Turning captchas against humanity: Captcha-based attacks in online social media

被引:1
|
作者
Conti, Mauro [1 ]
Pajola, Luca [1 ]
Tricomi, Pier Paolo [1 ]
机构
[1] Univ Padua, Padua, Italy
来源
关键词
Online social networks; Automatic content moderator; Adversarial machine learning; Hate speech; Cybersecurity; Instagram; Obfuscation techniques; RECOGNITION;
D O I
10.1016/j.osnem.2023.100252
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, people generate and share massive amounts of content on online platforms (e.g., social networks, blogs). In 2021, the 1.9 billion daily active Facebook users posted around 150 thousand photos every minute. Content moderators constantly monitor these online platforms to prevent the spreading of inappropriate content (e.g., hate speech, nudity images). Based on deep learning (DL) advances, Automatic Content Moderators (ACM) help human moderators handle high data volume. Despite their advantages, attackers can exploit weaknesses of DL components (e.g., preprocessing, model) to affect their performance. Therefore, an attacker can leverage such techniques to spread inappropriate content by evading ACM. In this work, we analyzed 4600 potentially toxic Instagram posts, and we discovered that 44% of them adopt obfuscations that might undermine ACM. As these posts are reminiscent of captchas (i.e., not understandable by automated mechanisms), we coin this threat as Captcha Attack ( CAPA ). Our contributions start by proposing a CAPA taxonomy to better understand how ACM is vulnerable to obfuscation attacks. We then focus on the broad sub-category of CAPA using textual Captcha Challenges, namely CC-CAPA, and we empirically demonstrate that it evades real-world ACM (i.e., Amazon, Google, Microsoft) with 100% accuracy. Our investigation revealed that ACM failures are caused by the OCR text extraction phase. The training of OCRs to withstand such obfuscation is therefore crucial, but huge amounts of data are required. Thus, we investigate methods to identify CC-CAPA samples from large sets of data (originated by three OSN - Pinterest, Twitter, Yahoo-Flickr), and we empirically demonstrate that supervised techniques identify target styles of samples almost perfectly. Unsupervised solutions, on the other hand, represent a solid methodology for inspecting uncommon data to detect new obfuscation techniques.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering
    张响亮
    Tak Man Desmond Lee
    Georgios Pitsilis
    Journal of Computer Science & Technology, 2013, 28 (04) : 616 - 624
  • [32] Defending against social engineering attacks: A security pattern-based analysis framework
    Li, Tong
    Song, Chuanyong
    Pang, Qinyu
    IET INFORMATION SECURITY, 2023, 17 (04) : 703 - 726
  • [33] Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering
    Zhang, Xiang-Liang
    Lee, Tak Man Desmond
    Pitsilis, Georgios
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (04) : 616 - 624
  • [34] On the security of mesh-based media hash-dependent watermarking against protocol attacks
    Lu, CS
    Yu, CM
    2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 169 - 172
  • [35] Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering
    Xiang-Liang Zhang
    Tak Man Desmond Lee
    Georgios Pitsilis
    Journal of Computer Science and Technology, 2013, 28 : 616 - 624
  • [36] Design of sweepstakes-based social media marketing for online customer engagement
    Woo-Jin Jung
    Seungjun Yang
    Hee-Woong Kim
    Electronic Commerce Research, 2020, 20 : 119 - 146
  • [37] Design of sweepstakes-based social media marketing for online customer engagement
    Jung, Woo-Jin
    Yang, Seungjun
    Kim, Hee-Woong
    ELECTRONIC COMMERCE RESEARCH, 2020, 20 (01) : 119 - 146
  • [38] A Word Cloud Model based on Hate Speech in an Online Social Media Environment
    Ibrahim, Valentina
    Abu Bakar, Juhaida
    Harun, Nor Hazlyna
    Abdulateef, Alaa Fareed
    BAGHDAD SCIENCE JOURNAL, 2021, 18 (02) : 937 - 946
  • [39] Predicting User Likes in Online Media Based on Conceptualized Social Network Profiles
    Liu, Qiang
    Wang, Yuanzhuo
    Li, Jingyuan
    Jia, Yantao
    Ren, Yan
    WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 : 82 - 92
  • [40] Study on the Course Construction of Social Media Marketing Communication Based on Online Education
    Mu Lin
    Wang Renzhi
    PROCEEDINGS OF THE 2018 EURO-ASIA CONFERENCE ON ENVIRONMENT AND CSR: TOURISM, SOCIETY AND EDUCATION SESSION. PT I, 2018, : 86 - 90