All Your Access Tokens Are Belong to Us: Uncovering Large Facebook Collusion Networks Using Honeypots
ثبت نشده
چکیده
Reputation fraud is prevalent in online social networks. Numerous services provide fake content, likes, and followers to artificially boost the popularity and trustworthiness of brands and celebrities. Such activities undermine the trusted nature of online social networks. In this paper, we uncover a thriving ecosystem of reputation manipulation services on Facebook that leverage the principle of collusion. These collusion networks retrieve access tokens from colluding members by exploiting vulnerable third-party Facebook applications. Using a large pool of these access tokens, collusion networks provide likes and comments to their members on behalf of the vulnerable applications. We identify more than a million colluding Facebook accounts by “milking” a sample of collusion networks using honeypots. Our investigation reveals that popular collusion networks are actively used by hundreds of thousands of Facebook accounts for reputation manipulation on a daily basis. Collusion network operators monetize their services by displaying advertisements on their websites and offering a variety of premium reputation manipulation plans. We discuss several countermeasures to disrupt the devious activities of collusion networks.
منابع مشابه
Survey: Evaluation Study of Privacy Conflicts in OSNs
In the age of the Internet, privacy is a luxury and you have to constantly be on your heels to maintain it. OSN makes it particularly hard for users to guard their personal data. Besides many changes, Facebook privacy settings remain complicated. Even, past updates have unexpectedly made previously private information available to the public. It is difficult to balance the right of privacy and ...
متن کاملInclusive Collusion Neutrality on Networks
In the context of cooperative games with transferable utility, an inclusive collusion grants each colluding player access to resources of all colluding players and therefore transforms a given game. Inclusive collusion neutrality requires that no group of players can change their total payo↵ with an inclusive collusion. Assuming that collusion formation is governed by a network defined over pla...
متن کاملDetection of app collusion potential using logic programming
Android is designed with a number of built-in security features such as app sandboxing and permission-based access controls. Android supports multiple communication methods for apps to cooperate. This creates a security risk of app collusion. For instance, a sandboxed app with permission to access sensitive data might leak that data to another sandboxed app with access to the internet. In this ...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کامل