Reverse Social Engineering Attacks in Online Social Networks

被引:0
作者
Irani, Danesh [1 ]
Balduzzi, Marco [2 ]
Balzarotti, Davide [2 ]
Kirda, Engin [3 ]
Pu, Calton [1 ]
机构
[1] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
[2] Inst Eurecom, F-06410 Biot, France
[3] North Eastern Fed Univ, Boston, MA USA
来源
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT | 2011年 / 6739卷
基金
美国国家科学基金会;
关键词
social engineering; social networks; privacy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has been reporting growth rates as high as 3% per week. One of the key features of social networks is the support they provide for finding new friends. For example, social network sites may try to automatically identify which users know each other in order to propose friendship recommendations. Clearly, most social network sites are critical with respect to user's security and privacy due to the large amount of information available on them, as well as their very large user base. Previous research has shown that users of online social networks tend to exhibit a higher degree of trust in friend requests and messages sent by other users. Even though the problem of unsolicited messages in social networks (i.e., spam) has already been studied in detail, to date, reverse social engineering attacks in social networks have not received any attention. In a reverse social engineering attack, the attacker does not initiate contact with the victim. Rather, the victim is tricked into contacting the attacker herself. As a result, a high degree of trust is established between the victim and the attacker as the victim is the entity that established the relationship. In this paper, we present the first user study on reverse social engineering attacks in social networks. That is, we discuss and show how attackers, in practice, can abuse some of the friend-finding features that online social networks provide with the aim of launching reverse social engineering attacks. Our results demonstrate that reverse social engineering attacks are feasible and effective in practice.
引用
收藏
页码:55 / +
页数:3
相关论文
共 19 条
[11]  
Jakobsson M., 2006, 15 INT C WORLD WID W
[12]   Why and how to perform fraud experiments [J].
Jakobsson, Markus ;
Finn, Peter ;
Johnson, Nathaniel .
IEEE SECURITY & PRIVACY, 2008, 6 (02) :66-68
[13]  
Lauinger T., 2010, LEET 2010 3 USENIX W
[14]  
Mitnick K.D., 2003, The Art of Deception: controlling the Human Element of Security
[15]   AN ALGORITHM FOR SUFFIX STRIPPING [J].
PORTER, MF .
PROGRAM-AUTOMATED LIBRARY AND INFORMATION SYSTEMS, 1980, 14 (03) :130-137
[16]  
Stringhini G., 2010, ANN COMP SEC APPL C
[17]  
Webb S., 2008, C EM ANT CEAS
[18]   SybilGuard: Defending against sybil attacks via social networks [J].
Yu, Haifeng ;
Kaminsky, Michael ;
Gibbons, Phillip B. ;
Flaxman, Abraham .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) :267-278
[19]   SybilLimit: A near-optimal social network defense against sybil attacks [J].
Yu, Haifeng ;
Kaminsky, Michael ;
Gibbons, Phillip B. ;
Xiao, Feng .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :3-+