threat analysis in online social network systems · • target (t): t has privacy settings for a a...

61
Threat Analysis in Online Social Network Systems Social Network Systems Lei Jin SA S b Sh l f f i Si LERSAIS Lab @ School of Information Sciences University of Pittsburgh

Upload: others

Post on 22-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Threat Analysis in Online Social Network SystemsSocial Network Systems

Lei Jin SA S b S h l f f i S iLERSAIS Lab @ School of Information Sciences

University of Pittsburgh

Page 2: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Purpose• Take online social network systems as examples to• Take online social network systems as examples to

demonstrate how to conduct a threat analysis in a complex systemp y

• Investigate & analyze various security & privacy issues in the most popular online social network ssues t e ost popu a o e soc a etwosystems, such as Facebook, LinkedIn, Foursquare and Yelp

• Be aware of these problems & know how to mitigate or avoid the potential attacks

LERSAIS Lab @ School of Information Sciences 2

Page 3: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Steps of Threat Analysis

Step1• Identify Entities, Elements & Mechanisms

Step2• Investigate & Test the Mechanisms

Step3• Design & Conduct Attacks

Step 4• Design & Develop Defense Approaches

LERSAIS Lab @ School of Information Sciences 3

Page 4: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Coverage• Not focus on the traditional problemsp

– Authentication

– Secure CommunicationSecure Communication

– Web-based Attacks; E.g., SQL Injection, Cross Site Scripting

• Focus is on the new vulnerabilities that exist in online social networks

T diti l li i l t k (OSN) E F b k &– Traditional online social networks (OSN); E.g., Facebook & LinkedIn

– Location-based social networks (LBSN); E g Foursquare &Location-based social networks (LBSN); E.g., Foursquare & Yelp

LERSAIS Lab @ School of Information Sciences 4

Page 5: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Steps of Threat Analysis

Step1• Identify Entities, Elements & Mechanisms

Step2• Investigate & Test the Mechanisms

Step3• Design & Conduct Attacks

Step 4• Design & Develop Defense Approaches

LERSAIS Lab @ School of Information Sciences 5

Page 6: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

6LERSAIS Lab @ School of Information Sciences

Page 7: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

OSN Friendship/Social Network

User Profile

Messages & Comments

User

Comments

Pictures

Friendship Link

Friend List Friend List

Link

LERSAIS Lab @ School of Information Sciences 7

Page 8: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

LBSN

U Venue

Create venues

User VenueExplore various places

Check in at venues

(user, venue, time,…)

VENUE

CHECK-IN

LERSAIS Lab @ School of Information Sciences 8

Social Network (name, location, category,…) VENUE

Page 9: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

E titi El t & M h i• User Identity / User Profile

Entities, Elements & Mechanisms• User’s Social Network

– Attributes

• Venue (LBSN)

– Friends

– Mutual Friends

– Attributes– Recommended Friends

• User’s Posts

M h i

– Messages

– Photos

h k i ( ) • Mechanisms– User Authentication

A C t l M h i

– Check-ins (LBSN)

LERSAIS Lab @ School of Information Sciences 9

– Access Control Mechanisms

Page 10: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Steps of Threat Analysis

Step1• Identify Entities, Elements & Mechanisms

Step2• Investigate & Test the Mechanisms

Attacker!Attacker!

Step3• Design & Conduct Attacks

Step 4• Design & Develop Defense Approaches

LERSAIS Lab @ School of Information Sciences 10

Defender!Defender!

Page 11: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

I ti ti f U Id tit / U Investigation of User Identity / User Profiles & Venues

User Identity Private /

User Profile Fake Venue

Venue

Fake IdentityPrivate / Sensitive Attributes

Fake Venue

Fake Promotions & Coupons

Cloned IdentityExposure of Sensitive Attributes

Exposure of Visit Statistics (check‐ins)

Identity Clone Attack

Attribute Inference Attack Venue Attack

LERSAIS Lab @ School of Information Sciences 11

Page 12: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Cloned Identity

LERSAIS Lab @ School of Information Sciences 12

Page 13: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Identity Clone Attack [6] - Design• Attributes: name education birthdayAttributes: name, education, birthday…• Friend network

– Friend List (FL): Connected friends of an ID( )

– Recommended Friend List (RFL): Generated by OSN systems (function of “People You May Know”

b k)on Facebook)

Share same RFs

Excluded Friend List (EFL):– Excluded Friend List (EFL): Social embarrassments

Attackers - try to connect these individuals

LERSAIS Lab @ School of Information Sciences 13

Attackers try to connect these individuals

Page 14: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

What are the best targets

I iN t Inactive Account

Not having Account

Popular /

Account

Popular / Authority Account

LERSAIS Lab @ School of Information Sciences 14

Account

Page 15: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Attribute As TargetSub Targets:

1. Attribute Values

2. Privacy Settingsy g

LERSAIS Lab @ School of Information Sciences 15

Page 16: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

i d k A Friend Networks As Target

FLFLRFLEFLEFL

FLRFLRFLEFLFaked ID

LERSAIS Lab @ School of Information Sciences16

Faked ID

Page 17: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Cloned Identity Detection

Profile SetAn Input Identity

Profile  Profile 

Authentication Schemes

Candidate List

Filtering

Fake Identity List

Validation

Suspicious Identity List

SimilaritySimilarity Computation

Thresholds Profile Similarity h

LERSAIS Lab @ School of Information Sciences 17

Schemes

Page 18: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

P fil Si il itProfile SimilarityAttribute Similarity

SA( , )

| | | |

cv

att c v

c v

SAS P P

A A

Basic Principle: Similar Attributes in Two Profiles

Friend Network SimilarityFor Basic Profile Similarity (BPS)

( , ) ( )c v ff frfbfn fefS P P S S S Basic Principle:

Mutual Friends in Friend Networks

F M lti l f k d Id titi P fil Si il it (MFIPS)( , ) ( ) ( )

mfn c v s ff s cf s frf s cfrf s fefS P P S S S S S

For Multiple-faked Identities Profile Similarity (MFIPS)

LERSAIS Lab @ School of Information Sciences 18

Basic Principle: Similar Friends in Friend Networks

Page 19: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Experimentsλ=0.03, μ=0.4δ=0.2, λ=0.03

60.00%70.00%80.00%90.00%

100.00%

on R

esul

ts

Detection Rate False Positive

60.00%

80.00%

100.00%

n R

esul

ts

Detection Rate False Positive

20.00%30.00%40.00%50.00%

0.2 0.3 0.4 0.5 0.6 0.7 0.8

Det

ectio

δ0.00%

20.00%

40.00%

0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5

Det

ectio

n

μ

90.00%100.00%

ults

δ=0.3, μ=0.3

Detection Rate False Positive

80 00%

100.00%

lts

δ=0.2, λ=0.03

Detection Rate False Positive

30.00%40.00%50.00%60.00%70.00%80.00%

Det

ectio

n R

esu

0.00%

20.00%

40.00%

60.00%

80.00%D

etec

tion

Res

ul

LERSAIS Lab @ School of Information Sciences 19

0.12 0.15 0.18 0.21 0.24 0.27 0.3λ 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5μ

Page 20: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Infer User’s Profile Information• Assumptions: Friends tend to share the same interests• Assumptions: Friends tend to share the same interests

• Inferring a targeted user’s private attribute based on his/her friends’ public attributeshis/her friends public attributes

• Example:– A user hides his education and occupation from the public

– Many of a user’s friends are current students at the University of Pittsburgh

– Inference: University of Pittsburgh, Student

LERSAIS Lab @ School of Information Sciences 20Mislove Alan, Viswanath Bimal, Gummadi Krishna P, Druschel Peter, You are who you know: inferring user profiles in online social networks, WSDM’10

Page 21: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Venue Attacks in LBSNs [2]• Venue AttributesVenue Attributes

– Creator

– OwnerOwner

– Name

Address– Address

– Geo-location

C t– Category

– Statistical Information - Owner

– Promotion/Coupon (Set by Owner)

LERSAIS Lab @ School of Information Sciences 21

Page 22: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Malicious Venue Creation Attack• ANY user can create ANY type of a venue withoutANY user can create ANY type of a venue without

being subjected to any AUTHENTICATION and the AUTHORIZATION from the actual owner

• Venue Not Created in a LBSN– Does not exist in the real world: deceive and confuse users,

d t ’ t t f LBSNdestroy users’ trust for LBSNs

– Exists in the real world but not willing to share; e.g. home, private placep p

• Venue Already Created in a LBSN– Create a similar venue using a similar/alternative name; e gCreate a similar venue using a similar/alternative name; e.g.,

School of Information Sciences - iSchoolLERSAIS Lab @ School of Information Sciences 22

Page 23: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Venue Ownership Hijacking Attack• Bypass the owner authentication process & become the owner

of the created venueof the created venue• Owner Authentication in Foursquare, Yelp and Facebook

Place– Phone number

– Address

• Impacts– Expose customers’ visit information: users’ privacy

Manipulate coupons/promotions: financial loss and/or destroy user trust– Manipulate coupons/promotions: financial loss and/or destroy user trust on the venue

– Change the address of the venue

– …

LERSAIS Lab @ School of Information Sciences 23

Page 24: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Venue Location Hijacking Attack• Venue’s location is associated with its geo-location• Venue s location is associated with its geo-location

not the physical address

• Geo location is dynamic in terms of possible• Geo-location is dynamic in terms of possible inaccurate GPS signals

• Location pdate: the center of all the honest check ins• Location update: the center of all the honest check-ins marked by a LBSN

LERSAIS Lab @ School of Information Sciences 24

Page 25: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

’ Ch k i & k d ’ h Ch k i & k d

Users’ Dishonest Check-ins & Marked

Users’ Honest Check-ins & Marked as Host Check-ins by System

Users’ honest Check-ins & Marked as Dishonest Check-ins by System

Users’ Dishonest Check-ins & Marked Users Dishonest Check ins & Marked as Dishonest Check-ins by System

Actual Location of the Venue

Users Dishonest Check ins & Marked as Honest Check-ins by System

Manipulated Location of the VenueManipulated Location of the Venue

IIIIIIIV

LERSAIS Lab @ School of Information Sciences 25

Page 26: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Th M t f th L ti f th LERSAIS L bThe Movements of the Locations of the LERSAIS LabCorrect Location 2013-04-08

2013-03-11

2013-04-17

2013-03-07

2013-05-02

Targeted Location2013-02-25

2013-05-12

LERSAIS Lab @ School of Information Sciences 26

2013 05 12

Page 27: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Combined Venue Attacks

Venue Location Hijacking

Venue Ownership HijackingHijacking

attack Hijacking

attack

Malicious V C tiVenue Creation

attack

LERSAIS Lab @ School of Information Sciences 27

Page 28: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Moved 2 Miles away in May,

Moved 3 Miles away in July,

New Venue Created & Its Check-ins in

LERSAIS Lab @ School of Information Sciences 28

y y,2012

y y,2012 August, 2012

Page 29: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Investigation of User’s Social Network Investigation of User s Social Network & Posts

F i d Li t

User’s Social 

Networkh

User’s Posts

Friend Lists Photos

Mutual Friends Check‐ins

1. Mutual-friend Based Attack

2 F i d I f

Resource Sharing Issues

LERSAIS Lab @ School of Information Sciences 29

2. Friend Inference Attack

Page 30: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Issues Related to Users’ Friend Lists

• Importance of the friend list• Importance of the friend list

• What a user’s friends reveals– Family, Work, Income, Reputation, Religion…

– Used for Identity Clone Attacks

– Used for Inferring Private Attributes

LERSAIS Lab @ School of Information Sciences 30

Page 31: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Attacks - Expose a User’s Social Attacks - Expose a User s Social Network• Mutual-friend based Attack• Mutual-friend based Attack

• Friendship Identification and Inference Attack

LERSAIS Lab @ School of Information Sciences 31

Page 32: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Mutual Friend Feature

• Show mutual friendsShow mutual friends between two users

• Useful feature, e.g. Friend gRecommendation, Friend Introduction

Lack of the Access ControlLack of the Access Control Mechanism !

LERSAIS Lab @ School of Information Sciences 32

Page 33: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Attack Example

DE

A

Alice BobB

CC

LERSAIS Lab @ School of Information Sciences 33

Page 34: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

fi i i f l f i dDefinition of a Mutual-friend based Attack

• Attacker (a)• Target (t):

t has privacy settings for a

a does not know t’s friends and distant neighbors

f A (A i )• Knowledge of an Attacker (Assumptions): a knows his friend list

a can find tf

For each u that a can find, a can query MF(a, u)

• Mutual-friend based Attack: at least one of t’s friends and/or distant neighbors are exposed to a by

querying mutual friends34

Page 35: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Attack Structures• Mutual-friend based Attack• Mutual-friend based Attack

– Conduct various well-designed mutual friend queries

• Queries are designed based on attack structures– Types of Attack Structures

Used to identify a target’s friends (BASFs)

Used to identify the target’s distant neighbors (BASDNs)

LERSAIS Lab @ School of Information Sciences 35

Page 36: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

BASFsTargetAttacker User

u

(i)

t

(ii)

( )

t u

(iii)

tu

LERSAIS Lab @ School of Information Sciences 36

Page 37: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

u2(i)

BASDNs t

2

u1 tu1

(ii)u2

(iii)t

t

u2

u

t

tu1

(iv)t

u

(v)t t

LERSAIS Lab @ School of Information Sciences 37

u1 u2 u1 u2

Page 38: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Specific-Target Attack Att k ( ) h ifi t t (t) Attacker (a) has a specific target (t) Goal:

try to find out all the attack structures related to ty

find out as many t’s friends and distant neighbors as possible

Attack Steps

1) Mutual friends between a & t; a’s friends;

2) Need a user set U

d i d (T 1) a randomized user set (Type 1)

a community /group including t (Type 2)

3) Find out the attack structures and query mutual friends based ) q yon them

38

Page 39: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Exploration Attack Attacker (a) has no specific target

Goal

explore users who can be compromised explore users who can be compromised

find out only one friend or distant neighbor of a user

Attack Steps:

1) Need a target set T

a randomized user set (Type 1)

a community / group including a (Type 2)

2) For each t in T,

if there is one attack structure involving a & tif there is one attack structure involving a & t

t can be compromised39

Page 40: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Hybrid Attacku8 1 Launch the explorationu8

u4

u3

u1

1. Launch the exploration attack using attacker’s community

u12

a t1u5

u1

u2

2. Assume the attacker is interested in attacking t1and t2, he chooses them

t2u10

2,as specific targets

3. Launch specific-target u11

u7u6

u9

attacks for t1 and t2using t1’s community and a user set about t2

40

Page 41: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Specific-target Attacks

Randomized Group with 100

Users

Target’s Group

A E d F i d Average Exposed Friends of a Target 2.6 (10.2%) 12.4 (48.9%)

Average Exposed DistantN i hb f T t 24.7 42.0Neighbors of a Target 24.7 42.0

41

Page 42: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

E l i A kExploration Attacks

Randomized i h k ’Group with 100

UsersAttacker’s Group

Average Compromised Users 12.3 (12.3%) 52.65 (61.0%)Compromised Users

42

Page 43: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

H b id Att kHybrid Attacks• Exploration + Specific-target

Launch Exploration attacks using the attacker’s groups

Choose two specific targets who have the most mutual friends with the attacker from the Exploration attack results

Launch Specific-target attacks for selected targets using targets’ groups

Results of SpecificResults of Hybrid Attacks

Average Exposed Friends of a Target 19.4 (73.2%)

Results of Specific-target Attack using the target’s group~ 12 (49%)of a Target

Average Exposed DistantNeighbors of a Target 48.3 ~ 42

43

Page 44: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Defense ApproachesR• Reasonno restriction for querying mutual friends

• Defense approachesHide user profilep

Access control to query mutual friends

44

Page 45: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

F i d hi Id ifi i & I f Friendship Identification & Inference Attack• Users’ Privacy Settings for Friend Lists• Users Privacy Settings for Friend Lists

– Private

– Friends w/o an excluding list

– Public

LERSAIS Lab @ School of Information Sciences 45

Page 46: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Inconsistent Policies

A CA’s Friend List C’s Friend List

A CC

A

LERSAIS Lab @ School of Information Sciences 46

Page 47: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Inconsistent Preferences Example -1

A TF

BEInference

D CG

LERSAIS Lab @ School of Information Sciences 47

Page 48: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Inconsistent Preferences Example -2

Inference

A TE

BD C

Inference

D C

LERSAIS Lab @ School of Information Sciences 48

Page 49: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Attack DefinitionA social graph G(V E); An adversary b V; A target t VA social graph G(V, E); An adversary b V; A target t V

t defines a policy that does not authorize b to see F(t)Assumption on Target t's Privacy Setting:

Assumptions on Adversary's Initial Knowledge: b's initial attack knowledge K(b) = (Vkb, Ekb) is constructed

based on friend lists visible to himbased on friend lists visible to him t is included in Vkb

Privacy Attack:t is a victim of an FII attack launched by b if b can identify and correctly infer at least e friends of t's friends based on the proposed random walk based link predictions on K(b).

LERSAIS Lab @ School of Information Sciences 49

No Additional Action

Page 50: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Attack Schemes• One attacker node & one target• One attacker node & one targetScheme 1: Adversary chooses a number of users,

who are the most likely to be friends of a target, at tione time

Scheme 2: Adversary choose only one user, who is the most likely to be friend of a target at one time; t e ost e y to be e d o a ta get at o e t e;add such a friendship link to the network and launch the attack again…

S h 3 Ad fi t tt k th hScheme 3: Adversary first attacks other users, who are close to the target; add identified and inferred friendship links to the network; then attack the targettarget

50

Page 51: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

A k S h ( )Attack Schemes (cont.)• Multiple attacker nodes & one targetMultiple attacker nodes & one targetCombine the attack knowledge (segments of

the network) from different attacker nodes to be a more completed segment of the network

• Topology of the entire social network p gy(multiple attacker nodes & multiple targets)Attack the most vulnerable targets first

51

Page 52: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Results of attack scheme 1 in the three datasets

Relationship Between an D1 D2 D3Attacker Node & a

Target

D1 D2 D3

Average True Positive for Attacker Nodes

Friend 7.82 (78.2%) 4.71 (47.1%) 5.48 (54.8%)

2-distant Neighbor 5.78 (57.8%) 2.85 (28.5%) 3.25 (32.5%)for Attacker Nodes (Average RC)

g

More than 2-distant Neighbor 4.03 (40.3%) 3.13 (31.3%) 3.19 (31.9%)

Average False Positive Friend 2.18 (21.8%) 5.29 (52.9%) 4.52 (45.2%)

2 distant Neighbor 4 22 (42 2%) 7 15 (71 5%) 6 75 (67 5%)Average False Positive for Attacker Nodes

(Average RIC)

2-distant Neighbor 4.22 (42.2%) 7.15 (71.5%) 6.75 (67.5%)

More than 2-distant Neighbor 5.97 (59.7%) 6.87 (68.7%) 6.81 (68.1%)

52

Page 53: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Results of attack schemes in the three Results of attack schemes in the three datasets

Attack Scheme D1 D2 D3Attack Scheme D1 D2 D3

Average True Positive for

Attack Scheme 1 5.88 3.56 3.97

Average True Positive for Attacker Nodes Attack Scheme 2 5.92 3.78 4.22

Attack Scheme 3 6.91 4.85 5.32

53

Page 54: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Att k lt i lti l Attack results using multiple attacker nodes in D3 M1: one friend, one 2-distant neighbor, one more than 2-distant neighbor M2: three friend, one 2-distant neighbor, one more than 2-distant neighbor M3: three friend, five 2-distant neighbor, five more than 2-distant neighbor M4: five friend, five 2-distant neighbor, five more than 2-distant neighbor

8

Average True Positive for Targets

Average False Positive for Targets

4

5

6

7

1

2

3

4

54

0M1 M2 M3 M4

Page 55: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Results from FII attacks on the topology of the entire network in D3

Each attack is repeated in 10 times

After Launching

1K FII Attacks

After Launching

5K FII Attacks

After Launching

10K FII Attacks

After Launching

20K FII AttacksAttacks Attacks Attacks Attacks

Average Correctly Inferred Friendship Links (Percentage

of All Friendship Links)

4113.4 (7.76%)

17948.3 (33.88%)

32231.4 (60.84%)

37891.2 (71.53%)

A I l Average Incorrectly Friendship Links 4528.6 13314.4 21653.2 25472.3

55

Page 56: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Defense Approaches

A’ i d i C’ i d i

A CA’s Friend List C’s Friend List

A

C

• Squicciarini et al. -> voting algorithm & game theory

• Hu et al. -> Label Privacy Level, minimize privacy risk & sharing loss

LERSAIS Lab @ School of Information Sciences 56

Page 57: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Issues Related to Users’ Posts• Photos

– A photo includes multiple individuals

– One of them posts it in his/her wall

– Other may be upset

• Check-ins (LBSNs) [2]– A user exposes where and when he is

– A user exposes where his lives

A ’ f i d th l th ’ l ti l t d– A user’s friend or other people expose the user’s location related information

• Existing Access Control mechanisms cannot address all of these problems [5]

LERSAIS Lab @ School of Information Sciences 57

Page 58: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Other Issues – Email Address as Other Issues – Email Address as Identity [7]• Too many online systems adopt a user’s email address as• Too many online systems adopt a user s email address as

the user’s identity• Caused and causing many threatsg y

– Email address is not considered to be a private information

– Easy to guess a user’s identity in a online systemy g y y

– More vulnerable for online password cracking

• Share the same passwordsp

• Avoid the limits of fail login times

– Cracking one email address = Cracking related online accounts g gassociated with this email address

LERSAIS Lab @ School of Information Sciences 58

Page 59: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

59LERSAIS Lab @ School of Information Sciences

Page 60: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

References1) Lei Jin, Hassan Takabi, Xuelian Long, James B.D. Joshi, Exploiting

Users’ Inconsistent Preferences in a Social Network System to Discover P i F i d hi Li k WPES'14Private Friendship Links, WPES'14.

2) Lei Jin and Hassan Takabi, Venue Attacks in Location-Based Social Networks, GeoPrivacy'14.

3) Lei Jin, James B.D. Joshi, Mohd Anwar, Mutual-friend Based Attacks in Social Network Systems, Computer & Security, v. 37, pp-15-30, 2013.

4) Lei Jin, Xuelian Long, James B.D. Joshi, Towards Understanding Residential Privacy by Analyzing User' Activities in FoursquareResidential Privacy by Analyzing User Activities in Foursquare, BADGERS'12.

5) Lei Jin, Xuelian Long, James B.D. Joshi and Mohd Anwar, Analysis of Access Control Mechanisms for Users' Check-ins in Location-Based Social Network Systems,WICSOC 2012.

6) Lei Jin, Hassan Takabi and James B.D. Joshi, Towards Active Detection of Identity Clone Attacks on Online Social Networks, CODASPY 2011.

7) Lei Jin, Hassan Takabi and James B.D. Joshi, Security and Privacy Risks of Using E-mail Address as an Identity, PASSAT 2010.

LERSAIS Lab @ School of Information Sciences 60

Page 61: Threat Analysis in Online Social Network Systems · • Target (t): t has privacy settings for a a does not know t’s friends and distant neighbors • Knowledge ofA (A i )f an Attacker

Questions?

LERSAIS Lab @ School of Information Sciences 61