A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content Michael Robertson, Yin Pan, and Bo Yuan Department of Networking,

Slides:



Advertisements
Similar presentations
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /7/181Data Mining & Machine Learning Lab.
Advertisements

Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Understanding and Detecting Malicious Web Advertising
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Social Media What it means for Ohio State. Social Media So you’ve got Facebook, Twitter, YouTube, Four Square, and Google + What is next Make it effective,
Building Robust and Automatic Authentication Systems with Activity- Based Personal Questions Mentor: Danfeng Yao Anitra Babic Chestnut Hill College Computer.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Free Online Resources: Build Your Youth Program 2008 National Convention.
Norman SecureSurf Protect your users when surfing the Internet.
Examining the Effectiveness and Techniques of the Anti-Phishing Technology in Leading Web Browsers and Security Toolbars. Wesley W. Owen
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
Hacker Zombie Computer Reflectors Target.
Using Windows Firewall and Windows Defender
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
 New age way of communication.  Virtual Network of Friends and Co-Workers through the click of a button.  Groups of individuals interact by region,
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 9/19/2015Slide 1 (of 32)
Separate your corporate environment from unknown threats of the WEB. Define trusted WEB policy. Enforce the use of WEB browsers. Automatically distribute.
Supplied on \web site. on January 10 th, 2008 Reducing Risk Through Incremental Malware Detection January 2008.
What is social networking? 1.Social networking is the grouping of individuals into specific groups 2.networking is possible in person, for example in.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 2 This material was developed by Oregon Health.
Web 2.0: Concepts and Applications 2 Publishing Online.
 Facebook  Twitter  MySpace  Windows LiveSpace.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
11 CANTINA: A Content- Based Approach to Detecting Phishing Web Sites Reporter: Gia-Nan Gao Advisor: Chin-Laung Lei 2010/6/7.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
A Basic Introduction to Computer Security John H. Porter University of Virginia Department of Environmental Sciences.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds Authors: Rasheed Hussain ∗, Fizza Abbas ∗, Junggab Son ∗,
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
2009 Eighth International Conference on Networks 1 Speaker : Chang, Kun-Hsiang.
Toward Worm Detection in Online Social Networks Wei Xu, Fangfang Zhang, and Sencun Zhu ACSAC
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
What is Spam? d min.
The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol
Bell Ringer Activity  Pick up a graphic organizer about Social Networking  First, in your own words, explain what social media means to you (be prepared.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
SECURITY ISSUES IN SOCIAL NETWORKING SITES. M OTIVATION : DDOS attack in network and transport layer has been in discussion a lot but not much in application.
Escalation Of Ad Wars Boosts Malware Delivery
Managing Windows Security
    Customer Profile: If you have tech savvy customers, having your site secured for mobile users is recommended. Business Needs: With the growing number.
An Introduction to Phishing and Viruses
Social Media Attacks.
Internet Identity, Safety, & Security
Software Applications for end-users
SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou, and David Evans 23rd USENIX Security Symposium, August,
Are these Ads Safe: Detecting Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan Riley.
Computer Security.
Overview Blogs and wikis are two Web 2.0 tools that allow users to publish content online Blogs function as online journals Wikis are collections of searchable,
Web Mining Department of Computer Science and Engg.
Malware and how to defend against it
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content Michael Robertson, Yin Pan, and Bo Yuan Department of Networking, Security, and Systems Administration B. Thomas Golisano College of Computing and Information Sciences Rochester Institute of Technology Rochester, New York Speaker: 林韋呈 MA2G0101 碩研資工一甲 1

Outline  Introduction  The Facebook Application System  The Application Testing  Experiment Results  Conclusions 2

Introduction(1/3)  In recent years, the tremendous growth in both the size and popularity of social networking sites, such as MySpace, Twitter and Facebook.  Unfortunately, the proliferation of computer malware, such as viruses and phishing attacks, has also continued to rise in this same span of time 3

Introduction(2/3)  One of the most famous examples of this new breed of attacks is the Koobface virus, which has plagued users of both Facebook and MySpace.  the Koobface virus spreads through hyperlinks that appear to come from one of your friends, usually advertising a funny video. 4

Introduction(3/3)  In an attempt to combat this problem, static methods, such as blacklists, often have a tremendous success rate when it comes to identifying attacks, hough they are often difficult to maintain due to the short lifespan of malware and phishing sites.  Dynamic detection methods, such as the server’s geographic location, domain name, or offered content. 5

The Facebook Application System(1/5) Process Modules 6

The Facebook Application System(2/5)  Facebook Heuristics 7

The Facebook Application System(3/5)  Traditional Heuristics 8

The Facebook Application System(4/5)  Google Safe Browsing Checks the URL hash against the Google Safe Browsing databases (both blacklist and malware). If the URL exits in either the blacklist or malware list, the score for the link will be $BAD SCORE*100, which penalizes the link severely; otherwise, just return $GOOD SCORE 9

The Facebook Application System(5/5)  Twitter Heuristics If the full link appears on Twitter, the check function returns $GOOD SCORE*2, else if the domain used in the link appears on Twitter, the function returns $GOOD SCORE; otherwise, the function returns $BAD SCORE. 10

The Application Testing  Once the application was built, testing began by volunteers who approved the application for use on their profiles and ran the automatic scan on their News Feeds several times.  During the testing, 377 individuals were reached, only 22 took the time to participate in the study. the application is split into two main functional components: the automated scan and the manual scan. 11

Experiment Results 12

Experiment Results(1/3) 13

Experiment Results(2/3) 14

Experiment Results(3/3) 15

Conclusions  This research has shown that it is in fact possible to detect malicious web content with the help of heuristics based on social networking data.  This research was able to exceed the 34% success rate for detecting legitimate content achieved by Boykin and Roychowdhury in their study.  Bring its effectiveness to a point that is reliable enough for use in real-world environments. 16

Q&A 17

感謝聆聽 18