Preventing Security Incidents on Social Networks: An Analysis of Harmful Content Dissemination Through Applications

被引:0
|
作者
Cemeljic, Hrvoje [1 ]
Babac, Marina Bagic [1 ]
机构
[1] Univ Zagreb, Fac Elect Engn & Comp, Unska 3, Zagreb 10000, Croatia
来源
关键词
Facebook; cybersecurity; cyberattacks; malware applications; data analysis;
D O I
10.59245/ps.32.3.1
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
This study describes the dissemination of harmful content through malware applications deployed on the Facebook social network. A description of the cybersecurity incident is given, with a focus on the motive and purpose of the cyberattacks, as well as the description of the attacker and the victims. The attacker's tools are described in detail, as well as the techniques used by the attacker to reach many potential victims, infect them with malware, monetise the victims and hide the traces of the attack. Data analysis on the dataset containing information on more than two million victims is performed. The focus of the analysis is to model the dissemination of the malware and to determine the ratio of victims based on gender and country of origin. The study shows a significant statistical difference in the victims of the attacks based on their gender.
引用
收藏
页码:239 / 270
页数:32
相关论文
共 50 条
  • [21] Modeling and Analysis of Information Dissemination in Online Social Networks
    Zhang, Hai-Feng
    Xiong, Fei
    Liu, Yun
    Chao, Han-Chieh
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (01): : 1 - 10
  • [22] Youth and adolescents from the prism of disinformation Analysis of fake news spread through social networks and messaging applications through social networks and messaging applications
    Lopez-Martin, Alvaro
    Cordoba-Cabus, Alba
    QUESTION, 2022, 3 (71):
  • [23] Performance Analysis of Content Dissemination Protocols for Delay Tolerant Networks
    Koulali, Sara
    Azizi, Mostafa
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 249 - 254
  • [24] Configuring networks with content filtering nodes with applications to network security
    Kodialam, M
    Lakshman, TV
    Sengupta, S
    IEEE Infocom 2005: The Conference on Computer Communications, Vols 1-4, Proceedings, 2005, : 2395 - 2404
  • [25] Opportunistic content dissemination in mobile social networks via adjustment of user selfishness
    Moradi, Ashkan
    Shah-Mansouri, Vahid
    IET NETWORKS, 2019, 8 (02) : 126 - 137
  • [26] SCIENTISTS IN SOCIAL NETWORKS. DISSEMINATION AND CONTENT CURATION ON TWITTER: TAXONOMY AND CASES
    Gil, Lydia
    Guallar, Javier
    INDEX COMUNICACION, 2023, 13 (01): : 55 - 77
  • [27] Targeted content dissemination in mobile social networks taking account of resource limitation
    Ravaei, Bahman
    Sabaei, Masoud
    Pedram, Hossein
    Valaee, Shahrokh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (18):
  • [28] Predicting the content dissemination trends by repost behavior modeling in mobile social networks
    Lu, Xinjiang
    Yu, Zhiwen
    Guo, Bin
    Zhou, Xingshe
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 42 : 197 - 207
  • [29] Privacy-Preserving Content Dissemination for Vehicular Social Networks: Challenges and Solutions
    Wang, Xiaojie
    Ning, Zhaolong
    Zhou, MengChu
    Hu, Xiping
    Wang, Lei
    Zhang, Yan
    Yu, Fei Richard
    Hu, Bin
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1314 - 1345
  • [30] Interest- and Content-Based Data Dissemination in Mobile Social Networks
    Liu, Mengxue
    Richa, Andrea W.
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,