Framework for collecting social network events

Online Social Networks became a relevant part of daily digital interactions for more than half a billion users around the world. The various personal information sharing practices that social network providers promote have led to their success as innovative social interaction platforms. At the same time, these practices have risen much critique and concerns with respect to privacy and security from different stakeholders. In fact, the massive use of online social networks has risen the attention of hackers and attackers that want to propagate malware and viruses for obtaining sensitive data. In this way, every social network user should be able to easily access, control and analyse the information he shares on his profile in order to efficiently detect any usage deviation. The possibility of detecting different sources of shared information in the same account lead us to design a system based not on information itself but on the timestamps associated to it. The proposed event collector framework can collect all posted information and store it in a relational database for further analysis. Using a friendly graphical interface, users can access all stored information in a comprehensible manner, according to the type of event, thus facilitating the analysis of the user behaviour. Since each event is stored with its corresponding timestamp, it is possible to perform an efficient analysis of all posted contents, compute statistics over collected data, infer/establish the so called "normal" or "typical" usage profile and, thus, be able to detect possible deviations that may correspond to a compromised user account.

[1]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[2]  Marc Lemercier,et al.  A dynamic approach to detecting suspicious profiles on social platforms , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[3]  Haiying Shen,et al.  Leveraging Social Networks for Effective Spam Filtering , 2014, IEEE Transactions on Computers.

[4]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[5]  Abir Awad Abir Awad , 2022 .

[6]  Rami Puzis,et al.  Deployment of DNIDS in Social Networks , 2007, 2007 IEEE Intelligence and Security Informatics.

[7]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[8]  Shah Mahmood,et al.  New Privacy Threats for Facebook and Twitter Users , 2012, 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[9]  Paulo Salvador,et al.  Detection of Illicit Network Activities Based on Multivariate Gaussian Fitting of Multi-Scale Traffic Characteristics , 2011, 2011 IEEE International Conference on Communications (ICC).

[10]  Fengyuan Xu,et al.  SybilDefender: Defend against sybil attacks in large social networks , 2012, 2012 Proceedings IEEE INFOCOM.