skip to main content
10.1145/1966913.1966939acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Malware propagation in online social networks: nature, dynamics, and defense implications

Published:22 March 2011Publication History

ABSTRACT

Online social networks, which have been expanding at a blistering speed recently, have emerged as a popular communication infrastructure for Internet users. Meanwhile, malware that specifically target these online social networks are also on the rise. In this work, we aim to investigate the characteristics of malware propagation in online social networks. Our study is based on a dataset collected from a real-world location-based online social network, which includes not only the social graph formed by its users but also the users' activity events. We analyze the social structure and user activity patterns of this network, and confirm that it is a typical online social network, suggesting that conclusions drawn from this specific network can be translated to other online social networks. We use extensive trace-driven simulation to study the impact of initial infection, user click probability, social structure, and activity patterns on malware propagation in online social networks. We also investigate the performance of a few user-oriented and server-oriented defense schemes against malware spreading in online social networks and identify key factors that affect their effectiveness. We believe that this comprehensive study has deepened our understanding of the nature of online social network malware and also shed light on how to defend against them effectively.

References

  1. F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user behavior in online social networks. Chicago, Illinois, USA, 2009.Google ScholarGoogle Scholar
  2. L. Briesemeister, P. Lincoln, and P. Porras. Epidemic profiles and defense of scale-free networks. In Proceedings of the 2003 ACM workshop on Rapid malcode, Washington, DC, USA, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. http://www.brightkite.com/.Google ScholarGoogle Scholar
  4. http://www.caida.org.Google ScholarGoogle Scholar
  5. A. Clauset, M. E. J. Newman, and C. Moore. Finding community structure in very large networks. Physical Review E, 70(6), 2004.Google ScholarGoogle ScholarCross RefCross Ref
  6. A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-law distributions in empirical data. arXiv:0706.1062, June 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. http://www.theregister.co.uk/2010/06/01/facebook_clickjacking_worm/.Google ScholarGoogle Scholar
  8. http://www.cert.org/advisories/CA-2001-19.html.Google ScholarGoogle Scholar
  9. Z. Dezső and A. Barabási. Halting viruses in scale-free networks. Physical Review E, 65(5):055103, May 2002.Google ScholarGoogle ScholarCross RefCross Ref
  10. http://www.facebook.com/press/info.php?statistics.Google ScholarGoogle Scholar
  11. http://www.computerworld.com/s/article/9128842/Koobface_worm_to_users_Be_my_Facebook_friend.Google ScholarGoogle Scholar
  12. M. R. Faghani and H. Saidi. Malware propagation in online social networks. In Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software, Montreal, Canada, October 2009.Google ScholarGoogle ScholarCross RefCross Ref
  13. http://www.gnip.org/.Google ScholarGoogle Scholar
  14. C. Griffin and R. Brooks. A note on the spread of worms in scale-free networks. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 36(1):198--202, Feb. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Guo, E. Tan, S. Chen, X. Zhang, and Y. Zhao. Analyzing patterns of user content generation in online social networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, Paris, France, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. http://igraph.sourceforge.net/.Google ScholarGoogle Scholar
  17. http://www.kaspersky.com/news?id=207575670.Google ScholarGoogle Scholar
  18. N. Li and G. Chen. Analysis of a location-based social network. In Proceedings of the International Symposium on Social Intelligence and Networking, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. http://www.pandasecurity.com/NR/rdonlyres/BBB11FA2-10BD-435A-B936-5CD55C45E427/0/Malwaretargetssocialnetworks.pdf.Google ScholarGoogle Scholar
  20. M. Mannan and P. C. van Oorschot. On instant messaging worms, analysis and countermeasures. In Proceedings of the 2005 ACM workshop on Rapid malcode, Fairfax, VA, USA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. http://www.bnonews.com/news/242.html.Google ScholarGoogle Scholar
  22. A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Moore and M. E. J. Newman. Epidemics and percolation in small-world networks. Physical Review E, 61(5):5678--5682, May 2000.Google ScholarGoogle ScholarCross RefCross Ref
  24. M. E. J. Newman, Stephanie Forrest, and Justin Balthrop. Email networks and the spread of computer viruses. Physical Review E, 66(3), 2002.Google ScholarGoogle ScholarCross RefCross Ref
  25. http://en-us.nielsen.com/main/news/news_ releases/2009/september/nielsen_reports_17.Google ScholarGoogle Scholar
  26. http://www.statemaster.com/encyclopedia/Orkut.Google ScholarGoogle Scholar
  27. R. Pastor-Satorras and A. Vespignani. Immunization of complex networks. Physical Review E, 65, 2002.Google ScholarGoogle Scholar
  28. R. P. Satorras and A. Vespignani. Epidemic spreading in scale-free networks. Physical Review Letters, 86(14):3200--3203, Apr 2001.Google ScholarGoogle ScholarCross RefCross Ref
  29. http://www.cert.org/advisories/CA-2003-04.html.Google ScholarGoogle Scholar
  30. http://news.cnet.com/8301-13577_3-10160850-36.html.Google ScholarGoogle Scholar
  31. Telo and A. Nunes. Epidemics in small world networks. The European Physical Journal B - Condensed Matter and Complex Systems, 50(1):205--208, March 2006.Google ScholarGoogle Scholar
  32. http://www.pcworld.com/article/162992/twitter_worm_ attack_continues_heres_how_to_keep_safe.html.Google ScholarGoogle Scholar
  33. D. J. Watts. Six Degrees: The Science of a Connected Age. W. W. Norton & Company, 2003.Google ScholarGoogle Scholar
  34. D. J. Watts and S. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393:440--442, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  35. C. Wilson, B. Boe, A. Sala, K. P. N. Puttaswamy, and B. Y. Zhao. User interactions in social networks and their implications. In Proceedings of the 4th ACM European conference on Computer systems, Nuremberg, Germany, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. W. Xu, F. Zhang, and S. Zhu. Toward worm detection in online social networks. In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. G. Yan, Z. Xiao, and S. Eidenbenz. Catching instant messaging worms with change-point detection techniques. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, California, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. C. C. Zou, D. F. Towsley, and W. Gong. Email worms modeling and defense. In Proceedings of the International Conference on Computer Communications and Networks, 2004.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Malware propagation in online social networks: nature, dynamics, and defense implications

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
        March 2011
        527 pages
        ISBN:9781450305648
        DOI:10.1145/1966913

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 March 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        ASIACCS '11 Paper Acceptance Rate35of217submissions,16%Overall Acceptance Rate418of2,322submissions,18%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader