You are on page 1of 13

Assignment title: SECURITY THREATS IN AD-HOC SOCIAL

NETWORKS

Course title: NETWORK SECURITY


Course code: IT-302
Class: MSC-IT 2ND SMESTER

Submitted by: AROOJ ARIF

Roll no: 20010856-014


Submitted to: RESPECTED SIR MUJAHID AFZAL
Submission date: 22 JUNE 2021

DEPARTMENT OF INFORMATION TECHNOLOGY,


GOVT.UNIVERSTY OF GUJRAT

page1
Table of contents:

1.0 Abstract .....................................................................................1

2.0 introduction…………………………………………………...2

3.0 Review Methodology………………………............................3

4.0Threats of social networking sites………………......................4

5.0Security measures recommendations………………………….6

6.0Conclusions……………………………………………………8

8.0Refference……………………………………………………..9

page1
Security Threats of Social Networking Sites: An Analytical
Approach

AROOJ ARIF

Institute Of University of Gujarat

Abstract:

Social networks are also gaining more and more popularity in our community. The popularity of social
networks, such as facebook, twitter, skype, etc, has increased significantly. It is not only popular among
the younger generation, but it can also be used in all sections of the society, in order to meet the need to
find a job, income sources, as well as a tool to provide users with information about safety, rules, and
guidelines. The most important thing is to use it as a way to get in touch with an old and distant friends.
However, as with any new app, it's always important to have a full impression of it, and its impact on
safety and security. Each of these networks are made up of their own security mechanisms, which are
followed correctly, this can lead to a
the personal data or information, and the resources of the compromised leading to financial loses. In the
world of theft, spam, eavesdropping, malicious attacks, viruses, phishing, malware, data leaks, etc,
these kind of issues regarding the privacy of interest for many people the user is running a social
network is reduced. The scientific community is faced with a number of recent studies related to the
issues. The purpose of this paper is to introduce people to the social network in violation of the sites.
This paper presents a comparative study of the recovery of a variety of social networking sites.

Page | 1
I. INTRODUCTION

The dawn of the Internet has created forms of online sociality, including e-mail, Usenet news groups,
instant messaging, blogs, dating, etc, in all of this, something that is increasing in popularity with the
rapid use of social networking sites (SNSs). The SNA is the best source for recreational purposes,
mainly for young people. In fact, it is these social networking sites have become an integral part of
modern day of the Internet [1].

They also allow you to share your information (personal or professional) with people who may be out
of date, friends or strangers. Facebook, Facebook facebook, twitter, skype, India, Orkut, Brazil, china,
Vkontakte, the Russian federation, Mixi in Japan, and so on. Among them, Facebook is the main cause
of the withdrawal of the website. This social network allows you to create as many friends as you want,
[2].

It helps to be in touch with some old friends from high school, etc .. So, Twitter, and Linkedin are
typically used to build up a network of professional obligations. In this social network, to provide a
platform for the exchange of ideas, professional liability, etc, and They also allow the user to add a new
subscriber connections. It has become a part and parcel of everyday life, because it is an effective and
easy way for you to communicate with friends and relatives, or even strangers. [3]

This will help not only to facilitate the exchange of information, sharing of emotions and feelings [4].In
an on-line network that provides significant benefits to both individuals and businesses. As one of the
most important goals of the social networking sites to find people with similar tastes, and the like, it can
be said that it is providing all of the major networking sites. SNSS, you can search for a local friend of
the limiting requests, cities and towns, the workers were looking for a company, or to the like-minded
people. [5]

Some of the great benefits of on-line social networks:

a) To help people to keep in touch with each other in a very easy and efficient, even on a universal
level.
Page | 2
b) This is made to help people who have similar interests, so to speak, to interact with each other.

c) To give in to the environment, and the environment, methods, and channels, on-line
relationship, education and training, exchange of experiences and mutual trust.

• In business, the well-educated of the SNS in order to increase public awareness of the company and
enhance their hospitality, on the market in order to capture a wide range of people in order to be
included as an integral part of the strategic planning process [6].

In spite of the many benefits of SNSs, some of the companies seems to me to block access to social
networking sites, rather than to communicate with their employees, and to educate about the risks
involved.The reason is that the security and access control mechanisms of the SNSs are relatively low.
Rather than adopting a negative way of thinking of the model, the organization must develop an
effective education and training [7] and education, [8] for a study of the employees to the various
threats and risks related to the resistance of the measures relating to the security risk [9]. In addition,
they also need to be aware of safety standards and protocol, that is, they will need to know related to
cyber-security, [10] and [11].
The safety and security of those spots is weak, but because they are designed for the safety and integrity
of the individual, is the most important aspect of SNSs. This makes it difficult for the administrator to
check the users that the social network from a laptop or smartphone when they are in the office, at
home or anywhere else. Therefore, along with the benefits, there are some security and privacy issues in
a lot of SNSS [6]. In addition, the design of SNSs must adhere to the 21 rules, in order to ensure
security, as it ensures the implementation of appropriate security [12].

The rest of the article is organized as follows: section II describes some of the threats in the social
networks, in section III, the comments made on the security measures in place. Conclusions and further
work are presented in section IV.

Page | 3
2. Review Methodology

We are trying to get the most up-to-date literature on the threats, challenges and solutions, the
Google search engine, in order to make use of the articles from a variety of web sites and
databases. First, the research articles that are generated by Google's universal search, for, review,
based on the most basic terms, such as 'ad-hoc', 'safety', 'danger', and 'solution'. Also, research the
items, please add to the basis of the creation of websites like ResearchGate, Springer, Elsevier,
Google Scholar, IEEE. The most important of the concepts that are used in Google to find is
designed to capture the categories of words and phrases as private networks, security threats, and
solutions in an ad-hoc*security, etc., OR an ad-hoc network OR ad hoc Wireless network (s)*,
AND security* AND threats OR issues*of the questions And their solutions.

In order to ensure a balanced presentation of the study, the following criteria were used:
a) any and All threats that are in the research, which was chosen for it.
b) as to Each of these solutions has been selected for research
c) Routing protocol, and the features were selected at random in a variety of studies

3. THREATS OF SOCIAL NETWORKING SITES

There are a number of threats that may cause harm to the social network, with A brief description
of some of these threats, all the rights are reserved to the below:

A. Baits: Destroying your photo, and many of the optimization techniques can be used. In this
mechanism, the use of the keyword in order to create a reference manual, and is used to rank the
websites. The ultimate social network that allows people to get behind, nice and warm, and in that
very moment. For example, Twitter is the list of the most popular topics in this web site are of a
simple game in a very friendly way that it will be warm, keywords, your, spam messages, to get to
the top. Some of the attackers had started to manipulate the Twitter messages before you forward
them. The attack is usually to search for messages that include threats of keywords. [5] [16]

B. follower scam: Social media is quickly becoming more important, and people are more
concerned with getting as many of your friends or followers as possible. In some groups, the
acceptance of any individual who is a member of the group, or not usually depends on the amount
of their social interactions. As a general rule, students, and the students, the university of lovers, it
is much more than what it is, friends, the Internet, and you will be able to use it.

Some of the fake sites, which also offers free of charge services, such as providing them with a new
mobile phone subscribers, which requires that you provide them with a user ID and password.Of
course, it's a bad idea to change your password, with a stranger, because you can control what
happens on your account. In most cases, it is also contrary to the terms and conditions of the social
networks [13] [16].

C. Impersonation of celebrities and friends: the symbol for the popular friends and a Lot of times
the fake profiles are also popular, as you can see it in the social networks. Sorry, there are no
policies that forbid anyone to sign up for a new account in the name of a well-known, or in any
other, and at the same time, there is no policy in order to use a public photo as your profile picture.
In fact, there is no real authentication with a view of the virtual profile of the real-world identity.
So, even prior to the entry are posted to let the right people who believe that it is an official
account.

Such a fake account can be used to spread false information and rumors, or, in order to attract new
subscribers, which is then able to be spammed. Sometimes, phishing attacks, and local trojan is to
steal information, are the most common causes, in order to steal your personal information. The
only person to receive the password for every account, he could manipulate the personal and
professional details of the owner of the account, and to update the status of the profile.

With this update, the messages often contain links to other harmful websites, in order to get the
most out of your website traffic. Because of the message appears to have come from a friend's
account, and that people's trust in them. This innate faith and the common interest, is the cause of a
high click rate of a malicious link, the attack was a great success. [14] [16]

D. The Koobface: The W32.The worm Koobface was one of the first major attacks, focusing on a
social networking site for many years, and it's still widespread and active today. It is a great
success, as the use of smart attacks, social engineering techniques, and the hope of the behavior of
social media users by accessing the links, [15] 16.
E. Phishing: This is a Phishing: not surprising, given that the social network who use a username
and password to log in to these services is also subject to a phishing attack. As phishing attacks
against banks, phishing attacks on social networks, can be of various types. Currently, the number
of phishing e-bait pitches to the community, due to the highly-3%, compared to 78%, as targeted in
the financial sector.
Apparently, this is due to the fact that the gain of the phishing bank accounts is much higher still. In
addition, to the creation of fake social media accounts is quite simple, easy, and can be used to
create an account for spam. [15] [16]

F. Advanced fee scams: in Accordance with the plans, and the social life has been an interesting
target for the developed is paid to the scammer, the so-called " 419 dələduzları. Because people are
willing to give out a lot of personal details, the scammers might easily decide on a donation, it can
come across as a fake, and the real-life reason for the chosen social engineering the game to make
use of.

These scams tend to do in the next year, is well-suited to date, the major benefit of, apparently, not
to the terms and conditions. It will then prompt the user that it has solved the problem, and will
require a small amount of money to be paid in advance. To pay the money for the aggressive
disappear, along with the significant resources [16].

4. SECURITY MEASURES RECOMMENDATIONS

A number of recommendations, which are the most important strategies in order to avoid the dangers
associated with online social networks, which are described below [6] [17] [19]:

 Information the disclosure of personal information in social networks.Users need to be more


aware of what they have found, through his / her personal profile on the Internet or in social
networks.
 The role of the government in raising awareness, the central government should initiate a variety
of education, training and awareness-raising campaigns, in order to provide users with
information about the effective use of social networks, and to encourage media service providers
to develop and experience of the company's security-oriented policies [6].
 Restructuring and reframing of the policy, and the structure of the current law, in order to change
it, it may be necessary, or the expansion, which is related to the implementation of some of the
issues such as the legal status, the image of the marking of the third party, which are not
considered to the available version. As a result, the regulatory framework governing the SNSS
have it again, and again, and again, it is.
 Strong and Dedicated members, the power of the method, the changes of the SNS, which is a
SNS. However, in order to avoid a fake and troublesome membership authentication mechanism
needs to be further strengthened.
 There are people who are normal SNSS, participants must be a good thing for users, it is of the
most powerful anti-virus, regular updates, and to protect, by default, anti-virus tool, it can work
more efficiently and effectively.
 For Information on creating and configuring the default privacy and security settings Since most
of the users are not aware of the need to change the default privacy setting, [6] and [17], it is
important to define the default settings, that is, in a secure manner.
 To provide the necessary authentication tools, safety and security: Providers should have better
policies in order to monitor the users of the various privacy and security issues [17].
 The government, with the support of an educational institution, which may carry out a variety of
programs to increase the awareness of security [18].
 Cyber-security should be included in the curriculum of the schools and higher education
institutions [18].
 The current security policy, it should be restored and refashioned in accordance with the existing
types of attacks and threats [18].

 Cyber-security should be included in the curriculum of the schools and higher education
institutions [18].
 The current security policy, it should be restored and refashioned in accordance with the
existing types of attacks and threats. [18].
5. CONCLUSION

While SNSS offer advanced interaction and communication, and it also helps them to take on new
issues of privacy and security. In this article, we are going to briefly identify some of the key
features and the benefits of social networking sites has made the Internet one of the most popular
technologies of the modern era. Our paper also provides a comparative analysis of key threats to the
safety of these social media sites.

Finally, some recommendations are made in order to strengthen the questions, and related aspects of
SNSS security, in order to ensure that the users are taking advantage of the websites and social
networking sites, rather than to be unhappy with their flaws. If you use these sites, caution and
careful when it comes to their safety, they can be the most dangerous and powerful tool for the
hacker to stop a user's personal and professional life. A well-informed, you will not only be to help
and support the safety, but also to educate others on these issues will be based best practices, which
Can be the default and up to date applications old and new it seems.
6. REFERENCES

[1]. Dinerman, B. (2011).Social networking and security risks. white paper, GFI software.

[2]. Giles Hogben, Social Networking - Security at The Digital Cocktail Party, Terena Network
Conference 2008 [Online] retrieved on 26th Nov, 2014 from
http://tnc2008.terena.org/schedule/presentations/show00ae.html?pres_id=7

[3]. Next Generation Electronic Identity - eID beyond PKI. [Online] http://www.enisa.europa.eu/
/pages/ eID/ eID_ws2007.htm.

[4]. Stan Schroeder, 20 Ways To Aggregate Your Social Networking Profiles. [Online]
http://mashable.com/2007/07/17/social-network-aggregrators

[5]. Acquisti, A., & Gross, R. (2006, January). Imagined communities: Awareness,
information sharing, and privacy on the Facebook. In Privacy enhancing technologies
(pp. 36-58).Springer Berlin Heidelberg.

[6]. Al Hasib, A. (2009).Threats of online social networks. IJCSNS International Journal of


Computer Science and Network Security, 9(11), 288-93.

[7]. Banerjee, C., &Pandey, S. K. (2010). Research on software security awareness: problems and
prospects. ACM SIGSOFT Software Engineering Notes, 35(5), 1-5.

[8]. Banerjee C., Banerjee Arpita, PandeyS. K. (2013): Software Security Awareness:
Comparison of Artifacts Based Awareness Tools and Techniques.SGVU Journal of
Engineering & Technology, 1(1), 33-38

[9]. Banerjee, A. B., &Murarka, P. D. (2013). An Improvised Software Security Awareness


Model. International Journal of Information, Communication and Computing Technology,
1(2), 43-48.

[10]. Banerjee C., MurarkaP D, Banerjee Arpita (2013). IT Security Practices in an Organisation:
Balancing Technology and Management Perspective.IMPETUS an Interdisciplinary Research
Journal.2(1).1-6.
[11]. Banerjee Arpita, Banerjee C. (2014). Cyber Security Awareness Through Education:
Problems and Prospects. IMPETUS an Interdisciplinary Research Journal.2(1).

[12]. Banerjee, C., &Pandey, S. K. (2009). Software Security Rules, SDLC Perspective. arXiv
preprint arXiv:0911.0494.

[13]. Boyd, D. (2003, October). Reflections on friendster, trust and intimacy.InIntimate


(Ubiquitous) Computing Workshop- Ubicomp (pp. 12-15).

[14]. Boyd, D. M. (2004).Friendster and publicly articulated social networking.

[15]. Chen, Y., Roussev, V., Richard III, G., &Gao, Y. (2005). Content-based image retrieval for
digital forensics.In Advances in Digital Forensics (pp. 271-282).Springer US.

[16]. Candid Wüest. The Risks of Social Networking. Symantec [Online]

[17]. Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:”
Social capital and college students’ use of online social network sites.Journal of Computer‐
Mediated Communication, 12(4), 1143-1168.

[18]. Al Mushayt, O. S. (2013). Threats and Anti-threats Strategies for Social Networking
Websites. International Journal of Computer Networks and Communications (IJCNC)Vol, 5.
[19] Kim, W., Jeong, O. R., & Lee, S. W. (2010). On social Web sites. Information Systems,
35(2), 215-236.
View publication stats

You might also like