A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges

被引:8
作者
Bhattacharya, Munmun [1 ]
Roy, Sandip [2 ,3 ]
Chattopadhyay, Samiran [1 ,4 ]
Das, Ashok Kumar [3 ,5 ]
Shetty, Sachin [6 ]
机构
[1] Jadavpur Univ, Dept Informat Technol, Kolkata, India
[2] Asansol Engn Coll, Dept Comp Sci & Engn, Asansol, W Bengal, India
[3] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Suffolk, VA USA
[4] TCG CREST, Inst Adv Intelligence, Kolkata, India
[5] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[6] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Dept Computat Modeling & Simulat Engn, Suffolk, VA USA
关键词
machine learning; modern social threats; online social networks; security and privacy; SYBIL DETECTION; SPAM DETECTION; ACCESS-CONTROL; PREDICTION; ATTACKS; FRAMEWORK; SCHEME; IDENTIFICATION; DEFINITION; WIRELESS;
D O I
10.1002/spy2.275
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, online social networks (OSNs) have become an inseparable part of people's daily lives. Instead of being passive readers, people are now enjoying their role as content contributors. OSN has permitted its users to share their information including the multimedia content. OSN users can express themselves in virtual communities by providing their opinions and interacting with others. As a consequence, the privacy and security threats in OSNs have emerged as a major concern to the research and business world. In the recent past, a number of survey works have been conducted to discuss different security and privacy threats in OSNs. However, till date, no survey work has been conducted that aims to classify and analyze various machine learning (ML)-based solutions adapted for the security defense of OSNs. In this survey article, we present a detailed taxonomy with a classification of various works done on various security attacks in OSNs. We then review and summarize the existing state of art survey works on OSN security, and indicate the merits and limitations of these survey works. Next, we review all recent works that aim to provide ML-based solutions toward defense of security attacks on OSNs. Finally, we discuss the future road-map on OSN security and provide a comprehensive analysis on the open research issues with feasible measurements and possible solutions.
引用
收藏
页数:28
相关论文
共 219 条
  • [1] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [2] Ahraminezhad A, 2022, International Journal of Intelligent Systems and Applications, V14, P24
  • [3] Akbani R., 2012, RECENT ADV COMPUTER, P659, DOI [10.1007/978-3-642-25769-8_92, DOI 10.1007/978-3-642-25769-8_92]
  • [4] A prediction system of Sybil attack in social network using deep-regression model
    Al-Qurishi, Muhammad
    Alrubaian, Majed
    Rahman, Sk Md Mizanur
    Alamri, Atif
    Hassan, Mohammad Mehedi
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 743 - 753
  • [5] Efficient Detection of DDoS Attacks Using a Hybrid Deep Learning Model with Improved Feature Selection
    Alghazzawi, Daniyal
    Bamasag, Omaimah
    Ullah, Hayat
    Asghar, Muhammad Zubair
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (24):
  • [6] Deep Learning Method for Prediction of DDoS Attacks on Social Media
    Alguliyev, Rasim M.
    Aliguliyev, Ramiz M.
    Abdullayeva, Fargana J.
    [J]. ADVANCES IN DATA SCIENCE AND ADAPTIVE ANALYSIS, 2019, 11 (1-2)
  • [7] Privacy and Security Issues in Online Social Networks
    Ali, Shaukat
    Islam, Naveed
    Rauf, Azhar
    Din, Ikram Ud
    Guizani, Mohsen
    Rodrigues, Joel J. P. C.
    [J]. FUTURE INTERNET, 2018, 10 (12)
  • [8] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media
    Aliyu, Farouq
    Sheltami, Tarek
    Mahmoud, Ashraf
    Al-Awami, Louai
    Yasar, Ansar
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
  • [9] Alomari E, 2012, Arxiv, DOI arXiv:1208.0403
  • [10] Alyousef AS, 2022, INT J ADV COMPUT SC, V13, P416