SlideShare a Scribd company logo
1 of 14
A Survey on Deceptions
in Online Social
Networks (OSNs)
Shafiza Mohd Shariff
MIIT,
Universiti Kuala Lumpur
Presentation Outline
• Introduction
• Categorisation of Deceptions in OSNs
• Prevention and Detection Solution
• Trust Evaluation for Protection of
Deceptions
• Conclusions
• Q&A
Introduction
Categorisation of Deceptions in OSNs
• Harvesting Information
– Techniques:
• Phishing
 Email harvesting
 Send out email with a fake URL link.
• Account hijacking
 Hijack an existing user account through the OSN’s session
cookies hijacking.
 Attacker impersonate the victim and retrieve the required
information from the victim’s friends.
Categorisation of Deceptions in OSNs
• Identity Cloning Attacks (ICA)
Queen Elsa
Princess AnnaOlaf
Kristoff Prince Hans
Cinderella Rapunzel
Princess Charming
Elsa2014
Categorisation of Deceptions in OSNs
• Boosting Reputation in the OSNs
– Sybil Attack
• Attacker creates multiple fake profiles called Sybil
nodes.
• These Sybil nodes will ’like’ the attacker’s
post/link/comment or give ratings.
• This act unfairly increases the attacker’s rating,
gaining them the reputation and power to influence
and deceive other users in the same site.
Categorisation of Deceptions in OSNs
• Spam
– Sharing wall post, and spread itself to friend’s
wall post containing links or advertisements,
attracting OSN users to click them.
• Gaining numbers (esp. Twitter)
– To gain trust and support from the other users
and the public by deceiving them on the
number of followers.
Categorisation of Deceptions in OSNs
• Diffusion of Misinformation
Prevention and Detection Solution
Deception Threat Protection Solution
Identity Cloning Attack
(ICA)
User profile and friends’ link network similarity detection
- Similar identities are filtered using profile similarities,
friend list network and other attributes. If the similarities
exceed the set minimum value, the identities are
considered as suspicious and will be validated.
Spam Social message similarity detection
- Spammers’ message contents are similar towards their
friend lists or on their wall as they are advertisements and
containing URL links to certain websites.
Software application
- Barracuda Labs developed Barracuda Profile Protector
and a prototype by the researchers at University of
California analyses content posted by OSNs users. It will
detect, block or remove malicious or suspicious content.
Prevention and Detection Solution
Deception Threat Protection Solution
Sybil attack SybilGuard
- A technique that examines the entire social network to
cluster the Sybil nodes together base on the relationship
edge, limiting the attack edges by the Sybil nodes.
Diffusion of
misinformation
Social and engagement interactions
- Having high number of social interaction increases the
trust level between users. It will computes more
reasonable trust values that satisfy the source constraints
considering the impact of social aspects and the property
of trust.
Trust Evaluation for Protection of
Deceptions
• User trust propagation evaluation
– OSN users that receive a request from new OSN
user cannot determine the requestor’s identity
as the could be forged by the attacker based
from the original user.
– Propose:
• Doing cross social network profile from an external
and the internal source could help in evaluating the
user’s trust level and propagate trust to the other
users.
Trust Evaluation for Protection of
Deceptions
• Information credibility evaluation
– Users have to assess the credibility of information
sources by themselves.
– Current solution:
• The CredRank algorithm calculates users’ credibility by
computing the user’s message posts similarity and their
behaviour similarity in order to cluster them together
– Information shared by credible user really came from
them and not an impostor / the information is credible.
– Propose:
• To avoid misinformation diffused by a credible user, each post
should be reviewed externally and ranked through the reply
comments from the followers.
Conclusions
• Trust relationship in OSNs can be easily
deceived.
• However, trust mechanism can also be an
effective mean to prevent deceptions.
• OSN user trust and information credibility
evaluations are promising approaches to
prevent deception in OSNs.
Q
&
A

More Related Content

What's hot

Gam Documentation
Gam DocumentationGam Documentation
Gam DocumentationDavid Chen
 
Phishing - Prevention and Detection and Remediation
Phishing - Prevention and Detection and RemediationPhishing - Prevention and Detection and Remediation
Phishing - Prevention and Detection and RemediationChuck McBride
 
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...IJCNCJournal
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET Journal
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...ijistjournal
 
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...Nexgen Technology
 
Root conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbmRoot conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbmArjun BM
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)Isaac Feliciano
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilaslicservernoida
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 

What's hot (17)

Gam Documentation
Gam DocumentationGam Documentation
Gam Documentation
 
website phishing by NR
website phishing by NRwebsite phishing by NR
website phishing by NR
 
Phishing - Prevention and Detection and Remediation
Phishing - Prevention and Detection and RemediationPhishing - Prevention and Detection and Remediation
Phishing - Prevention and Detection and Remediation
 
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
 
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
 
Root conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbmRoot conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbm
 
Iy2515891593
Iy2515891593Iy2515891593
Iy2515891593
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)
 
Phishing
PhishingPhishing
Phishing
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 

Viewers also liked

Edtc 6340-66 copyright crash course alberto tudon 3rd ed
Edtc 6340-66 copyright crash course  alberto tudon 3rd edEdtc 6340-66 copyright crash course  alberto tudon 3rd ed
Edtc 6340-66 copyright crash course alberto tudon 3rd edalbertotudon
 
Class assignnment 4
Class assignnment 4Class assignnment 4
Class assignnment 4mitchellene
 
Costume Designs
Costume Designs Costume Designs
Costume Designs Sammi Wilde
 
Takala: Juova vanhempi - pahoinvoiva nuori?
Takala: Juova vanhempi - pahoinvoiva nuori?Takala: Juova vanhempi - pahoinvoiva nuori?
Takala: Juova vanhempi - pahoinvoiva nuori?Kouluterveyskysely
 
Программа здоровье опорно двигательного аппарата
Программа здоровье опорно двигательного аппарата Программа здоровье опорно двигательного аппарата
Программа здоровье опорно двигательного аппарата Елена Шальнова
 
Datafesta 20141004_05
Datafesta 20141004_05Datafesta 20141004_05
Datafesta 20141004_05博三 太田
 
Don't be an altruistic angel. Be open about what is in it for you.
Don't be an altruistic angel.  Be open about what is in it for you.Don't be an altruistic angel.  Be open about what is in it for you.
Don't be an altruistic angel. Be open about what is in it for you.Wayne Dunn
 
Photos de Paris - France
Photos de Paris - France Photos de Paris - France
Photos de Paris - France sioalex
 
Iubesc animalele-completat cu desene
Iubesc animalele-completat cu deseneIubesc animalele-completat cu desene
Iubesc animalele-completat cu desenebalada65
 
Declare independence from your it department sysadmin skills for symfony dev...
Declare independence from your it department  sysadmin skills for symfony dev...Declare independence from your it department  sysadmin skills for symfony dev...
Declare independence from your it department sysadmin skills for symfony dev...Pablo Godel
 
Fair assessment, Bulgaria
Fair assessment,  BulgariaFair assessment,  Bulgaria
Fair assessment, BulgariaTanya Madjarova
 
Pet photo workshop for shelter/rescue volunteers
Pet photo workshop for shelter/rescue volunteersPet photo workshop for shelter/rescue volunteers
Pet photo workshop for shelter/rescue volunteersLisaScarsi
 
20110907102119431
2011090710211943120110907102119431
20110907102119431Mark Chung
 
E-democracy: Comparison of opportunities in the Western Balkan countries
E-democracy: Comparison of opportunities in the Western Balkan countriesE-democracy: Comparison of opportunities in the Western Balkan countries
E-democracy: Comparison of opportunities in the Western Balkan countriesTomislav Korman
 
Understanding the Simplicity of Curing Cancer
Understanding the Simplicity of Curing CancerUnderstanding the Simplicity of Curing Cancer
Understanding the Simplicity of Curing CancerYouth Publications, Inc.
 

Viewers also liked (20)

Edtc 6340-66 copyright crash course alberto tudon 3rd ed
Edtc 6340-66 copyright crash course  alberto tudon 3rd edEdtc 6340-66 copyright crash course  alberto tudon 3rd ed
Edtc 6340-66 copyright crash course alberto tudon 3rd ed
 
Class assignnment 4
Class assignnment 4Class assignnment 4
Class assignnment 4
 
Costume Designs
Costume Designs Costume Designs
Costume Designs
 
Takala: Juova vanhempi - pahoinvoiva nuori?
Takala: Juova vanhempi - pahoinvoiva nuori?Takala: Juova vanhempi - pahoinvoiva nuori?
Takala: Juova vanhempi - pahoinvoiva nuori?
 
Parent survey Lincoln Heights 2011
Parent survey Lincoln Heights 2011Parent survey Lincoln Heights 2011
Parent survey Lincoln Heights 2011
 
Программа здоровье опорно двигательного аппарата
Программа здоровье опорно двигательного аппарата Программа здоровье опорно двигательного аппарата
Программа здоровье опорно двигательного аппарата
 
Datafesta 20141004_05
Datafesta 20141004_05Datafesta 20141004_05
Datafesta 20141004_05
 
Don't be an altruistic angel. Be open about what is in it for you.
Don't be an altruistic angel.  Be open about what is in it for you.Don't be an altruistic angel.  Be open about what is in it for you.
Don't be an altruistic angel. Be open about what is in it for you.
 
Photos de Paris - France
Photos de Paris - France Photos de Paris - France
Photos de Paris - France
 
Pantheon basics
Pantheon basicsPantheon basics
Pantheon basics
 
Production log
Production logProduction log
Production log
 
Iubesc animalele-completat cu desene
Iubesc animalele-completat cu deseneIubesc animalele-completat cu desene
Iubesc animalele-completat cu desene
 
Declare independence from your it department sysadmin skills for symfony dev...
Declare independence from your it department  sysadmin skills for symfony dev...Declare independence from your it department  sysadmin skills for symfony dev...
Declare independence from your it department sysadmin skills for symfony dev...
 
Fair assessment, Bulgaria
Fair assessment,  BulgariaFair assessment,  Bulgaria
Fair assessment, Bulgaria
 
Ceramica
CeramicaCeramica
Ceramica
 
Pet photo workshop for shelter/rescue volunteers
Pet photo workshop for shelter/rescue volunteersPet photo workshop for shelter/rescue volunteers
Pet photo workshop for shelter/rescue volunteers
 
20110907102119431
2011090710211943120110907102119431
20110907102119431
 
E-democracy: Comparison of opportunities in the Western Balkan countries
E-democracy: Comparison of opportunities in the Western Balkan countriesE-democracy: Comparison of opportunities in the Western Balkan countries
E-democracy: Comparison of opportunities in the Western Balkan countries
 
Understanding the Simplicity of Curing Cancer
Understanding the Simplicity of Curing CancerUnderstanding the Simplicity of Curing Cancer
Understanding the Simplicity of Curing Cancer
 
Filmografia
FilmografiaFilmografia
Filmografia
 

Similar to Survey on deception in osn

A computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationA computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationKamal Spring
 
Security and trust in semantic web
Security  and trust in semantic webSecurity  and trust in semantic web
Security and trust in semantic webMostafa Arjmand
 
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A ServiceEducate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A ServiceSecureData Europe
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelIJMER
 
Social engineering
Social engineeringSocial engineering
Social engineeringlokenra
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloningIJNSA Journal
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detectionijtsrd
 
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksIJNSA Journal
 
IJSRED-V2I4P0
IJSRED-V2I4P0IJSRED-V2I4P0
IJSRED-V2I4P0IJSRED
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightCBIZ, Inc.
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online socialijsptm
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Networkijsrd.com
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarMarty Miller
 
HIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONHIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONIRJET Journal
 
Social Networking Software
Social Networking SoftwareSocial Networking Software
Social Networking Softwareipspat
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsIEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...IEEEGLOBALSOFTTECHNOLOGIES
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdfvinayakjadhav94
 

Similar to Survey on deception in osn (20)

A computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationA computational dynamic trust model for user authorization
A computational dynamic trust model for user authorization
 
Security and trust in semantic web
Security  and trust in semantic webSecurity  and trust in semantic web
Security and trust in semantic web
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A ServiceEducate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A Model
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloning
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social Networks
 
IJSRED-V2I4P0
IJSRED-V2I4P0IJSRED-V2I4P0
IJSRED-V2I4P0
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Network
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
 
HIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONHIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTION
 
Social Networking Software
Social Networking SoftwareSocial Networking Software
Social Networking Software
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systems
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
 

Recently uploaded

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

Survey on deception in osn

  • 1. A Survey on Deceptions in Online Social Networks (OSNs) Shafiza Mohd Shariff MIIT, Universiti Kuala Lumpur
  • 2. Presentation Outline • Introduction • Categorisation of Deceptions in OSNs • Prevention and Detection Solution • Trust Evaluation for Protection of Deceptions • Conclusions • Q&A
  • 4. Categorisation of Deceptions in OSNs • Harvesting Information – Techniques: • Phishing  Email harvesting  Send out email with a fake URL link. • Account hijacking  Hijack an existing user account through the OSN’s session cookies hijacking.  Attacker impersonate the victim and retrieve the required information from the victim’s friends.
  • 5. Categorisation of Deceptions in OSNs • Identity Cloning Attacks (ICA) Queen Elsa Princess AnnaOlaf Kristoff Prince Hans Cinderella Rapunzel Princess Charming Elsa2014
  • 6. Categorisation of Deceptions in OSNs • Boosting Reputation in the OSNs – Sybil Attack • Attacker creates multiple fake profiles called Sybil nodes. • These Sybil nodes will ’like’ the attacker’s post/link/comment or give ratings. • This act unfairly increases the attacker’s rating, gaining them the reputation and power to influence and deceive other users in the same site.
  • 7. Categorisation of Deceptions in OSNs • Spam – Sharing wall post, and spread itself to friend’s wall post containing links or advertisements, attracting OSN users to click them. • Gaining numbers (esp. Twitter) – To gain trust and support from the other users and the public by deceiving them on the number of followers.
  • 8. Categorisation of Deceptions in OSNs • Diffusion of Misinformation
  • 9. Prevention and Detection Solution Deception Threat Protection Solution Identity Cloning Attack (ICA) User profile and friends’ link network similarity detection - Similar identities are filtered using profile similarities, friend list network and other attributes. If the similarities exceed the set minimum value, the identities are considered as suspicious and will be validated. Spam Social message similarity detection - Spammers’ message contents are similar towards their friend lists or on their wall as they are advertisements and containing URL links to certain websites. Software application - Barracuda Labs developed Barracuda Profile Protector and a prototype by the researchers at University of California analyses content posted by OSNs users. It will detect, block or remove malicious or suspicious content.
  • 10. Prevention and Detection Solution Deception Threat Protection Solution Sybil attack SybilGuard - A technique that examines the entire social network to cluster the Sybil nodes together base on the relationship edge, limiting the attack edges by the Sybil nodes. Diffusion of misinformation Social and engagement interactions - Having high number of social interaction increases the trust level between users. It will computes more reasonable trust values that satisfy the source constraints considering the impact of social aspects and the property of trust.
  • 11. Trust Evaluation for Protection of Deceptions • User trust propagation evaluation – OSN users that receive a request from new OSN user cannot determine the requestor’s identity as the could be forged by the attacker based from the original user. – Propose: • Doing cross social network profile from an external and the internal source could help in evaluating the user’s trust level and propagate trust to the other users.
  • 12. Trust Evaluation for Protection of Deceptions • Information credibility evaluation – Users have to assess the credibility of information sources by themselves. – Current solution: • The CredRank algorithm calculates users’ credibility by computing the user’s message posts similarity and their behaviour similarity in order to cluster them together – Information shared by credible user really came from them and not an impostor / the information is credible. – Propose: • To avoid misinformation diffused by a credible user, each post should be reviewed externally and ranked through the reply comments from the followers.
  • 13. Conclusions • Trust relationship in OSNs can be easily deceived. • However, trust mechanism can also be an effective mean to prevent deceptions. • OSN user trust and information credibility evaluations are promising approaches to prevent deception in OSNs.
  • 14. Q & A