All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.

Slides:



Advertisements
Similar presentations
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Advertisements

Breaking Trust On The Internet
Recommendations on the future of online GyroScope & Databse implementation.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Privacy Wizards for Social Networking Sites Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2011/01/17 1.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
2011/1/3 1 Reporter: Chun-Chih Wu Adviser: Hsing-Kuo Pao Author: Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, and.
Outline of presentation Brief introduction of Facebook as a social networking tool Research questions Methods Findings and Results Some Experimentation.
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
How To Protect Your Privacy and Avoid Identity Theft Online.
Zifei Shan, Haowen Cao, Jason Lv, Cong Yan, Annie Liu Peking University, China 1.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Detecting Spammers on Social Networks Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna (University of California) Annual Computer Security Applications.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
REVENUE MANAGEMENT GUIDE © Marin Management, Inc. 1 Online Networking Guide, 1560 Facebook ® A. Introduction to Facebook ® Facebook Facebook ® is a very.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
Jason Polakis and Sotiris Ioannidis, FORTH-ICS, Greece; Marco Lancini, Federico Maggi, and Stefano Zanero, Politecnico di Milano, Italia; Georgios Kontaxis.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
Staying Safe Online Keep your Information Secure.
Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
How Phishing Works Prof. Vipul Chudasama.
Presented By: Abirami Poonkundran Authors: Jeff Yan, Ahmad El Ahmad.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
Web Information Retrieval Prof. Alessandro Agostini 1 Context in Web Search Steve Lawrence Speaker: Antonella Delmestri IEEE Data Engineering Bulletin.
Reverse Social Engineering Attacks in Online Social Networks Submitted to - Dr. Sapna Gambhir Submitted by - Raghu Sharma MNW-892-2k11.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Computer Security By Duncan Hall.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
REGION IV-A “The NET Endeavor ” By: VW Avelino “Billy” Mendoza Sumagui, DDGM R4A1.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Debra Mann Reference Librarian Innisfil Public Library
Done by… Hanoof Al-Khaldi Information Assurance
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Simple Authentication for the Web
Social networking risks and benefits.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Social Media: What You Should Know
Topic 5: Online Communities Press F5 to view!
Prepared by: Celeste Ng Date: May, 2017 Source: as shown
Cross-Site Request Forgeries: Exploitation and Prevention
Cybersecurity Awareness
yahoo mail technical support number
Job Search: Networking
What you can do to support people to be safe online
Introduction to Computers
Create A Facebook Profile And Project Page
A novel probabilistic language-based CAPTCHA system
Cross Site Request Forgery (CSRF)
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1

Conference All your contacts are belong to us : automated identity theft attacks on social networks,Bilge, Leyla;Strufe, Thorsten;Balzarotti, Davide;Kirda, Engin, 18th International World Wide Web Conference, April 20-24, Madrid, Spain (WWW'09) 2

Outline  Introduction  iCloner overview  Cloning attacks  Evaluation  Suggestions for improvements in social network site security  Conclusion 3

Introduction (cont.)  Social network sites have been increasingly gaining popularity.  Business relationship  XING (5 million registered users,2008)  LinkedIn (80 million registered users,2010)  Friend relationship  Facebook ( 0.5 billion registered users,2010)  StudiVZ (16 million registered users,2010)  MeinVZ  As the Interest for a new technology grows on the Internet, miscreants are attracted as well.   Social network (steal personal info.) 4

This paper do ….  This paper investigate how easy it would be for a potential attacker to launch this type of impersonation attacks in an automated fashion against a number of popular social networking sites in order to gain access to a large volume of personal user information. 5

iCloner  First Attack :  It clone an already existing profile in a social network and send friend requests to the contacts of the victim.  Second Attack :  It is effective and feasible to launch an automated, cross-site profile cloning attack. 6

Contributions  It is feasible in to launch automated attacks against five popular social networking sites.  Profile cloning, cross-site profile cloning.  There is significant room for improvement to make these CAPTCHAs more difficult to break.  That most social network users are not cautious when accepting friend requests or clicking on links that are sent to them.  It makes suggestions on how social networking sites can improve their security, and therefore, better protect the privacy of their users. 7

An architectural overview of iCloner 8

CAPTCHAs  CAPTCHA algorithm is the ability to generate tests that are at the same time easily solvable by humans, but very hard to solve for a computer application.  ImageMagick(Image filter) + Tesseract (OCR) 9

Breaking …..  MeinVZ and StudiVZ  Replace the background with white pixels  Isolate the letters (if overlapping,ask new CAPTCHA)  Scale all letters to same size  Tesseract  It can solve the CAPTCHA with 99.8% in one of the three consecutive attempts. 10

Breaking …  Facebook (reCAPTCHA)  Unbend the word back to the original shape  Translate pixel column up or down becomes a straight line  Similar to MeinVZ and StudiVZ steps  Compared with English dictionary,or submit the word to Google.  Success rate between 4% and 7%  Botnets and IPs 11

Cloning attacks  Profile cloning  Cross-site profile cloning 12

Profile cloning  Promise :  profile cloning attack is that social networking users are generally not cautious when accepting friend requests.  Many users will not get suspicious if a friend request comes from someone they know, even if this person is already on their contact list.  The profile cloning attack consists of identifying a victim and creating a new account with his real name and photograph inside the same social network.  Once the cloned account has been created, our system can automatically contact the friends of the victim and send friend requests.  Friend requests + Social engineering 13

Cross-site Profile Cloning  Aim :  Identify victims who are registered in one social network, but not in another.  Retrieve as much information as possible form victim original social network account.  Identify the friends of the victim in the original network and check which of them are registered in the target network. 14 FieldScore Education2 Company2 City & Country 1

15

Evaluation  Crawling Experiments  Experiments (Profile Cloning)  Experiments(Cross-site profile cloning) 16

Crawling Experiments  StudiVZ and MeinVZ  profiles/day  5 million public user profiles with contact information and more than 1.2 million profiles with complete user information  Xing  118,000 profiles 17

Experiments (Profile Cloning)  1.Wanted to test how willing users would be to accept friendship requests from forged profiles of people who were already on their friendship lists.(in Facebook )  Using iCloner, it duplicated 5 user profiles (same name, arbitrary birth date, same picture, D1,…,D5)  iClone sent requests to all contact for each victim.( 705 users in total) 18

Experiments (Profile Cloning)  2.How effective profile cloning is with respect to requests that the contacted users might receive from people that they do not know  These profiles consisted of random names and pictures of arbitrary people.(F1,…,F5)  We contacted the same users from these accounts as with the respective forged profiles. 19

Experiments (Profile Cloning)  3How much trust users would have in messages that they would receive from their new contacts. 20

Experiments (Profile Cloning) 21

Experiments (Profile Cloning) 22

Experiments(Cross-site profile cloning)  A profile taken from a social network is cloned to another social network.  XING 30,000 profiles,and found 3,700 also registered in LinkedIn.(12%)  It clone 5 XING account into LinkedIn and iCloner identified 78 out of 443 XING (17.6%)friend contacts were also registered on LinkedIn  In 2008, XING have 5 million registers. This attack Upper bound to 600,

Experiments(Cross-site profile cloning) Of the 78 contact requests that we sent to the users in LinkedIn, 56%, in total 44, were accepted. 24

Suggestions for improvements in social network site security  Overlapping the CAPTCHAs symbol  Rate limit  behavior-based anomaly detection 25

Conclusion  How easy it would be for a potential attacker to launch automate crawling and identity theft attacks against five popular social network sites.  This paper present two identity automated theft attacks  Social networking sites are useful, we believe it is important to raise awareness among users about the privacy and security risks that are involved. 26