DOI QR코드

DOI QR Code

Social Media Security and Attacks

  • Received : 2021.01.05
  • Published : 2021.01.30

Abstract

The advent of social media has revolutionized the speed of communication between millions of people around the world in various cultures and disciplines. Social media is the best platform for exchanging opinions and ideas, interacting with other users of similar interests and sharing different types of media and files. With the phenomenal increase in the use of social media platforms, the need to pay attention to protection and security from attacks and misuse has also increased. The present study conducts a comprehensive survey of the latest and most important research studies published from 2018-20 on security and privacy on social media and types of threats and attacks that affect the users. We have also reviewed the recent challenges that affect security features in social media. Furthermore, this research pursuit also presents effective and feasible solutions that address these threats and attacks and cites recommendations to increase security and privacy for the users of social media.

Keywords

References

  1. Shevchuk, R., Pastukh, Y. (2019, June). Improve the Security of Social Media Accounts. In 2019 9th International Conference on Advanced Computer Information Technologies (ACIT) (pp. 439-442). IEEE.
  2. Such, J. M., Criado, N. (2018). Multiparty privacy in social media. Communications of the ACM, 61(8), 74-81. https://doi.org/10.1145/3208039
  3. Du, S., Li, X., Zhong, J., Zhou, L., Xue, M., Zhu, H., Sun, L. (2018). Modeling privacy leakage risks in large-scale social networks. IEEE Access, 6, 17653-17665. https://doi.org/10.1109/ACCESS.2018.2818116
  4. Sahoo, S. R., Gupta, B. B. (2019). Classification of various attacks and their defence mechanism in online social networks: a survey. Enterprise Information Systems, 13(6), 832-864. https://doi.org/10.1080/17517575.2019.1605542
  5. Zhang, Z., Gupta, B. B. (2018). Social media security and trustworthiness: overview and new direction. Future Generation Computer Systems, 86, 914-925. https://doi.org/10.1016/j.future.2016.10.007
  6. Clement, J. Number of social media users worldwide 2010-2021 - Statista. [online] Statista. Available at: https://www.statista.com/statistics/278414/number-of-worldwidesocial-network-users/ (accessed date 2020).
  7. Beigi, G., Liu, H. (2018). Privacy in social media: Identification, mitigation and applications. arXiv preprint arXiv:1808.02191.
  8. Beigi, G., Shu, K., Zhang, Y., Liu, H. (2018). Securing social media user data: An adversarial approach. In Proceedings of the 29th on Hypertext and Social Media (pp. 165-173).
  9. Sharma, V. D., Yadav, S. K., Yadav, S. K., Singh, K. N. (2019, December). Social Media Ecosystem: Review on Social Media Profile's Security and Introduce a New Approach. In International Conference on Advances in Computational Intelligence and Informatics (pp. 229-235). Springer, Singapore.
  10. Zuo, X., Li, L., Peng, H., Luo, S., Yang, Y. (2020). Privacy- Preserving Subgraph Matching Scheme with Authentication in So- cial Networks. IEEE Transactions on Cloud Computing, 1-1. https://doi.org/10.1109/tcc.2020.3012999
  11. Srivastava, S. R., Dube, S., Shrivastaya, G., Sharma, K. (2019). Smartphone triggered security challenges-Issues, case studies and prevention. Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies, 187-206.
  12. Clement, J. Number of social mediausers world wide 2010-2021Statista. Retrieved: from-Statista websitehttps://www.statista.com/statistics/278414/nuber-of-worldwide-social/network-users/ (accessed date 2020, July 15).
  13. Sharma, S., Jain, A. (2020). Role of sentiment analysis in social media security and analytics. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1366.
  14. Eian, I. C., Lim, K. Y., Yeap, M. X. L., Yeo, H. Q., Fatima, Z. (2020). Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges.
  15. Chandini, M. S. (2020). An Overview about a Milestone in Information Security: STEGANOGRAPHY. International Journal of Progressive Research in Science and Engineering, 1(2), 33-35.
  16. Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., Rodrigues, J. J. (2018). Privacy and security issues in online social networks. Future Internet, 10(12), 114. https://doi.org/10.3390/fi10120114
  17. Almarabeh, H., Sulieman, A. (2019). The impact of cyber threats on social networking sites. International Journal of Advanced Research in Computer Science, 10(2), 1. https://doi.org/10.26483/ijarcs.v10i2.6384
  18. Thakur, K., Hayajneh, T., Tseng, J. (2019). Cyber security in social media: challenges and the way forward. IT Professional, 21(2), 41-49. https://doi.org/10.1109/mitp.2018.2881373
  19. Shevchuk, R., Pastukh, Y. (2019, June). Improve the Security of Social Media Accounts. In 2019 9th International Conference on Advanced Computer Information Technologies (ACIT) (pp. 439-442). IEEE.
  20. Zhang, Z., Wen, J., Wang, X., Zhao, C. (2018). A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory. Journal of computational science, 26, 468-477. https://doi.org/10.1016/j.jocs.2017.05.018
  21. Sai, A. M. V. V., Li, Y. (2020). A Survey on Privacy Issues in Mobile Social Networks. IEEE Access, 8, 130906-130921. https://doi.org/10.1109/ACCESS.2020.3009691
  22. Edwards, N., Kiser, S. B., Haynes, J. B. (2020). Answering the Cybersecurity Issues: Confidentiality, Integrity, and Availability. Journal of Strategic Innovation Sustainability, 15(4), 10-14.
  23. Yassein, M. B., Aljawarneh, S., Wahsheh, Y. A. (2019, April). Survey of Online Social Networks Threats and Solutions. In 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) (pp. 375-380). IEEE.
  24. P. Velayudhan, S., Somasundaram, M. S. B. (2019). Compromised account detection in online social networks: A survey. Concurrency and Computation: Practice and Experience, 31(20). https://doi.org/10.1002/cpe.5346.
  25. Alguliyev, R., Aliguliyev, R., Yusifov, F. (2018). Role of Social Networks in E-government: Risks and Security Threats. Online Journal of Communication and Media Technologies, 8(4), 363-376.
  26. P, S., Chatterjee, M. (2019). Detection of Fake and Cloned Profiles in Online Social Networks. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3349673
  27. Kantartopoulos, P., Pitropakis, N., Mylonas, A., Kylilis, N. (2020). Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection. Technologies, 8(4), 64. https://doi.org/10.3390/technologies8040064
  28. Alom, Z., Carminati, B. and Ferrari, E. (2020). A deep learning model for Twitter spam detection. Online Social Networks and Media, 18, p.100079. https://doi.org/10.1016/j.osnem.2020.100079
  29. Ali, M. M., Qaseem, M. S., Rahman, M. A. U. (2020). A Survey on Deceptive Phishing Attacks in Social Networking Environments. In Proceedings of the Third International Conference on Computational Intelligence and Informatics (pp. 443-452). Springer, Singapore.
  30. Bidgolya, A. J., Rahmaniana, Z. (2020). A Robust Opinion Spam Detection Method Against Malicious Attackers in Social Media. arXiv preprint arXiv:2008.08650.
  31. Hu, D., Chen, F., Wu, X., Zhao, Z. (2016, June). A framework of privacy decision recommendation for image sharing in online social networks. In 2016 IEEE First International Conference on Data Science in Cyberspace (DSC) (pp. 243-251). IEEE.
  32. Yao, M., Chelmis, C., Zois, D. S. (2019, May). Cyberbullying ends here: Towards robust detection of cyberbullying in social media. In The World Wide Web Conference (pp. 3427-3433).
  33. Zare, M., Khasteh, S. H., Ghafouri, S. (2020). Automatic ICA detection in online social networks with PageRank. Peer-to-Peer Networking and Applications, 1-15.
  34. Ali, A., Syed, A. M. (2020). Cyberbullying Detection using Machine Learning. Pakistan Journal of Engineering and Technology, 3(2), 45-50.
  35. P, S. (2018). A comparative study of threats and solutions in online so- cial networks. International Journal of Advanced Research in Computer Science, 9(1), 760-764.
  36. Sahoo, S. R., Gupta, B. B. (2018). Security Issues and Challenges in Online Social Networks (Osns) Based on User Perspective. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, 591-606.
  37. Gong, Q., Chen, Y., He, X., Zhuang, Z., Wang, T., Huang, H., ... Fu, X. (2018). DeepScan: Exploiting deep learning for malicious account detection in location-based social networks. IEEE Communications Magazine, 56(11), 21-27. https://doi.org/10.1109/mcom.2018.1700575
  38. Protect Your Social Media Accounts - Investor.gov. Retrieved from Investor.gov website: https://www.investor.gov/protect-your-investments/fraud/how-avoid-fraud/protect-your-social-mediaaccounts (accessed date 2020).
  39. How to Protect Your Privacy on Social Media?. Retrieved from Data Privacy Manager website: https://dataprivacymanager.net/how-to-protectyour-privacy-on-social-media/(accessed date 2020, July 14).
  40. Kumar, S., Somani, V. (2018). Social Media Security Risks, Cyber Threats And Risks Prevention And Mitigation Techniques. International Journal of Advance Research in Computer Science and Management, 4(4), 125-129.
  41. Singh, A., Singh, A. (2017). Review of Cyber Threats in Social Networking Websites. International Journal of Advanced Research in Computer Science, 8(5).p2695-2699.