing, 1–6 (2011)
Kontaxis, G., Polakis, I., et al.: Detecting social network profile cloning. In: 2011 IEEE Third International Conference on Security and Social Networking, pp. 295–299 (2011)
Huang, H., Tan, J., et al.: Countermeasure techniques for deceptive phishing attack. In: 2009 IEEE International Conference on New Trends in Information and Service Science, pp. 636–641 (2009)
Soni, P., Phirake, S., Meshram, B.B.: A phishing analysis of web based systems. In: ACM ICCCS, pp. 527–530 (February 2011)
Badra, M., Ei-Sawda, S., Hajjeh, I.: Phishing attacks and solutions. In: Mobimedia (2007)
Joshi, Y., Saklikar, S.: PhishGuard: A browser plug-in for protection from phishing. In: IMSAA (2008)
Yue, C., Wang, H.: BogusBiter: A transparent protection against attacks. ACM Transactions on Internet Technology 10(2), Article 6 (May 2010)
Yu, H., Michael, K., et al.: SybilGuard: Defending Against Sybil At-tacks Via Social Networks. In: ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (2006)
Huber, M., Mulazzani, M., et al.: Friend-in-the-middle attacks. IEEE Internet Computing (2011)
Devmane, M.A., Meshram, B.B.: Attacks on wired and wireless networks and mobile devices. International Journal of Computer Applications in Engineering, Technology and Sciences 3(2), 208–215 (2011)
Athanasopoulos, E., Makridakis, A.: Antisocial Networks: turning a social network into botnet. In: Proceedings of the 11th International Conference on Information Security (2008)
Makridakis, A., Athanasopoulos, E., et al.: Understanding the behavior of malicious applications in social networks. IEEE Network (October 2010)
Abu Rajah, M., Zarfoss, J., et al.: A multifaceted approach to understanding the botnet phenomenon. In: SIGCOMM Conference on Internet Measurement (2006)
Thomas, K., Nicol, D.M.: The Koobface botnet and the rise of social malware. In: IEEE 5th International Conference on Malicious and Unwanted Software, pp. 63–70 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Devmane, M.A., Rana, N.K. (2013). Security Issues of Online Social Networks. In: Unnikrishnan, S., Surve, S., Bhoir, D. (eds) Advances in Computing, Communication, and Control. ICAC3 2013. Communications in Computer and Information Science, vol 361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36321-4_69
Download citation
DOI: https://doi.org/10.1007/978-3-642-36321-4_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36320-7
Online ISBN: 978-3-642-36321-4
eBook Packages: Computer ScienceComputer Science (R0)