首页> 外文会议>IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining >Homing Socialbots: Intrusion on a specific organization's employee using Socialbots
【24h】

Homing Socialbots: Intrusion on a specific organization's employee using Socialbots

机译:归还Socialbots:使用Socialbots入侵特定组织的员工

获取原文

摘要

One dimension on the Internet, which has gained great popularity in recent years are the online social networks (OSNs). Users all over the globe write, share, and publish personal information about themselves, their friends, and their workplace. In this study we present a method for infiltrating specific users in targeted organizations by using organizational social networks topologies and Socialbots. The targeted organizations, which have been chosen by us, were technology-oriented organizations. Employees from this kind of organization should be more aware of the dangers of exposing private information. An infiltration is defined as accepting a Socialbot's friend request. Upon accepting a Socialbot's friend request, users unknowingly expose information about themselves and their workplace. To infiltrate this we had to use our Socialbots in a sophisticated manner. First, we had to gather information and recognize Facebook users who work in targeted organizations. Afterwards, we chose ten Facebook users from every targeted organization randomly. These ten users were chosen to be the specific users from targeted organizations of which we would like to infiltrate. The Socialbots sent friend requests to all specific users' mutual friends who worked or work in the same targeted organization. The rationale behind this idea was to gain as many mutual friends as possible and through this act increase the probability that our friend requests will be accepted by the targeted users. We tested the proposed method on targeted users from two different organizations. Our method was able to gain a successful percentage of 50% and 70% respectively. The results demonstrate how easily adversaries can infiltrate users they do not know and get full access to personal and valuable information. These results are more surprising when we emphasize the fact that we chose oriented users who should be more aware to the dangers of information leakage for this study on purpose. Moreover, th- results indicate once again that users who are interested in protecting themselves should not disclose information in OSNs and should be cautious of accepting friendship requests from unknown persons.
机译:近年来,Internet上的一种流行方式是在线社交网络(OSN)。世界各地的用户都编写,共享和发布有关自己,朋友和工作场所的个人信息。在这项研究中,我们介绍了一种通过使用组织社交网络拓扑和Socialbots渗透到目标组织中的特定用户的方法。我们选择的目标组织是面向技术的组织。此类组织的员工应更加意识到公开私人信息的危险。渗透被定义为接受Socialbot的好友请求。接受Socialbot的朋友请求后,用户会在不知不觉中公开有关自己及其工作场所的信息。为了渗透到这一点,我们必须以复杂的方式使用我们的Socialbots。首先,我们必须收集信息并识别在目标组织中工作的Facebook用户。之后,我们从每个目标组织中随机选择了十个Facebook用户。从我们希望渗透的目标组织中选择了这十个用户作为特定用户。 Socialbots向所有在同一目标组织中工作的特定用户的共同朋友发送了好友请求。这个想法的基本原理是获得尽可能多的共同朋友,并且通过此举增加了我们的朋友请求将被目标用户接受的可能性。我们对来自两个不同组织的目标用户测试了该方法。我们的方法分别成功获得了50%和70%的百分比。结果表明,对手如何轻松地渗透到他们不认识的用户,并获得对个人和有价值信息的完全访问权限。当我们强调一个事实时,我们选择有针对性的用户,这些用户应对此目的有更多的了解,而这些人应该更了解信息泄露的危险,因此,这些结果会更加令人惊讶。此外,结果再次表明,有兴趣保护自己的用户不应在OSN中公开信息,并且应谨慎接受未知人员的友谊请求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号