AN INTELLIGENT AND NOVEL ALGORITHM FOR SECURING VULNERABLE USERS OF ONLINE SOCIAL NETWORK

S. Revathi, M. Suriakala
{"title":"AN INTELLIGENT AND NOVEL ALGORITHM FOR SECURING VULNERABLE USERS OF ONLINE SOCIAL NETWORK","authors":"S. Revathi, M. Suriakala","doi":"10.1109/ICCMC.2018.8487760","DOIUrl":null,"url":null,"abstract":"The last few years have witnessed a very fast-paced growth in the user base and activities of Online Social Networks (OSN). Their growth is attributed to the trust that they have received from people. People engage in social networks to make friends, chat, upload and like photos, update their status, and post comments. The use of social networks causes users to think less about the related security and privacy concerns in terms of OSNs. Trusting social networks leads to serious privacy concerns. Users disclose their information voluntarily, not knowing who exactly is going to access or use their data. They are less concerned about how safe their private information is, as they are more interested in meeting different people from across the globe. Their desire to connect with their family, friends, and virtual friends is apparent from their use of OSNs. The widespread use of social networks has also given rise to widespread impersonation. It is difficult to find a feasible solution to help counteract the negative consequences of this problem. This paper discusses the reasons behind information leaks, particularly, the way in which OSNs contribute to the intelligence used by hackers. A number of security measures for organizations are also included in the paper, to help them combat the activities related to leakage of information with respect to OSNs. It also identifies the future direction in terms of in-depth research in the fields by establishing a culture of security and implementing behavioral change. The Description Logic Rule Generation algorithm is proposed in the paper to be able to find and analyze the nature of vulnerabilities and attackers. The algorithm identifies vulnerable users on the basis of a sharing threshold. The users are removed in case they cross the threshold values. The paper also presents the security analysis of results of the OSNs popularity among users.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"22 1","pages":"214-219"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487760","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The last few years have witnessed a very fast-paced growth in the user base and activities of Online Social Networks (OSN). Their growth is attributed to the trust that they have received from people. People engage in social networks to make friends, chat, upload and like photos, update their status, and post comments. The use of social networks causes users to think less about the related security and privacy concerns in terms of OSNs. Trusting social networks leads to serious privacy concerns. Users disclose their information voluntarily, not knowing who exactly is going to access or use their data. They are less concerned about how safe their private information is, as they are more interested in meeting different people from across the globe. Their desire to connect with their family, friends, and virtual friends is apparent from their use of OSNs. The widespread use of social networks has also given rise to widespread impersonation. It is difficult to find a feasible solution to help counteract the negative consequences of this problem. This paper discusses the reasons behind information leaks, particularly, the way in which OSNs contribute to the intelligence used by hackers. A number of security measures for organizations are also included in the paper, to help them combat the activities related to leakage of information with respect to OSNs. It also identifies the future direction in terms of in-depth research in the fields by establishing a culture of security and implementing behavioral change. The Description Logic Rule Generation algorithm is proposed in the paper to be able to find and analyze the nature of vulnerabilities and attackers. The algorithm identifies vulnerable users on the basis of a sharing threshold. The users are removed in case they cross the threshold values. The paper also presents the security analysis of results of the OSNs popularity among users.
一种保护在线社交网络弱势用户的智能新算法
过去几年见证了在线社交网络(OSN)的用户基础和活动的快速增长。他们的成长归功于他们从人们那里得到的信任。人们在社交网络上交友、聊天、上传和点赞照片、更新状态和发表评论。社交网络的使用导致用户较少考虑与osn相关的安全和隐私问题。信任社交网络会导致严重的隐私问题。用户自愿披露他们的信息,不知道究竟谁将访问或使用他们的数据。他们不太关心自己的私人信息是否安全,因为他们对结识来自世界各地的不同的人更感兴趣。他们与家人、朋友和虚拟朋友联系的愿望从他们对osn的使用中可以明显看出。社交网络的广泛使用也导致了广泛的假冒。很难找到一个可行的解决方案来帮助抵消这个问题的负面影响。本文讨论了信息泄露背后的原因,特别是osn为黑客使用的情报做出贡献的方式。该文件还为机构提供了一些安全措施,以帮助他们打击与osn有关的信息泄露活动。它还通过建立安全文化和实施行为改变,确定了在该领域深入研究的未来方向。为了能够发现和分析漏洞和攻击者的性质,本文提出了描述逻辑规则生成算法。该算法基于共享阈值识别易受攻击的用户。如果用户超过阈值,则删除用户。本文还对osn在用户中的受欢迎程度进行了安全性分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信