Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.1.22

Social Media Security and Attacks  

Almalki, Sarah (College of Computers and Information Technology)
Alghamdi, Reham (College of Computers and Information Technology)
Sami, Gofran (Umm Al-Qura University)
Alhakami, Wajdi (College of Computers and Information Technology)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.1, 2021 , pp. 174-183 More about this Journal
Abstract
The advent of social media has revolutionized the speed of communication between millions of people around the world in various cultures and disciplines. Social media is the best platform for exchanging opinions and ideas, interacting with other users of similar interests and sharing different types of media and files. With the phenomenal increase in the use of social media platforms, the need to pay attention to protection and security from attacks and misuse has also increased. The present study conducts a comprehensive survey of the latest and most important research studies published from 2018-20 on security and privacy on social media and types of threats and attacks that affect the users. We have also reviewed the recent challenges that affect security features in social media. Furthermore, this research pursuit also presents effective and feasible solutions that address these threats and attacks and cites recommendations to increase security and privacy for the users of social media.
Keywords
Social media security; Social media attacks; Privacy; Social media threats;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Kantartopoulos, P., Pitropakis, N., Mylonas, A., Kylilis, N. (2020). Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection. Technologies, 8(4), 64.   DOI
2 Singh, A., Singh, A. (2017). Review of Cyber Threats in Social Networking Websites. International Journal of Advanced Research in Computer Science, 8(5).p2695-2699.
3 Hu, D., Chen, F., Wu, X., Zhao, Z. (2016, June). A framework of privacy decision recommendation for image sharing in online social networks. In 2016 IEEE First International Conference on Data Science in Cyberspace (DSC) (pp. 243-251). IEEE.
4 Chandini, M. S. (2020). An Overview about a Milestone in Information Security: STEGANOGRAPHY. International Journal of Progressive Research in Science and Engineering, 1(2), 33-35.
5 Zuo, X., Li, L., Peng, H., Luo, S., Yang, Y. (2020). Privacy- Preserving Subgraph Matching Scheme with Authentication in So- cial Networks. IEEE Transactions on Cloud Computing, 1-1. https://doi.org/10.1109/tcc.2020.3012999   DOI
6 Sharma, S., Jain, A. (2020). Role of sentiment analysis in social media security and analytics. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1366.
7 Eian, I. C., Lim, K. Y., Yeap, M. X. L., Yeo, H. Q., Fatima, Z. (2020). Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges.
8 Almarabeh, H., Sulieman, A. (2019). The impact of cyber threats on social networking sites. International Journal of Advanced Research in Computer Science, 10(2), 1.   DOI
9 Thakur, K., Hayajneh, T., Tseng, J. (2019). Cyber security in social media: challenges and the way forward. IT Professional, 21(2), 41-49.   DOI
10 Edwards, N., Kiser, S. B., Haynes, J. B. (2020). Answering the Cybersecurity Issues: Confidentiality, Integrity, and Availability. Journal of Strategic Innovation Sustainability, 15(4), 10-14.
11 Yassein, M. B., Aljawarneh, S., Wahsheh, Y. A. (2019, April). Survey of Online Social Networks Threats and Solutions. In 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) (pp. 375-380). IEEE.
12 Sharma, V. D., Yadav, S. K., Yadav, S. K., Singh, K. N. (2019, December). Social Media Ecosystem: Review on Social Media Profile's Security and Introduce a New Approach. In International Conference on Advances in Computational Intelligence and Informatics (pp. 229-235). Springer, Singapore.
13 Srivastava, S. R., Dube, S., Shrivastaya, G., Sharma, K. (2019). Smartphone triggered security challenges-Issues, case studies and prevention. Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies, 187-206.
14 Alguliyev, R., Aliguliyev, R., Yusifov, F. (2018). Role of Social Networks in E-government: Risks and Security Threats. Online Journal of Communication and Media Technologies, 8(4), 363-376.
15 Alom, Z., Carminati, B. and Ferrari, E. (2020). A deep learning model for Twitter spam detection. Online Social Networks and Media, 18, p.100079.   DOI
16 Ali, A., Syed, A. M. (2020). Cyberbullying Detection using Machine Learning. Pakistan Journal of Engineering and Technology, 3(2), 45-50.
17 Shevchuk, R., Pastukh, Y. (2019, June). Improve the Security of Social Media Accounts. In 2019 9th International Conference on Advanced Computer Information Technologies (ACIT) (pp. 439-442). IEEE.
18 Such, J. M., Criado, N. (2018). Multiparty privacy in social media. Communications of the ACM, 61(8), 74-81.   DOI
19 Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., Rodrigues, J. J. (2018). Privacy and security issues in online social networks. Future Internet, 10(12), 114.   DOI
20 Sai, A. M. V. V., Li, Y. (2020). A Survey on Privacy Issues in Mobile Social Networks. IEEE Access, 8, 130906-130921.   DOI
21 P. Velayudhan, S., Somasundaram, M. S. B. (2019). Compromised account detection in online social networks: A survey. Concurrency and Computation: Practice and Experience, 31(20). https://doi.org/10.1002/cpe.5346.   DOI
22 P, S., Chatterjee, M. (2019). Detection of Fake and Cloned Profiles in Online Social Networks. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3349673   DOI
23 Ali, M. M., Qaseem, M. S., Rahman, M. A. U. (2020). A Survey on Deceptive Phishing Attacks in Social Networking Environments. In Proceedings of the Third International Conference on Computational Intelligence and Informatics (pp. 443-452). Springer, Singapore.
24 Clement, J. Number of social mediausers world wide 2010-2021Statista. Retrieved: from-Statista websitehttps://www.statista.com/statistics/278414/nuber-of-worldwide-social/network-users/ (accessed date 2020, July 15).
25 Beigi, G., Shu, K., Zhang, Y., Liu, H. (2018). Securing social media user data: An adversarial approach. In Proceedings of the 29th on Hypertext and Social Media (pp. 165-173).
26 Sahoo, S. R., Gupta, B. B. (2019). Classification of various attacks and their defence mechanism in online social networks: a survey. Enterprise Information Systems, 13(6), 832-864.   DOI
27 Zhang, Z., Gupta, B. B. (2018). Social media security and trustworthiness: overview and new direction. Future Generation Computer Systems, 86, 914-925.   DOI
28 Beigi, G., Liu, H. (2018). Privacy in social media: Identification, mitigation and applications. arXiv preprint arXiv:1808.02191.
29 Bidgolya, A. J., Rahmaniana, Z. (2020). A Robust Opinion Spam Detection Method Against Malicious Attackers in Social Media. arXiv preprint arXiv:2008.08650.
30 Yao, M., Chelmis, C., Zois, D. S. (2019, May). Cyberbullying ends here: Towards robust detection of cyberbullying in social media. In The World Wide Web Conference (pp. 3427-3433).
31 Zare, M., Khasteh, S. H., Ghafouri, S. (2020). Automatic ICA detection in online social networks with PageRank. Peer-to-Peer Networking and Applications, 1-15.
32 Kumar, S., Somani, V. (2018). Social Media Security Risks, Cyber Threats And Risks Prevention And Mitigation Techniques. International Journal of Advance Research in Computer Science and Management, 4(4), 125-129.
33 P, S. (2018). A comparative study of threats and solutions in online so- cial networks. International Journal of Advanced Research in Computer Science, 9(1), 760-764.
34 Shevchuk, R., Pastukh, Y. (2019, June). Improve the Security of Social Media Accounts. In 2019 9th International Conference on Advanced Computer Information Technologies (ACIT) (pp. 439-442). IEEE.
35 Du, S., Li, X., Zhong, J., Zhou, L., Xue, M., Zhu, H., Sun, L. (2018). Modeling privacy leakage risks in large-scale social networks. IEEE Access, 6, 17653-17665.   DOI
36 Sahoo, S. R., Gupta, B. B. (2018). Security Issues and Challenges in Online Social Networks (Osns) Based on User Perspective. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, 591-606.
37 Protect Your Social Media Accounts - Investor.gov. Retrieved from Investor.gov website: https://www.investor.gov/protect-your-investments/fraud/how-avoid-fraud/protect-your-social-mediaaccounts (accessed date 2020).
38 How to Protect Your Privacy on Social Media?. Retrieved from Data Privacy Manager website: https://dataprivacymanager.net/how-to-protectyour-privacy-on-social-media/(accessed date 2020, July 14).
39 Zhang, Z., Wen, J., Wang, X., Zhao, C. (2018). A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory. Journal of computational science, 26, 468-477.   DOI
40 Gong, Q., Chen, Y., He, X., Zhuang, Z., Wang, T., Huang, H., ... Fu, X. (2018). DeepScan: Exploiting deep learning for malicious account detection in location-based social networks. IEEE Communications Magazine, 56(11), 21-27.   DOI
41 Clement, J. Number of social media users worldwide 2010-2021 - Statista. [online] Statista. Available at: https://www.statista.com/statistics/278414/number-of-worldwidesocial-network-users/ (accessed date 2020).