A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks

@article{Faghani2013ASO,
  title={A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks},
  author={Mohammad Reza Faghani and Uyen Trang Nguyen},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2013},
  volume={8},
  pages={1815-1826}
}
  • M. R. Faghani, U. Nguyen
  • Published 1 November 2013
  • Computer Science
  • IEEE Transactions on Information Forensics and Security
We present analytical models and simulation results that characterize the impacts of the following factors on the propagation of cross-site scripting (XSS) worms in online social networks (OSNs): 1) user behaviors, namely, the probability of visiting a friend's profile versus a stranger's; 2) the highly clustered structure of communities; and 3) community sizes. Our analyses and simulation results show that the clustered structure of a community and users' tendency to visit their friends more… Expand
The Spatial–Temporal Perspective: The Study of the Propagation of Modern Social Worms
TLDR
A novel social worm simulation model is presented, which adopts “social network-based sharing” and “sorting and attenuation” methods, and the results show that the model is more suitable for modeling the complicated propagation behaviors of modern social worms in hierarchical networks. Expand
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks
TLDR
The model presented in this paper achieves a greater accuracy in characterizing the propagation of modern social worms, and can overcome inaccuracy in the number of infected nodes and provide a stronger approximation for the worm propagation. Expand
Modeling the Propagation of Trojan Malware in Online Social Networks
TLDR
An analytical model is presented to study propagation characteristics of Trojans and factors that impact their propagation in an online social network and can accurately and realistically estimate the infection rate caused by a Trojan malware in an OSN as well as the recovery rate of the user population. Expand
Detecting cloning attack in Social Networks using classification and clustering techniques
TLDR
In the proposed system the clone attack is detected based on user action time period and users click pattern to find the similarity between the cloned profile and real one in facebook. Expand
A study of clickjacking worm propagation in online social networks
  • M. R. Faghani, U. Nguyen
  • Computer Science
  • Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)
  • 2014
TLDR
Simulation results that characterize the propagation of clickjacking malware in social networks show that user habits of following posted links and the highly clustered structure of online social networks have significant impacts on the propagation speed of clickJacking malware. Expand
Modeling social worm propagation for advanced persistent threats
TLDR
This paper takes the first step to model social worm propagation for the APT using a novel proactive give-up factor, by which the worm can consult to actively postpone or stop unnecessary infections in order to keep the propagation stealthy and long-term. Expand
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
TLDR
This paper proposes a lightweight graph-based approach to perform Android malware detection that treats function call graphs of apps as social networks and performs social-network-based centrality analysis to represent the semantic features of the graphs. Expand
On Modeling Malware Propagation in Interest-Based Overlapping Communities
TLDR
Two malware propagation models in interest-based overlapping communities are put forward, one for early propagation stage and another for general propagation stage respectively, and they are transformed into lightweight computational complexity modes so as to be easily utilized in practice. Expand
Characterising heterogeneity in vulnerable hosts on worm propagation
TLDR
This work analytically and empirically study the impact of heterogeneity of vulnerable hosts on worm propagation, and proposes a novel model to predict and characterise worm dynamics among heterogeneous vulnerable hosts. Expand
A new direction in social network analysis: Online social network analysis problems and applications
TLDR
This study is original by presenting an important source of research by explaining the problems of online social network and the studies performed in this area and a reference work for researchers interested in analyzingOnline social network data and social network problems. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 31 REFERENCES
Toward worm detection in online social networks
TLDR
An early warning OSN worms detection system, which leverages both the propagation characteristics of these worms and the topological properties of online social networks, which can effectively monitor the entire social graph by keeping only a small number of user accounts under surveillance. Expand
Malware propagation in online social networks: nature, dynamics, and defense implications
TLDR
This comprehensive study uses extensive trace-driven simulation to study the impact of initial infection, user click probability, social structure, and activity patterns on malware propagation in online social networks. Expand
A novel method for worm containment on dynamic social networks
With the introduction of the World Wide Web and online social networks, people now have sought ways to socialize and make new friends online over a greater distance. Popular social network sites suchExpand
A Study of Trojan Propagation in Online Social Networks
TLDR
This paper investigates the attacking vector of the Trojan type malware in OSNs and suggests adjustment to the current model for malware propagation in scale-free networks to consider the effect of clustering coefficient and the user behaviors. Expand
Deployment of DNIDS in Social Networks
TLDR
A new framework aimed at slowing down or even preventing the propagation of computer worms and viruses in social networks is presented by deriving the social network of 1000 students, finding the most influential group of users, and analyzing the influence of the deployment of DNIDS using a simulation tool. Expand
Social Networks' XSS Worms
  • M. R. Faghani, H. Saidi
  • Computer Science
  • 2009 International Conference on Computational Science and Engineering
  • 2009
TLDR
A general model is suggested and the propagation of a sample worm in a virtual social network is simulated to see if the model conforms to simulated propagation of cross site scripting worms on web 2.0 social networks. Expand
Exploiting temporal complex network metrics in mobile malware containment
TLDR
A time-aware containment strategy that spreads a patch message starting from nodes with high temporal closeness centrality and it is shown that this scheme reduces the cellular network resource consumption and associated costs, achieving complete containment of malware in a limited amount of time. Expand
Analysis of topological characteristics of huge online social networking services
TLDR
Cyworld, MySpace, and orkut, each with more than 10 million users, are compared and it is shown that they deviate from close-knit online social networks which show a similar degree correlation pattern to real-life social networks. Expand
Containment of misinformation spread in online social networks
TLDR
Empirical results indicate that the β1T -- Node Protectors methods are among the best ones for hinting out those important nodes in comparison with other available methods for limit viral propagation of misinformation in OSNs. Expand
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks
TLDR
It is shown that although the worms themselves exploit different vulnerabilities, at either the client side or server side, they are successfully thwarted by PathCutter as it is vulnerability agnostic and blocks the propagation path of the infection. Expand
...
1
2
3
4
...