Chain Exploitation—Social Networks Malware

ثبت نشده
چکیده

social life in the online world. It has become the most acceptable pattern of forging social connections on the web. Every new development has pros and cons in its own sphere, though, and social networking web sites are no different. Online social networks, being a part of the Web 2.0 world, are prone to attacks and malware infections. Social networks, such as Facebook, Twitter, MySpace, Orkut and Friendster, pose a grave threat to the security and privacy of users. This article discusses malware infection strategies used by attackers to infect social networking web sites and addresses security from the user perspectives—outlining effective, secure steps that can reduce the impact of malware infections.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks

As social networking sites such as Facebook and Twitter are becoming increasingly popular, a growing number of malicious attacks, such as phishing and malware, are exploiting them. Among these attacks, social botnets have sophisticated infrastructure that leverages compromised users accounts, known as bots, to automate the creation of new social networking accounts for spamming and malware prop...

متن کامل

Torinj : Automated Exploitation Malware Targeting Tor Users

We propose in this paper a new propagation vector for malicious software by abusing the Tor network. Tor is particularly relevant, since operating a Tor exit node is easy and involves low costs compared to attack institutional or ISP networks. After presenting the Tor network from an attacker perspective, we describe an automated exploitation malware which is operated on a Tor exit node targeti...

متن کامل

Modeling Malware Propagation in Networks

The paper proposes to study spreading characteristics of malware using a stochastic model, based on the Interactive Markov Chains, that belongs to the special case called “influence model.” We generalize influence model so that the status of a node and the influences a node exerts from neighbors depend on the current status of the node and the statuses of its neighbors. Such generalized model i...

متن کامل

Modeling the Propagation of Trojan Malware in Online Social Networks

The popularity and widespread usage of online social networks (OSN) have attracted cyber criminals who have used OSNs as a platform to spread malware. Among different types of malware in OSNs, Trojan is the most popular type with hundreds of attacks on OSN users in the past few years. Trojans infecting a user’s computer have the ability to steal confidential information, install ransomware and ...

متن کامل

A Survey of Various Security Issues in Online Social Networks

The most emerging communication medium for the last decade of years is Online Social Networks (OSNs). Online Social Network makes the communication quicker and cheaper. Facebook, Twitter, Google Plus, MySpace, Orkut, etc are the various existing online social networks. Among all the online social networks very few could turn the attention of the people towards them. However, all these social ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010