A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content Michael...

18
A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content Michael Robertson, Yin Pan, and Bo Yuan Department of Networking, Security, and Systems Administration B. Thomas Golisano College of Computing and Information Sciences Rochester Institute of Technology Rochester, New York 14623 Speaker: MA2G 林林 1

Transcript of A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content Michael...

A Social Approach to Security: Using SocialNetworks to Help Detect Malicious Web

Content

Michael Robertson, Yin Pan, and Bo YuanDepartment of Networking, Security, and Systems AdministrationB. Thomas Golisano College of Computing and Information SciencesRochester Institute of TechnologyRochester, New York 14623 Speaker: 林韋呈

MA2G0101碩研資工一甲

1

Outline

Introduction The Facebook Application System The Application Testing Experiment Results Conclusions

2

Introduction(1/3)

In recent years, the tremendous growth in both the size and popularity of social networking sites, such as MySpace, Twitter and Facebook.

Unfortunately, the proliferation of computer malware, such as viruses and phishing attacks, has also continued to rise in this same span of time

3

Introduction(2/3)

One of the most famous examples of this new breed of attacks is the Koobface virus, which has plagued users of both Facebook and MySpace.

the Koobface virus spreads through hyperlinks that appear to come from one of your friends, usually advertising a funny video.

4

Introduction(3/3)

In an attempt to combat this problem, static methods, such as blacklists, often have a tremendous success rate when it comes to identifying attacks, hough they are often difficult to maintain due to the short lifespan of malware and phishing sites.

Dynamic detection methods, such as the server’s geographic location, domain name, or offered content.

5

The Facebook Application System(1/5)

Process Modules6

The Facebook Application System(2/5)

Facebook Heuristics

7

The Facebook Application System(3/5)

Traditional Heuristics

8

The Facebook Application System(4/5)

Google Safe BrowsingChecks the URL hash against the Google Safe Browsing databases (both blacklist and malware). If the URL exits in either the blacklist or malware list, the score for the link will be $BAD SCORE*100, which penalizes the link severely; otherwise, just return $GOOD SCORE

9

The Facebook Application System(5/5)

Twitter HeuristicsIf the full link appears on Twitter, the check function returns $GOOD SCORE*2, else if the domain used in the link appears on Twitter, the function returns $GOOD SCORE; otherwise, the function returns $BAD SCORE.

10

The Application Testing

Once the application was built, testing began by volunteers who approved the application for use on their profiles and ran the automatic scan on their News Feeds several times.

During the testing, 377 individuals were reached, only 22 took the time to participate in the study. the application is split into two main functional components: the automated scan and the manual scan.

11

Experiment Results

12

Experiment Results(1/3)

13

Experiment Results(2/3)

14

Experiment Results(3/3)

15

Conclusions

This research has shown that it is in fact possible to detect malicious web content with the help of heuristics based on social networking data.

This research was able to exceed the 34% success rate for detecting legitimate content achieved by Boykin and Roychowdhury in their study.

Bring its effectiveness to a point that is reliable enough for use in real-world environments.

16

Q&A17

感謝聆聽

18