Chain Exploitation—Social Networks Malware
ثبت نشده
چکیده
social life in the online world. It has become the most acceptable pattern of forging social connections on the web. Every new development has pros and cons in its own sphere, though, and social networking web sites are no different. Online social networks, being a part of the Web 2.0 world, are prone to attacks and malware infections. Social networks, such as Facebook, Twitter, MySpace, Orkut and Friendster, pose a grave threat to the security and privacy of users. This article discusses malware infection strategies used by attackers to infect social networking web sites and addresses security from the user perspectives—outlining effective, secure steps that can reduce the impact of malware infections.
منابع مشابه
SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks
As social networking sites such as Facebook and Twitter are becoming increasingly popular, a growing number of malicious attacks, such as phishing and malware, are exploiting them. Among these attacks, social botnets have sophisticated infrastructure that leverages compromised users accounts, known as bots, to automate the creation of new social networking accounts for spamming and malware prop...
متن کاملTorinj : Automated Exploitation Malware Targeting Tor Users
We propose in this paper a new propagation vector for malicious software by abusing the Tor network. Tor is particularly relevant, since operating a Tor exit node is easy and involves low costs compared to attack institutional or ISP networks. After presenting the Tor network from an attacker perspective, we describe an automated exploitation malware which is operated on a Tor exit node targeti...
متن کاملModeling Malware Propagation in Networks
The paper proposes to study spreading characteristics of malware using a stochastic model, based on the Interactive Markov Chains, that belongs to the special case called “influence model.” We generalize influence model so that the status of a node and the influences a node exerts from neighbors depend on the current status of the node and the statuses of its neighbors. Such generalized model i...
متن کاملModeling the Propagation of Trojan Malware in Online Social Networks
The popularity and widespread usage of online social networks (OSN) have attracted cyber criminals who have used OSNs as a platform to spread malware. Among different types of malware in OSNs, Trojan is the most popular type with hundreds of attacks on OSN users in the past few years. Trojans infecting a user’s computer have the ability to steal confidential information, install ransomware and ...
متن کاملA Survey of Various Security Issues in Online Social Networks
The most emerging communication medium for the last decade of years is Online Social Networks (OSNs). Online Social Network makes the communication quicker and cheaper. Facebook, Twitter, Google Plus, MySpace, Orkut, etc are the various existing online social networks. Among all the online social networks very few could turn the attention of the people towards them. However, all these social ne...
متن کامل