Turning captchas against humanity: Captcha-based attacks in online social media

被引:1
|
作者
Conti, Mauro [1 ]
Pajola, Luca [1 ]
Tricomi, Pier Paolo [1 ]
机构
[1] Univ Padua, Padua, Italy
来源
关键词
Online social networks; Automatic content moderator; Adversarial machine learning; Hate speech; Cybersecurity; Instagram; Obfuscation techniques; RECOGNITION;
D O I
10.1016/j.osnem.2023.100252
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, people generate and share massive amounts of content on online platforms (e.g., social networks, blogs). In 2021, the 1.9 billion daily active Facebook users posted around 150 thousand photos every minute. Content moderators constantly monitor these online platforms to prevent the spreading of inappropriate content (e.g., hate speech, nudity images). Based on deep learning (DL) advances, Automatic Content Moderators (ACM) help human moderators handle high data volume. Despite their advantages, attackers can exploit weaknesses of DL components (e.g., preprocessing, model) to affect their performance. Therefore, an attacker can leverage such techniques to spread inappropriate content by evading ACM. In this work, we analyzed 4600 potentially toxic Instagram posts, and we discovered that 44% of them adopt obfuscations that might undermine ACM. As these posts are reminiscent of captchas (i.e., not understandable by automated mechanisms), we coin this threat as Captcha Attack ( CAPA ). Our contributions start by proposing a CAPA taxonomy to better understand how ACM is vulnerable to obfuscation attacks. We then focus on the broad sub-category of CAPA using textual Captcha Challenges, namely CC-CAPA, and we empirically demonstrate that it evades real-world ACM (i.e., Amazon, Google, Microsoft) with 100% accuracy. Our investigation revealed that ACM failures are caused by the OCR text extraction phase. The training of OCRs to withstand such obfuscation is therefore crucial, but huge amounts of data are required. Thus, we investigate methods to identify CC-CAPA samples from large sets of data (originated by three OSN - Pinterest, Twitter, Yahoo-Flickr), and we empirically demonstrate that supervised techniques identify target styles of samples almost perfectly. Unsupervised solutions, on the other hand, represent a solid methodology for inspecting uncommon data to detect new obfuscation techniques.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] An information diffusion model based on retweeting mechanism for online social media
    Xiong, Fei
    Liu, Yun
    Zhang, Zhen-jiang
    Zhu, Jiang
    Zhang, Ying
    PHYSICS LETTERS A, 2012, 376 (30-31) : 2103 - 2108
  • [22] Popularity Prediction of Online News Item Based on Social Media Response
    Arafat, Hossain Md
    Sagar, Didar Hossain
    Ahmed, Kawsar
    Paul, Bikash Kumar
    Rahman, Md Zamilur
    Habib, Md Ahsan
    2019 JOINT 8TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) AND 2019 3RD INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR) WITH INTERNATIONAL CONFERENCE ON ACTIVITY AND BEHAVIOR COMPUTING (ABC), 2019, : 173 - 177
  • [23] An Analysis of Online Educational Videos in Social Media Based on Verbal Content
    Kravvaris, Dimitrios
    Kermanindis, Katia Lida
    2015 6TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA), 2015,
  • [24] Fork-based user migration in Blockchain Online Social Media
    Ba, Cheick
    Michienzi, Andrea
    Guidi, Barbara
    Zignani, Matteo
    Ricci, Laura
    Gaito, Sabrina
    PROCEEDINGS OF THE 14TH ACM WEB SCIENCE CONFERENCE, WEBSCI 2022, 2022, : 174 - 184
  • [25] Exploring Downvoting in Blockchain-based Online Social Media Platforms
    Sun, Rui
    Li, Chao
    Liu, Jingyu
    Sun, Xingchen
    2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS, 2023, : 66 - 71
  • [26] Attacks Using Random Forgery Against DTW-Based Online Signature Verification Algorithm
    Muramatsu, Daigo
    Yagi, Yasushi
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1303 - 1308
  • [27] Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security
    Rekha, M.
    Rani, Shoba P.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2024, 11 (04): : 1 - 7
  • [28] A Certificateless Online/Offline Aggregate Signcryption Scheme against Collusion Attacks Based on Fog Computing
    Zhang, Wanju
    Liu, Shuanggen
    Liu, Yaowei
    Cao, Junjie
    Fu, Bingqi
    Du, Yun
    ELECTRONICS, 2023, 12 (23)
  • [29] Analyzing a User's Contributive Social Capital Based on Acitivities in Online Social Networks and Media
    Schams, Sebastian
    Hauffa, Jan
    Groh, Georg
    COMPANION PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2018 (WWW 2018), 2018, : 1457 - 1464
  • [30] Activist communication design on social media: The case of online solidarity against forced Islamic lifestyle
    Arda, Balca
    Akdemir, Aysegul
    MEDIA CULTURE & SOCIETY, 2021, 43 (06) : 1078 - 1094