Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)
In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) to target them and diverse techniques used by them for this purpose. Spamming is very common issue in present era of Internet especially through Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social networking sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. Following spamming techniques are discussed in this paper like clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1100158Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1857
 Detecting Spammers on Social Networks by Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna, http://www.cse.fau.edu/ ~xqzhu/courses/Resources/GSC.acsac10-socialnets.pdf
 OSWAP, https://www.owasp.org/index.php/
 Huang, Lin-Shung, et al. "Click jacking: Attacks and Defences." USENIX Security Symposium. 2012.
 Jagatic, Tom N., et al. "Social phishing." Communications of the ACM 50.10 (2007): 94-100.
 Al Hasib, Abdullah. "Threats of online social networks." IJCSNS International Journal of Computer Science and Network Security 9.11 (2009): 288-93.
 Lee, Kyumin, James Caverlee, and Steve Webb. "Uncovering social spammers: social honeypots+ machine learning." Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval. ACM, 2010.
 Lu, Long, et al. "Blade: an attack-agnostic approach for preventing drive-by malware infections." Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010.
 L.-S. Huang, A. Moshchuk, H. J. Wang, S. Schechter, and C. Jackson, “Clickjacking: Attacks and defences,” in USENIX Security Symposium. USENIX Association, 2012.
 Linda Criddle, http://www.webroot.com/in/en/home/resources/tips/ online-shopping-banking/secure-what-is-social-engineering
 Phish tank, https://www.phishtank.com/what_is_phishing.php
 Blog,http://www.symantec.com/connect/blogs/web-applicationpenetration- te
 Weboedia, http://www.webopedia.com/TERM/S/social_engineering.html
 XSS examples by Lakhmanan Ganapathy, http://www.thegeekstuff.com/ 2012/02/xss-attack-examples/
 M. Vilas, “Having fun with url shorteners,” Blog, Jan2010, http://breakingcode.wordpress.com/2010/01/11/having-fun-with-urlshorteners/.
 URL shortening site, https://bitly.com/
 Security news, http://www.pctools.com/security-news/drive-bydownloads/
 E. Foundation, “Elgg- an award-winning social networking engine,” Website, http://www.elgg.org/.
 G. Maone, “Hello clearclick, goodbye clickjacking!” Blog, October 2008.
 G. Rydstedt, E. Bursztein, D. Boneh, and C. Jackson, “Busting frame busting: a study of click jacking vulnerabilities at popular sites,” in in IEEE Oakland Web 2.0 Security and Privacy (W2SP 2010), 2010.
 M. IE Team, “Combating click jacking with x-frame-options,” Blog, March 2010.
 http://www.dhs.gov/sites/default/files/publications/privacy/PIAs/dhspriv acy_pia_usss_cyveillance_12272012.pdf
 K. Rieck, T. Krueger, and A. Dewald, “Cujo: Efficient detection and prevention of drive-by-download attacks,” in Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC ’10. New York, NY, USA: ACM, 2010, pp. 31–39.
 Mineola Community Bank, https://www.mineolacb.com/avoidingattacks. htm