Design and analysis of a social botnet

被引:116
作者
Boshmaf, Yazan [1 ]
Muslukhov, Ildar [1 ]
Beznosov, Konstantin [1 ]
Ripeanu, Matei [1 ]
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Online social networks; Social network security; Automated social engineering; Online privacy; Botnets; Socialbots; SYSTEM;
D O I
10.1016/j.comnet.2012.06.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Online Social Networks (OSNs) have attracted millions of active users and have become an integral part of today's web ecosystem. Unfortunately, in the wrong hands, OSNs can be used to harvest private user data, distribute malware, control botnets, perform surveillance, spread misinformation, and even influence algorithmic trading. Usually, an adversary starts off by running an infiltration campaign using hijacked or adversary-owned OSN accounts, with an objective to connect with a large number of users in the targeted OSN. In this article, we evaluate how vulnerable OSNs are to a large-scale infiltration campaign run by socialbots: bots that control OSN accounts and mimic the actions of real users. We adopted the design of a traditional web-based botnet and built a prototype of a Socialbot Network (SbN): a group of coordinated programmable socialbots. We operated our prototype on Facebook for 8 weeks, and collected data about user behavior in response to a large-scale infiltration campaign. Our results show that (1) by exploiting known social behaviors of users, OSNs such as Facebook can be infiltrated with a success rate of up to 80%, (2) subject to user profile privacy settings, a successful infiltration can result in privacy breaches where even more private user data are exposed, (3) given the economics of today's underground markets, running a large-scale infiltration campaign might be profitable but is still not particularly attractive as a sustainable and independent business, (4) the security of socially-aware systems that use or integrate OSN platforms can be at risk, given the infiltration capability of an adversary in OSNs, and (5) defending against malicious socialbots raises a set of challenges that relate to web automation, online-offline identity binding, and usable security. (c) 2012 Elsevier BM. All rights reserved.
引用
收藏
页码:556 / 578
页数:23
相关论文
共 110 条
[51]   Social phishing [J].
Jagatic, Tom N. ;
Johnson, Nathaniel A. ;
Jakobsson, Markus ;
Menczer, Filippo .
COMMUNICATIONS OF THE ACM, 2007, 50 (10) :94-100
[52]   Remotely Telling Humans and Computers Apart: An Unsolved Problem [J].
Javier Hernandez-Castro, Carlos ;
Ribagorda, Arturo .
INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2009, 309 :9-26
[53]  
Josang A., 2009, Challenges for Robust Trust and Reputation Systems
[54]  
Kanich Chris., 2011, PROC USENIX SECURITY, P15
[55]   Users of the world, unite! The challenges and opportunities of Social Media [J].
Kaplan, Andreas M. ;
Haenlein, Michael .
BUSINESS HORIZONS, 2010, 53 (01) :59-68
[56]  
Kartaltepe EJ, 2010, LECT NOTES COMPUT SC, V6123, P511, DOI 10.1007/978-3-642-13708-2_30
[57]  
Kim H., 2012, P 2012 CRYPT DAT SEC
[58]  
Lampe C., 2006, P 2006 20 ANN C COMP, P167, DOI [DOI 10.1145/1180875.1180901, 10.1145/1180875.1180901]
[59]  
Lampe C, 2008, CSCW: 2008 ACM CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK, CONFERENCE PROCEEDINGS, P721
[60]  
Lauinger T., 2010, P 3 USENIX C LARG SC, P11