Importance of Social Networking Sites Importance of social networking sites
Security of Social Networking Sites
-
Upload
anokha-jha -
Category
Documents
-
view
220 -
download
0
Transcript of Security of Social Networking Sites
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 1/14
SECURITY OF SOCIAL
NETWORKING SITES
Guided By: Presented By:
Prof. S.Tapaswi Anokha Jha
Dr.J.Dhar MTIS 2010-01
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 2/14
MOTIVATION:
DDOS attack in network and transport layer has
been in discussion a lot but not much in
application layer.
This attack is simple but very difficult intracking down the parties involved.
Preventing this attack we can save users
valuable time.
Generally DDOS attacks are performed in thegovernment websites so that anti government
can be in profit.
Security risks.
Reputation and crediblity risks.
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 3/14
INTRODUCTION OF WORK:
Social networking
Antisocial Networks
DDOS attack
Botnets
Puppetnets
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 4/14
LITERATURE REVIEW:
Author Year Remarks
V. T. Lam, S.
Antonatos, P.
Akritidis, and K. G.
Anagnostakis.
August 2006 Puppetnets:
Misusing web
browsers as a
distributed attackinfrastructure
Erwin Louis Carrow 2007 Puppetnets and
Botnets: Information
TechnologyVulnerabi
lity Exploits thatThreaten Basic
Internet Use
V. T. Lam, S.
Antonatos, P.
Akritidis, and K. G.
Anagnostakis.
September 2008 Antisocial Networks:
Turning a Social
Network
into a Botnet
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 5/14
LITERATURE REVIEW:
Author Year Remarks
Michael Robertson,
Yin Pan, and Bo
Yuan
B. Thomas Golisano
15-16 November 2010 A Social Approach to
Security: Using SN to
Help DetectMalicious
Web ContentHongyu Gao, Jun Hu,
Tuo Huang, Jingnan
Wang
and Yan Chen
2011 Security Issues in
Social Networks
Gail-Joon Ahn,
MoAnnaSquicciarinihamed Shehab
2011 Security and Privacy
in Social Networks
Sanjay B Ankali, Dr.
D V Ashoka
Volume: 03, Issue:
01, Pages:984-990
(2011)
Detection
Architecture of
Application Layer
DDoS Attack for
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 6/14
PROBLEM DEFINATION & OBJECTIVE
Study of DDOS attack on Facebook and its
detection by using the concept of botspy.
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 7/14
METHODOLOGY :
ATTACKSSecurity
plans
TheoreticalFramework
Analysis
Literature
Review
Result Analysis
Simulation
Modeling
Conclusion
Inclusion
Of Security
Plans
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 8/14
GANTT CHART:
1 2 3 4 5 6 7 8 9 10 11Literature review
Objective And
Motivation
TheoreticalFramework analysis
Methodology
Security plan
Simulationand
Modelling
Result and Conclusion
Report Writing
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 9/14
FUTURE WORK:
Defence against DDOS attack
Tracking botnets i.e to observe botnets
Gather some data about the existing botnets.
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 10/14
DELIVERABLE & CONCLUSION
Security of Social networking sites from attacks like
DDOS attack.
Security of users from being involved in malicious
activities unknowingly
Availability of network resources and avoid interrupt
network service for a long period of time.
Security for those who suffers from revenue loss due
to these attacks.
Good business reputation and less operationalexpenses.
to detect traffic anomalies and filter out only the
attack traffic while maintaining the uninterrupted
flow of legitimate traffic.
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 11/14
REFERENCES:
A. T. Williams and J. Heiser. Protect your PCs and
Servers From the Bothet Threat. December 2004.
V. T. Lam, S. Antonatos, P. Akritidis, and K. G.
Anagnostakis. Puppetnets: Misusing web browsers as
a distributed attack infrastructure.August 2006
Erwin Louis Carrow, Puppetnets and Botnets:
Information Technology Vulnerability Exploits that
Threaten Basic Internet Use, conference 07
E. Athanasopoulos1, A. Makridakis, S.Antonatos, D. Antoniades. Antisocial Networks: Turning a Social
Network into a Botnet. September 2008
Hacking Social Networks. L.Greinier.April 2009
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 12/14
REFERENCES:
A Social Approach to Security: Using SN to HelpDetectMalicious Web Content. Michael Robertson,
Yin Pan, and Bo Yuan B. Thomas Golisano. 15-16Nov. 2010
Security Issues in Social Networks. Hongyu Gao, JunHu, Tuo Huang, Jingnan Wang and Yan Chen. IEEEconference 2011.
Security and Privacy in Social Networks. Gail-Joon Ahn, MoAnnaSquicciarinihamed Shehab
IEEE conference 2011. Detection Architecture of Application Layer DDoS
Attack for Internet, Sanjay B Ankali, Dr. D V Ashoka,Int. J. Advanced Networking and Applications
Volume: 03, Issue: 01, Pages:984-990 (2011)
8/3/2019 Security of Social Networking Sites
http://slidepdf.com/reader/full/security-of-social-networking-sites 13/14
THANK YOU