StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Reverse Social Engineering Attacks in Online Social Networks - Essay Example

Cite this document
Summary
The writer of the essay "Reverse Social Engineering Attacks in Online Social Networks" suggests that in order to minimize the effects of RSE, the networking sites should only suggest possible friends when there is a strong connection that exists between them…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Reverse Social Engineering Attacks in Online Social Networks
Read Text Preview

Extract of sample "Reverse Social Engineering Attacks in Online Social Networks"

Reverse Social Engineering Attacks in Online Social Networks Institutional affiliation A social networking structure comprises of nodes that are represented by individuals and is also one of the most widely growing phenomena to date. Social networking sites such as LinkedIn, Facebook and Twitter, which are, being utilized primarily for communication, oriented either upon business related ventures, friendship or to find potential dating partners are growing tremendously in size as they take up new members. Facebook has now reached 500 million users, with LinkedIn having 35 million registered members and XING lagging behind with 6 million users. The alarming amount of personal information of sensitive nature, shared on these sites by users make this web domain a potentially attractive arena for cyber crime. Attackers to bring about a security breach can exploit data such as email addresses, relationship status, educational backgrounds and languages spoken that is available on user’s profile. Attacks on these sites are variants of the conventional ones such as those of spam, malware and phishing, such attacks can be explicitly illustrated when we mention the attacks of the past in which worms infested some one of the biggest social networking sites. In Reverse Social Engineering (RSE) attacks, the perpetrators are not so well known, this is due to the fact that the victim is tricked into contacting the attackers and in building a solid trust relationship and once this launch attack is successful, series of cyber frauds follow, mainly due to leak of sensitive information, involving identity thefts, blackmailing, malicious status updates and others. Real world experiments were then implemented to study the behavior of RSE attacks and the factors influencing them. However, this significant step is a very ethically sensitive domain, questions addressing the justification of carrying out such a study on real users without their knowledge do arise. However, it is inevitable to examine this issue through this method due to the fact that there is no other alternative methodology available. It was made certain the all the sensitive information was cautiously handled and during aggregate analysis, the data was anonymised and no manual inspection was carried out. Since the experiment was conducted in Europe, the legal department of the institution was consulted which is analogous to Institute Review Board (IRB) in the US and they approved of the data handling procedure. In the study, a single account was initiated which performed a large number of email search queries, the profile was then recommended by the site suggestion system to multiple profiles as a potential friend and as a result thousand friend requests were received by the account. This was to show how easy it is to trick users into establishing a trust relationship in the networking sites. In the second set of experiments, five different attack profiles were generated for three social networks. The attackers rely on a form of baiting system in which the victim is lured to contact the attacker itself. Two types of attack exist: Mediated, in which baiting is performed by an intermediate body such as that of Facebook friend suggestion system and secondly, the direct system in which baiting is visible to the targeted user. There are three types of real world RSE attacks. Firstly, the Recommendation-Based Attack in which is of mediated nature and the recommendation system performs the baiting, this attack was launched on Facebook. Secondly, the Demographic Based Attack which is also mediated and relies solely on the incoming contact based on profiles, was carried out on the networking site Badoo.The third type was Visitor Tracking Based RSE performed on Friendster, in this form of attack, the attack profile visits the victims which is visible to the latter, if the profile of the attacker is interesting, the victim may contact the attacker. Five different contact profiles were created to determine which characteristics make profiles effective. The first profile was of a 23 year old male from New York with an attractive male in the profile picture, the second profile was of a 23 year old female from New York with an attractive picture and the third profile picture was again of a 23 year old female from Paris with a pretty profile picture. The fourth profile was of a 35-year-old female from New York with her picture and the fifth profile was of a 23-year-old female from New York with a cartoon as the profile picture. The results for the Recommendation Based RSE on Facebook indicate that among 50,000 profile queried per attack, profile 2 and 3 were most successful and profile 5 the least and 94% messages were sent after the friends request were accepted. Profile 1 attracted users who were interested in men and profile 5 attracted users mostly from amongst the older users. In Demographic-Based RSE in Badoo, profile 1 and 2 were most effective, and profile 5 was actually disabled, 50% of the users sent messages to profile 2 and 3. Most victims were in parallel to the gender and age group of the attack profiles and were single. Profile 1 and 4 received interest from younger and older users respectively. In the Visitor Based RSE, 420,000 users visited per attack profile and a number of them followed it up with friend requests and messages. The inferences derived from these results indicate that attractive female profiles are greatly successful. However, pretexting is essential in order to break the ice between users, which is provided by the Recommendation System in Facebook, and the site Badoo provides it through locations. In order to minimize the affects of RSE, the networking sites should only suggest possible friends when there is a strong connection that exists between them. Secondly, user should be suspicious of any profile that only receives friend requests but never sends any, since it may be an attack profile. CAPTCHA is a tool that builds a bar for the incoming threats and should be regularly used by the members of networking sites. The reasons for the existence of fraud and social engineering attacks and the immediate failure of existing security mechanisms should be addressed through collaboration between criminologists, psychologists, economists and psychologists. The existent framework should be enhanced and improvised to meet the demanding infrastructure and work for a better solution for this dilemma should be initiated. References Irani, D. , Balduzzi, M. , Balzarotti, E.K and Pu, C. Reverse Social Engineering Attacks in Online Social Networks [Research Paper]. Power point slide link “http://www.academia-research.com/filecache/instr/r/e/641870_revsocialeng.pdf”  Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Reverse Social Engineering Attacks in Online Social Networks Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1590101-reverse-social-engineering-attacks-in-online-social-networks
(Reverse Social Engineering Attacks in Online Social Networks Essay)
https://studentshare.org/information-technology/1590101-reverse-social-engineering-attacks-in-online-social-networks.
“Reverse Social Engineering Attacks in Online Social Networks Essay”, n.d. https://studentshare.org/information-technology/1590101-reverse-social-engineering-attacks-in-online-social-networks.
  • Cited: 0 times

CHECK THESE SAMPLES OF Reverse Social Engineering Attacks in Online Social Networks

What is security Why network security is important

In spite of securing the networks and data centers, with the most updated and advanced security modules, there is still a probability of a new threat to intrude into the network.... In the modernized countries, Internet is utilized for education, electronic shopping, blogs, social networking and information.... Websites are created, for informational purposes, advertisement, online shopping etc.... In addition, hackers and cyber criminals are exploring efficient codes day by day to improve the hacking software, in order to breach in to classified information, banks, online websites etc....
9 Pages (2250 words) Coursework

Security issues associated with Social Media

Cybercrime can hack information about a user from his social networking posts or profile and shape his attacks in accordance to his like and interests.... Experts define this as social engineering, an act that makes security risks increasingly hard to recognize.... SECURITY ISSUES ASSOCIATED WITH social MEDIA Name University Course Instructor Date Introduction People utilizing increasingly workable and available publishing techniques create social media, which is an online element....
3 Pages (750 words) Essay

Thinking Like a Hacker to Protect Your Network

The attack methods that are commonly used by the hackers need to be thoroughly understood in order to develop an effective defense strategy against such attacks should they occur (Spivey, 2007).... This literature review "Thinking Like a Hacker to Protect Your Network" presents the advancement of information technology that has brought forth the evolution of the types of threats and methods of attack used to penetrate an organization's private network....
8 Pages (2000 words) Literature review

Social Engineering: Examining the Latest Scams

This paper will also assess main attacking areas along with possible counter techniques to secure the social engineering attacks.... In scenario of computer security, social engineering is a paradigm that illustrates a non-technical type of interruption that depends significantly on human interaction as well as frequently engages scamming other people to break standard security measures.... A social engineer… For instance, a person making use of social engineering to burglarize a business or else personal computer network would attempt to attain the confidence of someone who is allowed to have the legal right to use the network so as to They may be known as the authorized worker by having a number of types of urgent problem; social engineers frequently depend on the usual concern of people and on their faults....
17 Pages (4250 words) Essay

Security of Big Data

When deploying their own certificate, which is a better solution, organizations are extra cautious of these elements to protect themselves against these attacks.... Domain AttacksOne of the worst vulnerabilities for user domains is insider attacks.... Insider attacks occur.... Insider attacks occur when one user domain gains more privilege than the other user and shares that information.... Inside attacks can be vast and potent depending on the type of attack....
8 Pages (2000 words) Case Study

Sample Cyber Security Profile

This paper discusses the many facets of protecting these vulnerabilities against large-scale attacks… One of the most crucial elements to understanding within the realm of security is the User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element According to many publications, NIST is very proactive in this element as one of the main is attacks on User Domain....
4 Pages (1000 words) Essay

Computer Crimes and their Avoidance

Some individuals employ hacking attacks to gain access to computers maintained by corporations or the government, so as to reveal the openness of the security systems and to prove their ability to access highly protected computer networks.... Hacking dates back to the mid-1950s, when hackers made telephone calls free of cost, by exploiting loopholes in the telecommunication networks.... hishing is a computer crime, in which the offender steals the identity of online computer users....
7 Pages (1750 words) Report

The Management of Information Systems with Regards to Securing Such Systems

Cases like zero-day attacks make it virtually impossible to fully eliminate the potential of the developers coming up with foolproof systems.... "The Management of Information Systems with Regards to Securing such Systems" paper looks at the main modalities that hackers use to gain unauthorized access to information systems....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us