abusing social networks for automated user profilingsiy117527/sil765/readings/socialabuse.pdf ·...

19
Abusing Social Networks for Automated User Profiling Presented by Niraj 2009CS50249 Sidhartha Gupta 2009CS50490 Recent Advances in Intrusion Marco Balduzzi, Christian Platzer, Thorsten Holz Engin Kirda, Davide Balzarotti and Christopher Kruegel

Upload: others

Post on 26-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Abusing Social Networks forAutomated User Profiling

Presented byNiraj 2009CS50249Sidhartha Gupta 2009CS50490

Recent Advances in Intrusion

Marco Balduzzi, Christian Platzer, Thorsten HolzEngin Kirda, Davide Balzarotti and Christopher Kruegel

Page 2: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Motivations

• Social Networks have experienced a huge surge inpopularity

- The amount of personal information they store requiresappropriate security precautions

• Many users tend to be overly revealing whenpublishing personal information

- People are not aware of all the possible way in which theseinfo can be abused

• A simple problem can result in serious consequencesfor thousands of Social Networks users

Page 3: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

The Finding-Friends functionality

Social Networks usually provide an email-basedfunctionality to search for existing friends

RAID 2010 - 17th September

Page 4: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

What is the Problem?

• Problems of the Finding-Friends functionality:- Map a profile to an email

(normally considered a private information)

- Bulk queries of thousands of emails (10,000 on FB)

- Recursive queries via email fuzzing on user friends

Page 5: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

How to build the Identity of a person?iSecLab @ Eurecom

• Different profiles with the same e-mail address belong tothe same person

• The e-mail address can be used to build the identity of aperson extracting info from multiple social networks

RAID 2010 - 17th September

Page 6: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Impact

• Validation of e-mail addresses on large scale formassive spam attacks

- Fast and automated

• Enrich e-mail addresses with private user informationfor targeted attacks

- Phishing, social engineering

- Information gathering

• Detection of inconsistent profile informations

• Discovering of “hidden” identities

Page 7: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

System OverviewiSecLab @ Eurecom

RAID 2010 - 17th September

Page 8: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Experiments

• Identified 8 popular Social Networks providers thatsupport the Finding-Friends functionality:- Facebook, MySpace, Twitter, LinkedIN, Friendster, Badoo,

Netlog, XING

• Input data: 10 million e-mail addresses

• Two phases:1. Discover user profiles by e-mail querying

2. Profile user identities by e-mail correlation

Page 9: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Discovered profilesiSecLab @ Eurecom

RAID 2010 - 17th September

Page 10: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Discovered profilesiSecLab @ Eurecom

RAID 2010 - 17th September

Page 11: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Discovered profilesiSecLab @ Eurecom

RAID 2010 - 17th September

Page 12: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Profiling of the user identitiesiSecLab @ Eurecom

RAID 2010 - 17th September

Page 13: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Parsing sensitive informationiSecLab @ Eurecom

RAID 2010 - 17th September

Page 14: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Information MismatchiSecLab @ Eurecom

RAID 2010 - 17th September

Page 15: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Information MismatchiSecLab @ Eurecom

RAID 2010 - 17th September

Page 16: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Information MismatchiSecLab @ Eurecom

RAID 2010 - 17th September

Page 17: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Mismatches in Provided Age Information

iSecLab @ Eurecom

• 1/3 of the profiles have a mismatch in the age(of at least two years)

• Underage users claim to be > 18 to register on datingsites (Badoo)

RAID 2010 - 17th September

Page 18: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Countermeasures

1. Do not provide a direct map between e-mail and user(e.g. returning a list of registered accounts in random order)

2. CAPTCHA

3. Require contextual information to acknowledge thedata

4. Raising awareness (e.g. use a different e-mail forsites with personal information)

Page 19: Abusing Social Networks for Automated User Profilingsiy117527/sil765/readings/socialabuse.pdf · sites (Badoo) RAID 2010 - 17th September. Countermeasures 1. Do not provide a direct

Conclusions• “Finding-Friends” can be abused to:

1. Map thousands of profiles to their personal e-mails

2. Correlate profiles across multiple networks to build user identities• Implemented an Automated System that showsthe real impact of the attack•Run experiments on 8 popular SN providers,most of which acknowledge/fixed the problem