ABSTRACT
Online social networks, which have been expanding at a blistering speed recently, have emerged as a popular communication infrastructure for Internet users. Meanwhile, malware that specifically target these online social networks are also on the rise. In this work, we aim to investigate the characteristics of malware propagation in online social networks. Our study is based on a dataset collected from a real-world location-based online social network, which includes not only the social graph formed by its users but also the users' activity events. We analyze the social structure and user activity patterns of this network, and confirm that it is a typical online social network, suggesting that conclusions drawn from this specific network can be translated to other online social networks. We use extensive trace-driven simulation to study the impact of initial infection, user click probability, social structure, and activity patterns on malware propagation in online social networks. We also investigate the performance of a few user-oriented and server-oriented defense schemes against malware spreading in online social networks and identify key factors that affect their effectiveness. We believe that this comprehensive study has deepened our understanding of the nature of online social network malware and also shed light on how to defend against them effectively.
- F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user behavior in online social networks. Chicago, Illinois, USA, 2009.Google Scholar
- L. Briesemeister, P. Lincoln, and P. Porras. Epidemic profiles and defense of scale-free networks. In Proceedings of the 2003 ACM workshop on Rapid malcode, Washington, DC, USA, 2003. Google ScholarDigital Library
- http://www.brightkite.com/.Google Scholar
- http://www.caida.org.Google Scholar
- A. Clauset, M. E. J. Newman, and C. Moore. Finding community structure in very large networks. Physical Review E, 70(6), 2004.Google ScholarCross Ref
- A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-law distributions in empirical data. arXiv:0706.1062, June 2007. Google ScholarDigital Library
- http://www.theregister.co.uk/2010/06/01/facebook_clickjacking_worm/.Google Scholar
- http://www.cert.org/advisories/CA-2001-19.html.Google Scholar
- Z. Dezső and A. Barabási. Halting viruses in scale-free networks. Physical Review E, 65(5):055103, May 2002.Google ScholarCross Ref
- http://www.facebook.com/press/info.php?statistics.Google Scholar
- http://www.computerworld.com/s/article/9128842/Koobface_worm_to_users_Be_my_Facebook_friend.Google Scholar
- M. R. Faghani and H. Saidi. Malware propagation in online social networks. In Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software, Montreal, Canada, October 2009.Google ScholarCross Ref
- http://www.gnip.org/.Google Scholar
- C. Griffin and R. Brooks. A note on the spread of worms in scale-free networks. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 36(1):198--202, Feb. 2006. Google ScholarDigital Library
- L. Guo, E. Tan, S. Chen, X. Zhang, and Y. Zhao. Analyzing patterns of user content generation in online social networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, Paris, France, 2009. Google ScholarDigital Library
- http://igraph.sourceforge.net/.Google Scholar
- http://www.kaspersky.com/news?id=207575670.Google Scholar
- N. Li and G. Chen. Analysis of a location-based social network. In Proceedings of the International Symposium on Social Intelligence and Networking, 2009. Google ScholarDigital Library
- http://www.pandasecurity.com/NR/rdonlyres/BBB11FA2-10BD-435A-B936-5CD55C45E427/0/Malwaretargetssocialnetworks.pdf.Google Scholar
- M. Mannan and P. C. van Oorschot. On instant messaging worms, analysis and countermeasures. In Proceedings of the 2005 ACM workshop on Rapid malcode, Fairfax, VA, USA, 2005. Google ScholarDigital Library
- http://www.bnonews.com/news/242.html.Google Scholar
- A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 2007. Google ScholarDigital Library
- C. Moore and M. E. J. Newman. Epidemics and percolation in small-world networks. Physical Review E, 61(5):5678--5682, May 2000.Google ScholarCross Ref
- M. E. J. Newman, Stephanie Forrest, and Justin Balthrop. Email networks and the spread of computer viruses. Physical Review E, 66(3), 2002.Google ScholarCross Ref
- http://en-us.nielsen.com/main/news/news_ releases/2009/september/nielsen_reports_17.Google Scholar
- http://www.statemaster.com/encyclopedia/Orkut.Google Scholar
- R. Pastor-Satorras and A. Vespignani. Immunization of complex networks. Physical Review E, 65, 2002.Google Scholar
- R. P. Satorras and A. Vespignani. Epidemic spreading in scale-free networks. Physical Review Letters, 86(14):3200--3203, Apr 2001.Google ScholarCross Ref
- http://www.cert.org/advisories/CA-2003-04.html.Google Scholar
- http://news.cnet.com/8301-13577_3-10160850-36.html.Google Scholar
- Telo and A. Nunes. Epidemics in small world networks. The European Physical Journal B - Condensed Matter and Complex Systems, 50(1):205--208, March 2006.Google Scholar
- http://www.pcworld.com/article/162992/twitter_worm_ attack_continues_heres_how_to_keep_safe.html.Google Scholar
- D. J. Watts. Six Degrees: The Science of a Connected Age. W. W. Norton & Company, 2003.Google Scholar
- D. J. Watts and S. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393:440--442, 1998.Google ScholarCross Ref
- C. Wilson, B. Boe, A. Sala, K. P. N. Puttaswamy, and B. Y. Zhao. User interactions in social networks and their implications. In Proceedings of the 4th ACM European conference on Computer systems, Nuremberg, Germany, 2009. Google ScholarDigital Library
- W. Xu, F. Zhang, and S. Zhu. Toward worm detection in online social networks. In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), 2010. Google ScholarDigital Library
- G. Yan, Z. Xiao, and S. Eidenbenz. Catching instant messaging worms with change-point detection techniques. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, California, 2008. Google ScholarDigital Library
- C. C. Zou, D. F. Towsley, and W. Gong. Email worms modeling and defense. In Proceedings of the International Conference on Computer Communications and Networks, 2004.Google ScholarCross Ref
Index Terms
- Malware propagation in online social networks: nature, dynamics, and defense implications
Recommendations
Social exchange in online social networks. The reciprocity phenomenon on Facebook
Our research is focused on reciprocity, which is crucial for social exchanges.The online social network platform of our choice was Facebook, which is one of the most successful online social sites.In our study we found strong empirical evidence that an ...
Online social networks: Why do students use facebook?
The growth and popularity of online social networks has created a new world of collaboration and communication. More than a billion individuals around the world are connected and networked together to create, collaborate, and contribute their knowledge ...
The future of online social networks (OSN)
Use of media content promotes the social usage patterns between the connected users.OSN cultivates the growing trend of video sharing more distinctly than photo content.Online videos alone domain the diffusion patterns of interactive activities on ...
Comments