All Your Access Tokens Are Belong to Us: Uncovering Large Facebook Collusion Networks Using Honeypots

ثبت نشده
چکیده

Reputation fraud is prevalent in online social networks. Numerous services provide fake content, likes, and followers to artificially boost the popularity and trustworthiness of brands and celebrities. Such activities undermine the trusted nature of online social networks. In this paper, we uncover a thriving ecosystem of reputation manipulation services on Facebook that leverage the principle of collusion. These collusion networks retrieve access tokens from colluding members by exploiting vulnerable third-party Facebook applications. Using a large pool of these access tokens, collusion networks provide likes and comments to their members on behalf of the vulnerable applications. We identify more than a million colluding Facebook accounts by “milking” a sample of collusion networks using honeypots. Our investigation reveals that popular collusion networks are actively used by hundreds of thousands of Facebook accounts for reputation manipulation on a daily basis. Collusion network operators monetize their services by displaying advertisements on their websites and offering a variety of premium reputation manipulation plans. We discuss several countermeasures to disrupt the devious activities of collusion networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey: Evaluation Study of Privacy Conflicts in OSNs

In the age of the Internet, privacy is a luxury and you have to constantly be on your heels to maintain it. OSN makes it particularly hard for users to guard their personal data. Besides many changes, Facebook privacy settings remain complicated. Even, past updates have unexpectedly made previously private information available to the public. It is difficult to balance the right of privacy and ...

متن کامل

Inclusive Collusion Neutrality on Networks

In the context of cooperative games with transferable utility, an inclusive collusion grants each colluding player access to resources of all colluding players and therefore transforms a given game. Inclusive collusion neutrality requires that no group of players can change their total payo↵ with an inclusive collusion. Assuming that collusion formation is governed by a network defined over pla...

متن کامل

Detection of app collusion potential using logic programming

Android is designed with a number of built-in security features such as app sandboxing and permission-based access controls. Android supports multiple communication methods for apps to cooperate. This creates a security risk of app collusion. For instance, a sandboxed app with permission to access sensitive data might leak that data to another sandboxed app with access to the internet. In this ...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016