Abstract
Antisocial Networks are distributed systems based on social networking Web sites that can be exploited by attackers, and directed to carry out network attacks. Malicious users are able to take control of the visitors of social sites by remotely manipulating their browsers through legitimate Web control functionality such as image-loading HTML tags, JavaScript instructions, etc. In this paper we experimentally show that Social Network web sites have the ideal properties to become attack platforms.
We start by identifying all the properties of Facebook, a real-world Social Network, and then study how we can utilize these properties and transform it into an attack platform against any host connected to the Internet. Towards this end, we developed a real-world Facebook application that can perform malicious actions covertly. We experimentally measured it’s impact by studying how innocent Facebook users can be manipulated into carrying out a Denial-of-Service attack. Finally, we explored other possible misuses of Facebook and how they can be applied to other online Social Network web sites.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Facebook Analytics and Advertising, http://adonomics.com
Facebook Statistics, http://www.facebook.com/press/info.php?statistics
Geo IP Tool, http://www.geoiptool.com
Hackers crash the Social Networking Party, http://www.pcworld.com/article/id,127347-page,1-c,internettips/article.html
Identity ’at risk’ on Facebook, http://news.bbc.co.uk/2/hi/programmes/click_online/7375772.stm
National Geographic Content Usage, http://www.nationalgeographic.com/community/terms.html#content
National Geographic Photo of the Day Utility, http://photography.nationalgeographic.com/photography/photo-of-the-day
Photo of the Day, http://www.facebook.com/apps/application.php?id=8752912084
Ahn, Y.-Y., Han, S., Kwak, H., Moon, S., Jeong, H.: Analysis of Topological Characteristics of Huge Online Social Networking Sites. In: Proceedings of the 16th International Conference on World Wide Web, (May 2007)
Athanasopoulos, E., Anagnostakis, K.G., Markatos, E.P.: Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 130–145. Springer, Heidelberg (2006)
Backstrom, L., Huttenlocher, D., Kleinberg, J., Lan, X.: Group Formation in Large Social Networks: Membership, Growth, and Evolution. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2006), (August 2006)
Defrawy, K.E., Gjoka, M., Markopoulou, A.: Bottorrent: Misusing bittorrent to launch ddos attacks. In: Proceedings of the USENIX 3rd Workshop on Steps Towards Reducing Unwanted Traffic on the Internet (SRUTI) (2007)
Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: CHI 2006: Proceedings of the SIGCHI conference on Human Factors in com puting systems, pp. 581–590. ACM Press, New York (2006)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
Halavais, A.: The Slashdot Effect: Analysis of a Large-Scale Public Conversation on the World Wide Web (2001)
Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94–100 (2007)
Lam, V.T., Antonatos, S., Akritidis, P., Anagnostakis, K.G.: Puppetnets: misusing web browsers as a distributed attack infrastructure. In: CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security, pp. 221–234. ACM, New York (2006)
Mislove, A., Marcon, M., Gummadi, K.P., Drushcel, P., Bhattacharjee, B.: Measurement and Analysis of Online Social Networks. In: Proceedings of the Internet Measurements Conference (IMC 2007) (2007)
Naoumov, N., Ross, K.: Exploiting P2P systems for DDoS attacks. In: InfoScale 2006: Proceedings of the 1st international conference on Scalable information systems, p. 47. ACM Press, New York (2006)
Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. SIGCOMM Comput. Commun. Rev. 31(3), 38–47 (2001)
Steiner, M., Biersack, E.W., En-Najjary, T.: Exploiting kad: Possible uses and misuses. Computer Communication Review 37(5) (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Athanasopoulos, E. et al. (2008). Antisocial Networks: Turning a Social Network into a Botnet. In: Wu, TC., Lei, CL., Rijmen, V., Lee, DT. (eds) Information Security. ISC 2008. Lecture Notes in Computer Science, vol 5222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85886-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-85886-7_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85884-3
Online ISBN: 978-3-540-85886-7
eBook Packages: Computer ScienceComputer Science (R0)