a research of software vulnerabilities

24
Software Insecurity Distribution Through Social Networking by Alireza Aghamohammadi Samir Tout (Ph.D.) Graduate Research Fair March 17, 2010

Upload: alireza-aghamohammadi

Post on 15-May-2015

448 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: A research of software vulnerabilities

Software Insecurity Distribution Through Social Networking

byAlireza Aghamohammadi 

Samir Tout (Ph.D.)Graduate Research Fair

March 17, 2010

Page 2: A research of software vulnerabilities

Quick preview - Introduction - BackgroundB. Background Social Network A. Background Software Insecurity - Core Topic A. Virus propagation via communication in social networks B. Applications and tools of social networking a device for insecurity

Page 3: A research of software vulnerabilities

Quick preview, cntd.. C. Automated social networks bots, crawler, spider, scanners and sniffers - Conclusion

Page 4: A research of software vulnerabilities

Introduction - Information Security ChallengesA. Complexity while being dynamicB. Multiplicity- Internet GrowthA. Share, learn … B. Vulnerabilities and information insecurity (examples ?)C. Data mining increase

Page 5: A research of software vulnerabilities

Introduction, cntd..According to Solomon Eyal Shimony and Natalia Vanetik, (2008, p. 1441)

- Social Network Analysis and Social Networking increase.

Page 6: A research of software vulnerabilities

Introduction , cntd.. - Researchers use of social network analysis and Data Mining studies.- Many risks associated with social networking. - let’s examine how software insecurity can be distributed via social networking.

Page 7: A research of software vulnerabilities

Background social network

1920 - Kurt Lewin1960 - Anthropological study

of kinship systems 1997 - Medical researchers2008 - social networking

represents a novel approach to the approximate similarity query processing

Page 8: A research of software vulnerabilities

Background software insecurity

- Personal Computers- Sharing Floppy disks- Early 1970s- Internet- Today ?

Page 9: A research of software vulnerabilities

Background software insecurity

adwareBot\robot spyware

trojan

Phishing +Pharming

botnetsKey

logger

Spam

sql injectors

Page 10: A research of software vulnerabilities

Definitions- Social networking: a network of entities which have properties, actions and (direct or indirect) communication. Entities could be humans, computers or other beings or things.However, in this paper social networking refers to none-physical social networking in most cases.

Page 11: A research of software vulnerabilities

Definitions , cntd.. - Software insecurity: this is referred to any system weakness, failure, risk or functionality problems due to poor software quality or malfunction as it pertains to security only. Bot or Robots: are automated programs to do various functionalities including collecting data.

Page 12: A research of software vulnerabilities

Definitions , cntd.. - Web crawler: are a form of bot which run on web to search for data or perform other searching tasks on webs sites.-Trojan: it is a software that may appear as something useful on the computer but it actually is a harmful software. -Virus: is a computer program/code that performs harmful activities. Virus will spread unlike Trojans.

Page 13: A research of software vulnerabilities

Core topic1.Virus propagation via communication in social networks- facebook, linkedin, twitter- staying connected and find new friends- risks ?Social network and transmitting software insecurityA: flash drive, CD/DVD B:emails, social network sites, SMS, IM, Posts

Page 14: A research of software vulnerabilities

Core topic , cntd.. 1.Virus propagation via communication in social networksA. Lack of virus scan for social networking sites.B. IM, SMS and Images as a medium. applications for social networking sites do not have the functionality to prevent insecurity propagation to other users or encrypt users contact lists and information.

Page 15: A research of software vulnerabilities

Core topic , cntd.. 1.Virus propagation via communication in social networksC. Hand held devices and cell phones have applications for social networking ! another method to propagate .

Page 16: A research of software vulnerabilities

Core topic , cntd.. 2. Applications and tools of social networking a device for insecurity Type A (does not require local installation ):tools for entertainment, gaming or simply for fun. Examples:- Facebook - Who Has The Biggest Brain? - Orkut -MindJolt Games - Myspace –Mobsters Problem ? application could be a host to infect other computers.

Page 17: A research of software vulnerabilities

2. Applications and tools of social networking a device for insecurity Type B:Collaborations or sharing tools • Google -groups.google.com• Google- google docs• Yahoo-groups.yahoo.com Problem : infected macros or viruses can get propagated via social networking

Page 18: A research of software vulnerabilities

2. Applications and tools of social networking a device for insecurity Type C:The API or tools created by other third parties to allow users to take full advantage of social networking. http://www.digsby.com/ (works with facebook, twitter, myspace)http://www.meebo.com/notifier/ (works with facebook, AIM, MSN, Yahoo)Problem : channels of insecurity distribution.

Page 19: A research of software vulnerabilities

3. Automated social networks bots, crawler, spider, scanners and sniffers - Many bots or robots which automatically can crawl into various social network sites and perform data gathering and even analysis to launch attacks on user’s computer or host .Web crawler/spider demo

Page 20: A research of software vulnerabilities
Page 21: A research of software vulnerabilities

3. Automated social networks bots, crawler, spider, scanners and sniffers, cntd.. - Collecting data from users profile or gaining access to an individual account will allow hackers to attack and harm computers or systems indirectly.So, how is it going to create software insecurity ?

Page 22: A research of software vulnerabilities

3. Automated social networks bots, crawler, spider, scanners and sniffers , cntd.. • create crawler• launch crawler to collect data • analyze data• attempt to hack users profile• send emails or invitations to other to open a file or visit a website

Page 23: A research of software vulnerabilities

Conclusion• Social networking has become a medium of communication for many Internet users. • However, there are many ways which social networking allows for software insecurity distribution.

Page 24: A research of software vulnerabilities

Reference Gudes, E., Shimony, S., Member, & Vanetik, N. (2006). Discovering frequent graph patterns using disjoint paths. IEEE Computer Society, 18(11), November 1, 2009. doi:10.1109/TKDE.2006.173