social networking security

25
Social Networking Security Adam C. Champion and Dong Xuan CSE 4471: Information Security

Upload: ulric-delaney

Post on 31-Dec-2015

167 views

Category:

Documents


0 download

DESCRIPTION

Social Networking Security. Adam C. Champion and Dong Xuan CSE 4471: Information Security. Outline. Overview of Social Networking On-line Social Networking Mobile Social Networking Threats and Attacks Defense Measures. Online Social Networking (OSN). - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Social Networking Security

Social Networking Security

Adam C. Champion and Dong Xuan

CSE 4471: Information Security

Page 2: Social Networking Security

Outline

• Overview of Social Networking– On-line Social Networking

–Mobile Social Networking

• Threats and Attacks

• Defense Measures

Page 3: Social Networking Security

Online Social Networking (OSN)

• Online Web services enabling people to connect with each other, share information– Common friends, interests, personal info, …

– Post photos, videos, etc. for others to see

– Communicate via email, instant message, etc.

• Major OSN services: Facebook, Twitter, MySpace, LinkedIn, etc.

Page 4: Social Networking Security

“Giving people the power to share and make the world more open and connected.”

Page 5: Social Networking Security
Page 6: Social Networking Security

OSN Popularity

• Over 900 million Facebook users worldwide [6]– Over 150 million in U.S. [5]

– Over 450 million access via mobile [6]

– 300 million pictures uploaded to Facebook daily [6]

• Over 140 million Twitter users; over 340 million Tweets sent daily [7]

• Over 175 million LinkedIn members in over 200 countries [8]

Page 7: Social Networking Security

Benefits of OSN Communication

• Vast majority of college students use OSNs– Organizations want to market products, services, etc.

to this demographic– OSNs can help them reach these potential buyers

• OSNs provide communal forum for expression (self, group, mass), collaboration, etc.– Connect with old friends, find new friends and connect– Play games with friends, e.g., Mafia Wars, Scrabulous– Commerce in “virtual items”

• But using OSNs poses security issues for orgs as well as individuals

Page 8: Social Networking Security

Mobile Social Networking

• E-SmallTalker

• E-Shadow

8

Page 9: Social Networking Security

Application Scenario: Conference

Page 10: Social Networking Security

Small Talk

• People come into contact opportunistically

• Face-to-face interaction– Crucial to people's social networking

– Immediate non-verbal communication

– Helps people get to know each other

– Provides the best opportunity to expand social network

• Small talk is an important social lubricant– Difficult to identify significant topics

– Superficial

10

Page 11: Social Networking Security

A Naive Approach of Smartphone-based Small Talk

• Store all user’s information, including each user’s full contact list

• User report either his own geo-location or a collection of phone IDs in his physical proximity to the server using internet connection or SMS

• Server performs profile matching, finds out small talk topics (mutual contact, common interests, etc.)

• Results are pushed to or retrieved by users

11

Page 12: Social Networking Security

However……

• Require costly data services (phone’s internet connection, SMS)

• Require report and store sensitive personal information in 3rd party

• Trusted server may not exist

• Server is a bottleneck, single point of failure, target of attack

12

Page 13: Social Networking Security

E-SmallTalker – A Fully Distributed Approach

• No Internet connection required

• No trusted 3rd party

• No centralized server

• Information stored locally on mobile phones

• Original personal data never leaves a user’s phone

• Communication only happens in physical proximity

13

Page 14: Social Networking Security

E-Shadow

• Enhanced E-SmallTalker

– Local profiles

–Mobile phone based local social interaction tools• E-Shadow publishing

• E-Shadow localization

Page 15: Social Networking Security

Outline

• Overview of Social Networking

• Threats and Attacks

• Defense Measures

Page 16: Social Networking Security

OSN Security Threats/Attacks

• Malware distribution• Cyber harassment, stalking, etc.• Information “shelf life” in cyberspace• Privacy issues:– Information about person posted by him/herself, others– Information about people collected by OSNs

• Information posted on OSNs impacts unemployment, insurance, etc.

• Organizations’ concerns: brand, laws, regulations

Page 17: Social Networking Security

MSN Security Threat/Attacks

• Personal information leakage– Particularly dangerous because of physical proximity

• Malware distribution

17

Page 18: Social Networking Security

Outline

• Overview of Social Networking

• Threats and Attacks

• Defense Measures

Page 19: Social Networking Security

“Common Sense” Measures (1)• Use strong, unique passwords• Provide minimal personal information: avoid entering

birthdate, address, etc.• Review privacy settings, set them to “maximum privacy”

– “Friends of friends” includes far more people than “friends only”• Exercise discretion about posted material:

– Pictures, videos, etc.– Opinions on controversial issues– Anything involving coworkers, bosses, classmates, professors– Anything related to employer (unless authorized to do so)

• Be wary of 3rd party apps, ads, etc. (P.T. Barnum’s quote)• Supervise children’s OSN activity

Page 20: Social Networking Security

“Common Sense” Measures (2)

• “If it sounds too good to be true, it probably is”• Use browser security tools for protection:– Anti-phishing filters (IE, Firefox)– Web of Trust (crowdsourced website trust)– AdBlock/NoScript/Do Not Track Plus

• Personal reputation management:– Search for yourself online, look at the results…– Google Alerts: emails sent daily to you about results

for any search query (free), e.g., your name• Extreme cases:– Cease using OSNs, delete accounts– Contact law enforcement re. relentless online

harassment

Page 21: Social Networking Security

E-SmallTalker: Privacy-Preserved Information Exchange

Example of Alice’s Bloom filter

Alice has multiple contacts, such as Bob, Tom, etc.

Encode contact strings, Firstname.lastname@phone_number, such as “Bob.Johnson@5555555555” and

“Tom.Mattix@6141234567”

21

Page 22: Social Networking Security

E-Shadow: Layered Publishing

• Spatial Layering– WiFi SSID

• at least 40-50 meters, 32 Bytes

– Bluetooth Device (BTD) Name • 20 meters, 2k Bytes

– Bluetooth Service (BTS) Name• 10 meters, 1k Bytes

• Temporal Layering– For people being together long or repeatedly– Erasure Code

Page 23: Social Networking Security

Final Remarks

• On-line social networking systems are very popular and mobile social networking systems are emerging

• Malware distribution and personal information leakage are two most prominent threats and attacks

• Personal countermeasures are most effective

Page 24: Social Networking Security

References (1)1. G. Bahadur, J. Inasi, and A. de Carvalho, Securing the Clicks: Network Security in the Age of Social

Media, McGraw-Hill, New York, 2012.

2. H. Townsend, 4 Jun. 2010, http://www.k-state.edu/its/security/training/roundtables/presentations/SIRT_roundtable-RisksofSocialNetworking-Jun10.ppt

3. U.S. Dept. of State, “Social Networking Cyber Security Awareness Briefing,” http://www.slideshare.net/DepartmentofDefense/social-media-cyber-security-awareness-briefing

4. National Security Agency, “Social Networking Sites,” http://www.nsa.gov/ia/_files/factsheets/I73-021R-2009.pdf

5. Consumer Reports, Jun. 2012, http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm

6. S. Sengupta, 14 May 2012, http://www.nytimes.com/2012/05/15/technology/facebook-needs-to-turn-data-trove-into-investor-gold.html?_r=1&pagewanted=all

7. T. Wasserman, 21 Mar. 2012, http://mashable.com/2012/03/21/twitter-has-140-million-users/

8. LinkedIn Corp., 2012, http://press.linkedin.com/about

9. R. Richmond, “Web Gang Operating in the Open,” 16 Jan. 2012, https://www.nytimes.com/2012/01/17/technology/koobface-gang-that-used-facebook-to-spread-worm-operates-in-the-open.html?_r=1

Page 25: Social Networking Security

References (2)

10. J. Drömer and D. Kollberg, “The Koobface malware gang – exposed!”, 2012, http://nakedsecurity.sophos.com/koobface/

11. Wikipedia, https://en.wikipedia.org/wiki/Suicide_of_Megan_Meier

12. M. Schwartz, “The Trolls Among Us,” 3 Aug. 2008, https://www.nytimes.com/2008/08/03/magazine/03trolls-t.html?pagewanted=all

13. M. Raymond, “How Tweet It Is!: Library Acquires Entire Twitter Archive,” 14 Apr. 2010, http://blogs.loc.gov/loc/2010/04/how-tweet-it-is-library-acquires-entire-twitter-archive/

14. B. Borsboom, B. van Amstel, and F. Groeneveld, “Please Rob Me”, http://pleaserobme.com

15. D. Love, “13 People Who Got Fired for Tweeting,” 16 May 2011, http://www.businessinsider.com/twitter-fired-2011-5?op=1

16. C. Smith and C. Kanalley, “Fired Over Facebook: 13 Posts That Got People Canned,” http://www.huffingtonpost.com/2010/07/26/fired-over-facebook-posts_n_659170.html

17. https://twitter.com/BPglobalPR

18. http://curl.haxx.se/

19. http://jonathonhill.net/2012-05-18/unshorten-urls-with-php-and-curl/

20. http://www.securingsocialmedia.com/resources/