首页> 外文会议>International Conference on Advances in Social Networks Analysis and Mining >Homing Socialbots: Intrusion on a specific organization's employee using Socialbots
【24h】

Homing Socialbots: Intrusion on a specific organization's employee using Socialbots

机译:归巢社会行为:使用SocialBots的特定组织员工的入侵

获取原文

摘要

One dimension on the Internet, which has gained great popularity in recent years are the online social networks (OSNs). Users all over the globe write, share, and publish personal information about themselves, their friends, and their workplace. In this study we present a method for infiltrating specific users in targeted organizations by using organizational social networks topologies and Socialbots. The targeted organizations, which have been chosen by us, were technology oriented organizations. Employees from this kind of organization should be more aware of the dangers of exposing private information. An infiltration is defined as accepting a Socialbot's friend request. Upon accepting a Socialbot's friend request, users unknowingly expose information about themselves and their workplace. To infiltrate this we had to use our Socialbots in a sophisticated manner. First, we had to gather information and recognize Facebook users who work in targeted organizations. Afterwards, we chose ten Facebook users from every targeted organization randomly. These ten users were chosen to be the specific users from targeted organizations of which we would like to infiltrate. The Socialbots sent friend requests to all specific users' mutual friends who worked or work in the same targeted organization. The rationale behind this idea was to gain as many mutual friends as possible and through this act increase the probability that our friend requests will be accepted by the targeted users. We tested the proposed method on targeted users from two different organizations. Our method was able to gain a successful percentage of 50% and 70% respectively. The results demonstrate how easily adversaries can infiltrate users they do not know and get full access to personal and valuable information. These results are more surprising when we emphasize the fact that we chose oriented users who should be more aware to the dangers of information leakage for this study on purpose. Moreover, the results indicate once again that users who are interested in protecting themselves should not disclose information in OSNs and should be cautious of accepting friendship requests from unknown persons.
机译:互联网上的一个维度,近年来在线受欢迎程度是在线社交网络(OSN)。全球各地的用户写作,分享和发布您自己,朋友和工作场所的个人信息。在这项研究中,我们通过使用组织社交网络拓扑和社会行动,提出了一种用于渗透有针对性组织中的特定用户的方法。由我们选择的目标组织是技术导向的组织。来自这种组织的员工应该更加了解揭露私人信息的危险。渗透被定义为接受SocialBot的朋友请求。在接受SocialBot的朋友请求后,用户在不知不觉中揭示了有关自己及其工作场所的信息。渗透到这一点,我们必须以精致的方式使用我们的社会窃贼。首先,我们必须收集信息并识别在有针对性组织中工作的Facebook用户。之后,我们将随机选择来自每个目标组织的十个Facebook用户。这十个用户被选为来自目标组织的特定用户,我们希望渗透。 SocialBots向所有特定用户的相互朋友发送了朋友请求,他们在同一目标组织中工作或工作。这个想法背后的理由是获得尽可能多的共同朋友,通过这个行为增加了我们的朋友请求将由目标用户接受的概率。我们在来自两个不同组织的目标用户上测试了所提出的方法。我们的方法能够分别获得50%和70%的成功百分比。结果表明了对手有多容易渗透他们不知道的用户,并完全访问个人和有价值的信息。当我们强调我们选择要更加了解这项研究的信息泄漏危险的事实时,这些结果更令人惊讶。此外,结果再次表明,有兴趣保护自己的用户不应透露OSNS中的信息,并应谨慎接受未知人的友谊请求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号