Account Compromise and Malicious Activity on Online Social Networks

Published: 2021-09-14 09:35:09
essay essay

Category: Technology, Communication

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY
Online general system, such as Facebook and Tweeter, has become one of main media to stay in make get in touch with the rest of the world. The famous people use them to speak with their fan base, corporations take advantage of them to promote brands and have a straight link to consumers, while news agencies leverage public network to deal out breaking news. Regular users make pervasive use of common network too, to wait in contact with friends or classmates as well as split satisfied so as to they find attractive.
Over time, shared system users build belief relationships with the financial account they track. This hope can expand for a collection of reason. For example, the user force identifies the title-holder of the trust account in being or the relation might be operated by an entity commonly considered as trust worthy, such as a popular news agency.Unfortunately, should the control over an account fall into the hands of a cyber-illegal, he can easily exploit this trust to further his own malicious agenda. Previous researches showed that using compromised accounts to spread malicious content is advantageous to cyber criminals, since shared system users are more likely to react to messages coming from financial records they trust.
This positive probability of achievement very draws the notice of fake criminal. On one occasion an enemy compromises a social network account he can use it for disreputable purposes such as distribution spam mail or link to malware and phishing web sites. Such traditional attacks are best carried out through a large population of compromised accounts belonging to regular social network relation users. Recent incidents, however, demonstrate that enemy can cause havoc and interference even by compromising individual, but high-profile accounts. These accounts (e.g., newspaper or popular brand name accounts) have large social circles (i.e., followers) and status suggests trust worthiness to many common system users. Recent attacks show that compromise these high profile accounts can be leveraged to distribute false news alerts, or messages that tarnish a company’s reputation.
Moreover, the effects of an account compromise can extend well beyond the status of a group. Designed intended designed for case, the distribution of an mistaken Associated Press in sequence explanation about a bomb exploding in the fair residence in 2013 led to a 1% drop in the Standard & Poor’s 500 index, temporarily wiping out US$ 136B .Compromises of high profile accounts usually get cleaned up quickly after they are detected. Unfortunately, since detection is still exclusively a manual endeavor, this is often too late to mitigate the negative impacts of explanation compromises. For example, the above mentioned AP message was shared by over 3,000 users before the compromise was detected and the offending message removed. Similarly, a message sent as a consequence of a compromise of the Skype Twitter account happening during a national holiday remained accessible for over a day. These incidents show that it is critical for a social network to be able to reliably detect and block messages that have not been authored by an account’s legitimate owner.
Material goods of study are future in the last years to detect malicious activity on online social networks. Most of these systems, however, focus on detecting false financial records specially shaped to increase malicious satisfied, as an alternative of look for rightful accounts that have been
compromised . These systems are inadequate to notice compromised accounts, since legitimate, yet compromised accounts have considerably unlike individuality than false ones. additional lessening technique contain an extra universal range, and also detect hateful financial statement by grouping together similar messages or by looking at the presence of suspicious URLs in social network messages These systems can detect post that are sent by compromise public system financial records, in case cybercriminals utilize many economic details to send similar messages, or the letters are second-hand to their mesh page point to malware or phishing.

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read