We all can see that social media at present has developed very popularly everywhere. These social networking sites allow
zillions of people to communicate with their friends located in different states and countries without any barriers. Confidentiality and
safety on the online social network has become their main concern over the recent years. All though we have all the security strategies,
awareness strategies, standards, and devices at present, people still face some unusual kind of risks or danger whenever sensitive
information is shared online. The sudden boom in the Social media applications by its abundant users, has bought the attackers a
different method of invasion opportunities for disclosing all the private information, for the virus management strategy facilities like
firewall, Intrusion methods for Prevention, antimalware, and Data leakage methods of prevention. As its result, this paper tells us about
the safety framework to shield the users by securing them by providing knowledge to counterattack the threats occurring due to Social
networking sites. We will also be discussing about all the different kinds of crimes on the social media and provide methods and
strategies to diminish the risks faced by the social media users.
Published In:IJCSN Journal Volume 9, Issue 2
Date of Publication : April 2020
Pages : 61-70
Figures :03
Tables : 01
Divya V :
Currently is a Master's student at B.M.S College of
Engineering, Information Science department. Divya received her
Bachelor's degree in Telecommunication Engineering in 2018.. Her area
of interest is in Network Security, Cloud security, Image Processing and
Cyber Security system.
Radhika K R :
is a professor at B.M.S College of Engineering. She has an
experience of 23 years in teaching a wide area of subjects in Information
Science Department at BMSCE. She has 40+ publications in various
reputed journal. She is a senior member of IEEE. Her area of interests is
network security, data mining, cloud security.
Intrusion Prevention System, Social Networks Services ,Intrusion Prevention System, Personal Digital Assistants,
Firewall, online social network
Within this survey paper we have studied and discussed
about Social network and its threats and how they have
impacted in all our lives by connecting zillions of users all
over the world by which is a platform allowing users to
explore ones interests, pictures, videotapes, video call ,
chat online with their digital friends without any distance
barrier. Although, having all facilities would lead to
dangerous cyber security risks. Moreover, we have
discussed about all the major threats happing and divided
the threats into three categories describing three classes of
threats: Social media threats, Multimedia content threats,
and Traditional threats, that, we examined and discussed
about and current plans and protocols for providing safety
for Social network operators. In this paper we provide
kinds of threats, attack, prevention strategies, and other
precautions while using social media.
[1] J. Wede ,A.C. Squicciarini , M. Shehab , J. Wede ,
Privacy policies for shared content in social network
sites, VLDB J. (6) (2010) 777-796
[2] Zhang , W. Xu , F, S. Zhu , Toward worm detection in
online social networks, in: Proceedings of the 26th
Annual Computer Security Applications Conference,
ACM, 2010, pp. 11-20
[3] IEEE,2012,pp.1-12,Rajadesingan.A Kumaraguru p
,Aggarwal A,PhishAri: automatic realtime phishing
detection on twitter, in: eCrime
[4] Martino , P. Savla Content analysis of privacy policies for
health social networks, in: Proceedings of the
International Symposium on Policies for Distributed
Systems and Networks (POLICY), IEEE, 2012, pp. 94-
101
[5] ACM, 2013, pp. 75-88I. Spiro , M. Tierney , C.Bregler ,
L. Subramanian , Cryptogram: photo privacy for online
social media, in: Proceedings of the first ACM conference
on Online social networks,.
[5] IEEE, 2012 B. Greschbach , G. Kreitz , S. Buchegger ,
The devil is in the metadata-new privacy challenges in
decentralised online social networks, in: Proceedings of
the International Conference on Pervasive Computing
and Communications Workshops (PERCOM Workshops
[6] A. Caola, A.P. Schepis,Techniques for multimedia
metadata security, U.S. Patent No. 9,268,964, 2016.
[7] (2016) 582-594 P. Kairouz , G. Fanti , S. Oh , K.
Ramchandran , P. Viswanath , Metadata-conscious
anonymous messaging, IEEE Trans. Signal Inf. Process.
Netw. 2 (4)
[8] G. Fanti , P. Kairouz , S. Oh , K. Ramchandran , P.
Viswanath , Metadata-conscious anonymous messaging,
IEEE Trans. Signal Inf. Process. Netw. 2 (4) (2016) 582-
594 .
[9] G. Yan , G. Chen , S. Eidenbenz , N. Li , Malware
propagation in online social networks: nature, dynamics,
and defense implications, in: Proceedings of the 6th ACM
Symposium on Information, Computer and
Communications Security, ACM, 2011, pp. 196-206
[10] H. Zhu , C. Huang , H. Li , MPPM: Malware
propagation and prevention model in online SNS, in:
IEEE International Conference on Communications
Workshops (ICC), IEEE, 2014, pp. 6 82-6 87
[11] G. Wang , F. Musau , S. Guo , M.B. Abdullahi ,
Neighbor similarity trust against sybil attack in P2P ecommerce,
Trans. Parallel Distrib. Syst. 26 (3) (2015)
824-833
[12] Cao , Q. Li , Y. Ji , Y. He , D. Guo , Detection of
forwarding-based malicious urls in online social
networks, Int. J. Parallel Program 44 (1) (2016) 163-180
[13 ] A.Y. Varjani , M. Moghimi New rule-based phishing
detection method, Expert Syst. Appl. 53 (2016) 231-242
[14] J. Kim , S. Lee ,Warningbird: a near real-time detection
system for suspicious urls in twitter stream, IEEE Trans.
Dependable Secure Comput. 10 (3) (2017) 183-195
[15] F. Ahmed , M. Abulaish , A generic statistical approach
for spam detection in Online Social Networks, Comput.
Commun. 36 (10) (2013) 1120-1129
[16] ,(https://www.facebook.com/games/sgprivacy/ )Check
Point Software, Social Guard Privacy Scan. Online;
accessed 04 April 2017
[17] Infoglide, Minor monitor-Facebook Monitoring and
Parental Control Software, (
http://www.minormonitor.com/) . Online; accessed 04
April 2017
[18] Malavida, Facebook Phishing Protector, (
http://facebook- phishing- protector.en.malavida.com/ ).
Online; accessed 04 April 2017
[19] McAfe, Social Protection,
(http://beta.mcafee.com/betamcafee/mspbeta _
lp.aspx?cookieCheck=true ). Online; accessed 04 April
2017
[20] I. Polakis , G. Kontaxis S. Ioannidis , E.P. Markatos ,
Detecting social network profile cloning, in: Proceedings
of the IEEE International Conference on Pervasive
Computing and Communications Workshops (PERCOM
Workshops), IEEE, 2017, pp. 295-300
[21] (http://thehackernews.com/2016/03/fake-facebookaccount.
html R. Krishnan, Facebook's latest feature
Alerts You if Someone Impersonates Your Profile,
Online; accessed 04 April 2017
[22] J. Lv Z, Shan , H. Cao , J. Lv , C. Yan , A. Liu ,
Enhancing and identifying cloning attacks in online social
networks, in: Proceedings of the 7th International
Conference on Ubiquitous Information Management and
Communication, ACM, 2017, pp. 59-65
[23] Social network security: Issues , challenges ,threats, and
solutions Shailendra Rathorea, Pradip Kumar Sharmaa,
Vincenzo Loiab, Young-SikJ eongc, JongHyuk Parka,
Information Sciences . December 2017
[24] Net nanny , Social media safety & protection with net
nanny.
[25] R. Goldschmidt , M. Fire, Y. Elovici , Online social
networks: threats and solutions, IEEE Common. Surv.
Tut. 16 (4) (2017) 2019-2036
[26] B. Greschbach , G. Kreitz , S. Buchegger , The devil is in
the metadata-new privacy challenges in decentralised
online social networks, in: Proceedings of the International
Conference on Pervasive Computing and Communications
Workshops (PERCOM Workshops), IEEE, 2017, pp. 333-
339