Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users

被引:7
作者
Feng, Bo [1 ]
Li, Qiang [1 ,2 ]
Ji, Yuede [3 ]
Guo, Dong [1 ,2 ]
Meng, Xiangyu [1 ,2 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Jilin, Peoples R China
[2] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun, Jilin, Peoples R China
[3] DC George Washington Univ, Dept Elect & Comp Engn, Washington, DC USA
基金
中国国家自然科学基金;
关键词
Cybersecurity - Social behavior - Malware - Zero-day attack - Risk assessment - Semantics - Intrusion detection;
D O I
10.1155/2019/3053418
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online social networks have become an essential part of our daily life. While we are enjoying the benefits from the social networks, we are inevitably exposed to the security threats, especially the serious Advanced Persistent Threat (APT) attack. The attackers can launch targeted cyberattacks on a user by analyzing its personal information and social behaviors. Due to the wide variety of social engineering techniques and undetectable zero-day exploits being used by attackers, the detection techniques of intrusion are increasingly difficult. Motivated by the fact that the attackers usually penetrate the social network to either propagate malwares or collect sensitive information, we propose a method to assess the security risk of the user being attacked so that we can take defensive measures such as security education, training, and awareness before users are attacked. In this paper, we propose a novel user analysis model to find potential victims by analyzing a large number of users' personal information and social behaviors in social networks. For each user, we extract three kinds of features, i.e., statistical features, social-graph features, and semantic features. These features will become the input of our user analysis model, and the security risk score will be calculated. The users with high security risk score will be alarmed so that the risk of being attacked can be reduced. We have implemented an effective user analysis model and evaluated it on a real-world dataset collected from a social network, namely, Sina Weibo (Weibo). The results show that our model can effectively assess the risk of users' activities in social networks with a high area under the ROC curve of 0.9607.
引用
收藏
页数:14
相关论文
共 26 条
[1]  
Alghamdi B, 2016, 2016 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE WORKSHOPS (WIW 2016), P5, DOI [10.1109/WIW.2016.41, 10.1109/WIW.2016.014]
[2]  
[Anonymous], 2018, CLASSIFICATION WEIBO
[3]   Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks [J].
Cai, Zhipeng ;
He, Zaobo ;
Guan, Xin ;
Li, Yingshu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :577-590
[4]   Detection of Forwarding-Based Malicious URLs in Online Social Networks [J].
Cao, Jian ;
Li, Qiang ;
Ji, Yuede ;
He, Yukun ;
Guo, Dong .
INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2016, 44 (01) :163-180
[5]  
Cao JP, 2017, ADV INTELL SYST, V455, P123, DOI [10.1007/978-3-319-38771-0_12, 10.1016/j.ins.2017.02.030]
[6]  
Coronges K., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P2366, DOI 10.1109/HICSS.2012.657
[7]  
Egele M., 2013, P NETW DISTR SYST SE
[8]   Combating the evolving spammers in online social networks [J].
Fu, Qiang ;
Feng, Bo ;
Guo, Dong ;
Li, Qiang .
COMPUTERS & SECURITY, 2018, 72 :60-73
[9]  
Ghareeb Saad M. A. H., 2015, DESERT FALCONS TARGE
[10]   SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection [J].
Gong, Neil Zhenqiang ;
Frank, Mario ;
Mittal, Prateek .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (06) :976-987