THE IMPACT OF CYBER THREATS ON SOCIAL NETWORKING SITES
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
S. Hathi, “How Social Networking Increases Collaboration at IBMâ€, Strategic Communication Management, vol. 14, no. 1, (2009), pp. 32-35.
www.securelist.com, «â€Instant†threats», Denis Maslennikov, Boris Yampolskiy, 27.05.2008.
Hak J. Kim " Online Social Media Networking and Assessing Its Security Risks:, International Journal of Security and Its Applications, Vol. 6, No. 3, July, 2012.
www.statista.com/statistics.
Davison, H.K.; Maraist, C.C.; Hamilton, R.; Bing, M.N. To Screen or Not to Screen? Using the Internet for Selection Decisions. Empl. Responsib. Rights J. 2012, 24, 1–21.
Baltazar, J.; Costoya, J.; Flores, R. “The Real Face of Koobfaceâ€: The Largest Web 2.0 Botnet Explained. Trend Micro Threat Research, 2009.
Alghamdi, B.; Watson, J.; Xu, Y. “Toward detecting malicious links in online social networks through user behaviorâ€. In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence Workshops, Omaha, NE, USA, 13-16 October 2016; pp.5-8.
Muhammet Baykara and Zahit Ziya Gürel, “Detection of phishing attacksâ€, 2018 IEEE, 978-1-5386-3449-3/18.
Protalinski, E. Chinese Spies Used Fake Facebook Profile to Friend Nato Officials. Available online: https://www.zdnet.com/article/chinese-spies-used-fake-facebook-profile-to-friend-nato-officials.
A.Vishwanath,â€Getting phished on social mediaâ€, “Decisios Support Systemsâ€, ELSEVIER., Vol. 103, November 2017, Pages 70-81.
Raman, P.: ,â€JaSPIn: JavaScript based anomaly detection of cross-site scripting attacks.â€, Ph.D. thesis, Carleton University, Ottawa (2008).
Faghani, M.R.; Nguyen, U.T., “A study of XSS worm propagation and detection mechanisms in online social
networks.â€, IEEE Trans. Inf. Forensics Secur. 2013, 8, 1815–1826.
S. T., Joshi, J., & Tipper, D. Zargar, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. ," IEEE communications surveys & tutorials, 2013.
Anstee, D., Escobar, J., Chui, C.F., Sockrider,G.2015,Jan 27). 10th Annual Worldwide Infrastructure Security Report. Arbor Networks Inc.
Arora, K., Kumar, K., & Sachdeva, M. (2011). Impact analysis of recent DDoS attacks. International Journal on Computer Science and Engineering,3(2), 877-883.
Zainab S. Alwan, Manal F. Younis, "Detection and Prevention of SQL Injection Attack: A Survey", International Journal of Computer Science and Mobile Computing, Vol.6 Issue.8, August- 2017, pp. 5-17.
Rua Mohamed Thiyah, Iyab Musab A. M. Ali, Farooq Basil Abdulqader," THE IMPACT OF SQL INJECTION ATTACKS ON THE SECURITY OF DATABASES", Proceedings of the 6th International Conference on Computing and Informatics, ICOCI 2017 25-27 April, 2017 Kuala Lumpur. Universiti Utara Malaysia .
Vatu, G., (2017), Critical SQL Injection Vulnerability Found in NextGEN Gallery WorldPress Plugin http://news.softpedia.com/news/critical-sql-injection-vulnerability-found-in-nextgengallery-wordpress-plugin-513375.shtml.
Amir, W., (2017), Gun retailer Airsoft GI’s Forum hacked; 65,000 user accounts leaked https://www.hackread.com/gun-retailer-airsoft-gi-forums-hacked/.
Fuchs, C.; Trottier, D., “Towards a theoretical model of social media surveillance in contemporary societyâ€, Commun. Eur. J. Commun. Res. 2015, 40, 113–135.
IAN BROWN,†Social Media Surveillanceâ€, The International Encyclopedia of Digital Communication and Society, First Editionâ€, 2015 John Wiley & Sons, Inc. Published 2015 by John Wiley & Sons, Inc., DOI: 10.1002/9781118290743.wbiedcs122.
S. Nowson and J. Oberlander, "The identity of bloggers: Openness and gender in personal weblogs In Proc. of AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs", pages 163–167, 2006.
Ali, S.; Rauf, A.; Islam, N.; Farman, H.; Khan, S. User Proï¬ling:, "A Privacy Issue in Online Public Network.", Sindh Univ. Res. J. (Sci. Seri.) 2017, 49, 125–128.
N. Z. Gong and B. Liu,†Attribute Inference Attacks in Online Social Networksâ€, ACM Transactions on Privacy and Security, Vol. 21, No. 1, Article 3. Publication date: January 2018.
Heatherly, R.; Kantarcioglu, M.; Thuraisingham, B. “Preventing private information inference attacks on social networks.â€, IEEE Trans. Knowl. Data Eng. 2013, 25, 1849–1862.
Viswanath, B.; Bashir, M.A.; Crovella, M.; Guha, S.; Gummadi, K.P.; Krishnamurthy, B.; Mislove, A., “Towards Detecting Anomalous User Behavior in Online Social Networks.â€, In Proceedings of the USENIX Security Symposium, San Diego, CA, USA, 20–22 August 2014; pp. 223–238.
Sloane Burke Winkelman, Jody Oomen Early, Ashley D. Walker, Lawrence Chu , Alice Yick-Flanagan,†Exploring Cyber Harassment among Women Who Use Social Mediaâ€, Universal Journal of Public Health 3(5): 194-201, 2015. DOI: 10.13189/ujph.2015.030504.
http://www.pewinternet.org/2017/07/11/online harassment-2017/
Lundeen, R.; Ou, J.; Rhodes, T.," New Ways Im Going to Hack Your Web APP". Black Hat Abu Dhabi, 2011. Available Online: https://www.blackhat.com/html/bh-ad 11/bh-ad-11-archives.html#Lundeen.
BCC Risk Advisory Ltd., 2016 Vulnerability Statistics Report Edgescan, 2016. Available Online: http://www.edgescan.com.
K. MURPHY, "Web Photos That Reveal Secrets, Like Where You Live", The New York Times, AUG,11, 2010.
https://www.nytimes.com/2010/08/12/technology/personaltech/12basics.html.
L. Humphreys, P. Gill, and B. Krishnamurthy,"How much is too much? Privacy issues on Twitters.", In Conference of International Communication, Pages 1-29. ACM Press, 2010.
H. Mao, X. Shuai, A.Kapadia, "Loose Tweets: An Analysis of Privacy Leaks on Twitter", In proceeding of the 10th annual ACM workshop on privacy in the electronic scoiety, pages 1-12. ACM, October, 2011.
Bolton, R.J. and Hand, D.J. 2002. Statistical Fraud Detection: A Review. Statistical Science. 17, 3 (2002), 235–249.
Torabi, S.; Beznosov, K. Privacy Aspects of Health Related Information Sharing in Online Social Networks. In Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, Washington, DC, USA, 12 August 2013; p. 3.
Scism, L.; Maremont, M. Insurers Test Data Proï¬les to Identify Risky Clients. The Wall Street Journal, 19 November 2010.
Wani, M.A.; Jabin, S.; Ahmad, N. A sneak into the Devil’s Colony-Fake Proï¬les in Online Social Networks. Available online:https://arxiv.org/abs/1803.08810. 2018.
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu," The Socialbot Network: When Bots Socialize for Fame and Money",In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011.
https://phys.org/news/2018-09-people-fall-fake-profiles-online.html.
Ding, X.; Zhang, L.; Wan, Z.; Gu, M.,†A brief survey on de-anonymization attacks in online social networksâ€. In Proceedings of the IEEE International Conference on Computational Aspects of Social Networks (CASoN 2010), Taiyuan, China, 26–28 September 2010; pp. 611–615.
Gulyás, G.G.; Simon, B.; Imre, S. An Efficient and Robust Social Network De-anonymization Attack. In Proceedings of the Workshop on Privacy in the Electronic Society, Vienna, Austria, 24 October 2016; pp. 1–11.
Wei-Han Lee, Changchang Liu, Shouling Ji, “Blind De-anonymization Attacks using Social Networksâ€, Proceedings of the 2017 on Workshop on privacy in the Electronic Society. Dallas, Texas, USA, October 2017.
Chang, Lulu, "Wookie mistake: 'starwars' is now one of the world's 25 worst passwords". January 19, 2016. Digital Trends.
Bruner, Raisa,"The 25 Worst Passwords You Should Never Use". January 23, 2017. TIME.
Korosec, Kirsten,"The 25 Most Common Passwords of 2017 Include 'Star Wars'". FORTUNE. December 19, 2017
Ehrenkranz, Melanie, "The 25 Most Popular Passwords of 2018 Will Make You Feel Like a Security Genius". Gizmodo. December 13, 2018.
https://www.teamsid.com/splashdatas-top-100-worst-passwords-of-2018/.
https://www.xperience-group.com/wp-content/uploads/ 2018/10/Cybersecurity-Presentation-October-2018.pdf.
https://www.statista.com/statistics/709789/most-pressing-global-cyber-security-issues/.