An Intelligent Model for Vulnerability Analysis of Social Media User

With the increased use of Internet, Online Social Networks (OSN) has become a part of life for millions of people today. Every day, users of such networks including Facebook, Twitter, etc. execute millions of activities, such as sharing information, posting comments, uploading photos, and updating statuses. The demand on a large amount of information and application that users upload, install, and execute on the social networks makes the social networks an attractive target for attackers. Attackers always misuse human vulnerabilities to launch social engineering attacks. The user behaviors on the OSN make such network begin a fertile area for Malware and attack propagation. Therefore, it is vital to investigate how OSN user behavior affects the vulnerability level of the OSN. In this study, a new model has been built based on Back Propagation Neural Network (BPNN) so as to identify the vulnerability level of the user. This model uses 30 features each of which represents a relation between user vulnerability and attacker policy. One thousand observations for OSN behaviors have been collected by means of surveys in two different countries. The data is used to build training and testing data sets for the BPNN. Performance results show that our model identifies vulnerability level of the user with a high accuracy rate.

[1]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[2]  Jorge J. Moré,et al.  The Levenberg-Marquardt algo-rithm: Implementation and theory , 1977 .

[3]  C. Spânu A Survey of Privacy and Security Issues in Social Networks , 2014, Proceedings of the International Conference on Cybersecurity and Cybercrime.

[4]  Qun A. Li,et al.  A Survey of Security and Privacy in Online Social Networks , 2012 .

[5]  Adriana Iamnitchi,et al.  A Survey on Privacy and Security in Online Social Networks , 2015, Online Soc. Networks Media.

[6]  Bhavani M. Thuraisingham,et al.  Preventing Private Information Inference Attacks on Social Networks , 2013, IEEE Transactions on Knowledge and Data Engineering.

[7]  N. K. Rana,et al.  Security Issues of Online Social Networks , 2013 .

[8]  Yuval Elovici,et al.  Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.

[9]  Omar Zakaria,et al.  Devising a Biological Model to Detect Polymorphic Computer Viruses Artificial Immune System (AIM): Review , 2009, 2009 International Conference on Computer Technology and Development.

[10]  Balachander Krishnamurthy,et al.  Privacy Leakage in Mobile Online Social Networks , 2010, WOSN.

[11]  Yuguang Fang,et al.  Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.

[12]  M. L. Mat Kiah,et al.  Minimizing Errors in Identifying Malicious API toDetect PE Malwares Using Artificial Costimulation , 2012 .

[13]  Jun Hu,et al.  Security Issues in Online Social Networks , 2011, IEEE Internet Computing.

[14]  Syeda Meraj Bilfaqih Preventing Private Information Inference Attacks on Social Networks , 2015 .

[15]  Scott A. Golder,et al.  Security Issues and Recommendations for Online Social Networks. , 2007 .

[16]  J. J. Moré,et al.  Levenberg--Marquardt algorithm: implementation and theory , 1977 .

[17]  Lim Chin Nei,et al.  A Case Study on Clickjacking Attack and Location Leakage , 2014 .

[18]  Weining Zhang,et al.  An Information Extraction Attack against On-Line Social Networks , 2012, 2012 International Conference on Social Informatics.

[19]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.