Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  A Survey on Security Framework to Protect Against Social Network Threats  
  Authors : V Divya; Dr. Radhika K R
  Cite as:

 

We all can see that social media at present has developed very popularly everywhere. These social networking sites allow zillions of people to communicate with their friends located in different states and countries without any barriers. Confidentiality and safety on the online social network has become their main concern over the recent years. All though we have all the security strategies, awareness strategies, standards, and devices at present, people still face some unusual kind of risks or danger whenever sensitive information is shared online. The sudden boom in the Social media applications by its abundant users, has bought the attackers a different method of invasion opportunities for disclosing all the private information, for the virus management strategy facilities like firewall, Intrusion methods for Prevention, antimalware, and Data leakage methods of prevention. As its result, this paper tells us about the safety framework to shield the users by securing them by providing knowledge to counterattack the threats occurring due to Social networking sites. We will also be discussing about all the different kinds of crimes on the social media and provide methods and strategies to diminish the risks faced by the social media users.

 

Published In : IJCSN Journal Volume 9, Issue 2

Date of Publication : April 2020

Pages : 61-70

Figures :03

Tables : 01

 

Divya V : Currently is a Master's student at B.M.S College of Engineering, Information Science department. Divya received her Bachelor's degree in Telecommunication Engineering in 2018.. Her area of interest is in Network Security, Cloud security, Image Processing and Cyber Security system.

Radhika K R : is a professor at B.M.S College of Engineering. She has an experience of 23 years in teaching a wide area of subjects in Information Science Department at BMSCE. She has 40+ publications in various reputed journal. She is a senior member of IEEE. Her area of interests is network security, data mining, cloud security.

 

Intrusion Prevention System, Social Networks Services ,Intrusion Prevention System, Personal Digital Assistants, Firewall, online social network

Within this survey paper we have studied and discussed about Social network and its threats and how they have impacted in all our lives by connecting zillions of users all over the world by which is a platform allowing users to explore ones interests, pictures, videotapes, video call , chat online with their digital friends without any distance barrier. Although, having all facilities would lead to dangerous cyber security risks. Moreover, we have discussed about all the major threats happing and divided the threats into three categories describing three classes of threats: Social media threats, Multimedia content threats, and Traditional threats, that, we examined and discussed about and current plans and protocols for providing safety for Social network operators. In this paper we provide kinds of threats, attack, prevention strategies, and other precautions while using social media.

 

[1] J. Wede ,A.C. Squicciarini , M. Shehab , J. Wede , Privacy policies for shared content in social network sites, VLDB J. (6) (2010) 777-796 [2] Zhang , W. Xu , F, S. Zhu , Toward worm detection in online social networks, in: Proceedings of the 26th Annual Computer Security Applications Conference, ACM, 2010, pp. 11-20 [3] IEEE,2012,pp.1-12,Rajadesingan.A Kumaraguru p ,Aggarwal A,PhishAri: automatic realtime phishing detection on twitter, in: eCrime [4] Martino , P. Savla Content analysis of privacy policies for health social networks, in: Proceedings of the International Symposium on Policies for Distributed Systems and Networks (POLICY), IEEE, 2012, pp. 94- 101 [5] ACM, 2013, pp. 75-88I. Spiro , M. Tierney , C.Bregler , L. Subramanian , Cryptogram: photo privacy for online social media, in: Proceedings of the first ACM conference on Online social networks,. [5] IEEE, 2012 B. Greschbach , G. Kreitz , S. Buchegger , The devil is in the metadata-new privacy challenges in decentralised online social networks, in: Proceedings of the International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops [6] A. Caola, A.P. Schepis,Techniques for multimedia metadata security, U.S. Patent No. 9,268,964, 2016. [7] (2016) 582-594 P. Kairouz , G. Fanti , S. Oh , K. Ramchandran , P. Viswanath , Metadata-conscious anonymous messaging, IEEE Trans. Signal Inf. Process. Netw. 2 (4) [8] G. Fanti , P. Kairouz , S. Oh , K. Ramchandran , P. Viswanath , Metadata-conscious anonymous messaging, IEEE Trans. Signal Inf. Process. Netw. 2 (4) (2016) 582- 594 . [9] G. Yan , G. Chen , S. Eidenbenz , N. Li , Malware propagation in online social networks: nature, dynamics, and defense implications, in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ACM, 2011, pp. 196-206 [10] H. Zhu , C. Huang , H. Li , MPPM: Malware propagation and prevention model in online SNS, in: IEEE International Conference on Communications Workshops (ICC), IEEE, 2014, pp. 6 82-6 87 [11] G. Wang , F. Musau , S. Guo , M.B. Abdullahi , Neighbor similarity trust against sybil attack in P2P ecommerce, Trans. Parallel Distrib. Syst. 26 (3) (2015) 824-833 [12] Cao , Q. Li , Y. Ji , Y. He , D. Guo , Detection of forwarding-based malicious urls in online social networks, Int. J. Parallel Program 44 (1) (2016) 163-180 [13 ] A.Y. Varjani , M. Moghimi New rule-based phishing detection method, Expert Syst. Appl. 53 (2016) 231-242 [14] J. Kim , S. Lee ,Warningbird: a near real-time detection system for suspicious urls in twitter stream, IEEE Trans. Dependable Secure Comput. 10 (3) (2017) 183-195 [15] F. Ahmed , M. Abulaish , A generic statistical approach for spam detection in Online Social Networks, Comput. Commun. 36 (10) (2013) 1120-1129 [16] ,(https://www.facebook.com/games/sgprivacy/ )Check Point Software, Social Guard Privacy Scan. Online; accessed 04 April 2017 [17] Infoglide, Minor monitor-Facebook Monitoring and Parental Control Software, ( http://www.minormonitor.com/) . Online; accessed 04 April 2017 [18] Malavida, Facebook Phishing Protector, ( http://facebook- phishing- protector.en.malavida.com/ ). Online; accessed 04 April 2017 [19] McAfe, Social Protection, (http://beta.mcafee.com/betamcafee/mspbeta _ lp.aspx?cookieCheck=true ). Online; accessed 04 April 2017 [20] I. Polakis , G. Kontaxis S. Ioannidis , E.P. Markatos , Detecting social network profile cloning, in: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, 2017, pp. 295-300 [21] (http://thehackernews.com/2016/03/fake-facebookaccount. html R. Krishnan, Facebook's latest feature Alerts You if Someone Impersonates Your Profile, Online; accessed 04 April 2017 [22] J. Lv Z, Shan , H. Cao , J. Lv , C. Yan , A. Liu , Enhancing and identifying cloning attacks in online social networks, in: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ACM, 2017, pp. 59-65 [23] Social network security: Issues , challenges ,threats, and solutions Shailendra Rathorea, Pradip Kumar Sharmaa, Vincenzo Loiab, Young-SikJ eongc, JongHyuk Parka, Information Sciences . December 2017 [24] Net nanny , Social media safety & protection with net nanny. [25] R. Goldschmidt , M. Fire, Y. Elovici , Online social networks: threats and solutions, IEEE Common. Surv. Tut. 16 (4) (2017) 2019-2036 [26] B. Greschbach , G. Kreitz , S. Buchegger , The devil is in the metadata-new privacy challenges in decentralised online social networks, in: Proceedings of the International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, 2017, pp. 333- 339