Presentation is loading. Please wait.

Presentation is loading. Please wait.

Surveying The Landscape of Threats Facing Users In The Social Web Steve Webb, Ph.D. Emory Guest Lecture April 16, 2009.

Similar presentations


Presentation on theme: "Surveying The Landscape of Threats Facing Users In The Social Web Steve Webb, Ph.D. Emory Guest Lecture April 16, 2009."— Presentation transcript:

1 Surveying The Landscape of Threats Facing Users In The Social Web Steve Webb, Ph.D. Emory Guest Lecture April 16, 2009

2 Introduction The World Wide Web is evolving into a “social Web” World’s top Web destinations are now dominated by social environments

3 Introduction (cont.) New and exciting ways to connect with others Wildly popular  200 million active Facebook users  100 million YouTube videos  1.5 million SecondLife residents

4 Introduction (cont.) And as always... attackers love crashing big parties Threat categories  Traditional Attacks  Socially Enhanced Attacks  Social Web-specific Attacks Let’s take a closer look…

5 Traditional Attacks Social environment characteristics  Large and very distributed  Numerous communication mechanisms  Relatively naïve user bases That seems like a paradise for attackers…

6 Malware Propagation Worms  Samy  Mikeyy Spyware  Ad networks  Rogue apps Adware  Zango

7 Spam Comment spam Bulletin spam Message spam

8 Phishing Fraudulent login display Grants access to resources outside of the community Compromised accounts used to launch additional attacks

9 Research Challenges Same problems… new and more challenging environment More information available… but it’s a double-edged sword

10 Research Challenges How can we adapt existing techniques to these environments? What new approaches are necessary?

11 Socially Enhanced Attacks Obviously, social environments are vulnerable to traditional attacks But that’s just the beginning…

12 Socially Enhanced Attacks (cont.) Key barrier for attackers has been private information Generic attacks against the masses

13 Socially Enhanced Attacks (cont.) What if attackers knew private information about their victims? Oh, wait! Isn’t that what social environments provide?!?!

14

15 What’s The Big Deal? Name, Age, Gender, and Location Friends Relationship Status Interests and Favorite Things Education/Employment History Etc., Etc., Etc.

16 Socially Enhanced Attacks (cont.) ORIGINAL From: Bellusci Thresa Subject: Jessica Alba's hot scene If your powder is damped and gun can't fire: We know the spark you need! http://yqazqvot.com/http://yqazqvot.com/

17 Socially Enhanced Attacks (cont.) SOCIALLY ENHANCED From: Li Xiong Subject: Jessica Alba's hot scene Steve, Check out this link: http://yqazqvot.com/http://yqazqvot.com/ -Li

18 Socially Enhanced Attacks (cont.) Scary, right?! Not isolated to spam  Malware propagation and phishing attacks benefit too

19 Socially Enhanced Attacks (cont.)

20 SOCIALLY ENHANCED From: Li Xiong Subject: Check out this auction… Steve, I think you might like this Kevin Smith auction… http://url.com/http://url.com/ -Li

21 Research Challenges How can we protect users without killing the fun of these environments? How do you identify a needle in a stack of needles?

22 Social Web-specific Attacks Phishing revisited  Questionably more dangerous than “old school phishing” Creates a new set of problems…

23 Social Identity Theft “Bryan NEEDS HELP URGENTLY!!!” Twitter fail

24 Fake Profiles “Fakesters” Impersonators Thin line between fun and slander

25 Fake Profiles (cont.) The next generation of spam The next generation of malware propagation

26 Research Questions How do we collect examples of these new attacks?  Social Honeypots (CEAS 2008) More importantly, how do we protect users…

27 Purewire Trust Demo http://www.purewiretrust.org

28 Questions


Download ppt "Surveying The Landscape of Threats Facing Users In The Social Web Steve Webb, Ph.D. Emory Guest Lecture April 16, 2009."

Similar presentations


Ads by Google