Game theoretic attack analysis in Online Social Network (OSN) services

In the social media era, the ever-increasing utility of Online Social Networks (OSN) services provide a variety of benefits to users, organizations, and service providers. However, OSN services also introduce new threats and privacy issues regarding the data they are dealing with. For instance, in a reliable OSN service, a user should be able to set up his desired level of information sharing and securely manage sensitive data. Currently, few approaches exist that can model OSNs for the purpose, let alone model the effects that attackers can have on these networks. In this work a novel OSN modeling approach is presented to fill the gap. This model is based on an innovative game theoretical approach and it is analyzed both from a theoretical and simulation-oriented view. The game theoretic model is implemented in order to analyze several attack scenarios. As the results show, there are several scenarios where OSN services are very vulnerable and hence more protection mechanisms should be provided in order to secure the data contained across these networks.

[1]  Edgar R. Weippl,et al.  Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam , 2011, IEEE Internet Computing.

[2]  Joon S. Park,et al.  Fine-Grained and Scalable Message Protection in Sensitive Organizations , 2007, J. Softw..

[3]  Roberto Battiti,et al.  Social Networking and Game Theory to foster Cooperation , 2007 .

[4]  Christos Faloutsos,et al.  Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining , 2013, ASONAM 2013.

[5]  Slava Kisilevich,et al.  Analysis of privacy in online social networks of runet , 2010, SIN.

[6]  Anna Cinzia Squicciarini,et al.  Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[7]  Yuguang Fang,et al.  Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.

[8]  Calton Pu,et al.  Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks , 2011, IEEE Internet Computing.

[9]  Joon S. Park,et al.  A game theoretic approach for modeling optimal data sharing on Online Social Networks , 2012, 2012 9th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE).

[10]  Joon S. Park,et al.  Towards trusted data management in online social network (OSN) services , 2012, World Congress on Internet Security (WorldCIS-2012).

[11]  Joon S. Park,et al.  Optimal State Management of Data Sharing in Online Social Network (OSN) Services , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[12]  Jun Hu,et al.  Security Issues in Online Social Networks , 2011, IEEE Internet Computing.

[13]  Jing Liu,et al.  An Analysis of Security in Social Networks , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[14]  Michael Netter,et al.  Analyzing Privacy in Social Networks--An Interdisciplinary Approach , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[15]  Na Li,et al.  Preserving Relation Privacy in Online Social Network Data , 2011, IEEE Internet Computing.

[16]  Joon S. Park,et al.  Active access control (AAC) with fine-granularity and scalability , 2011, Secur. Commun. Networks.