Skip to main content

Antisocial Networks: Turning a Social Network into a Botnet

  • Conference paper
Information Security (ISC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5222))

Included in the following conference series:

  • 1716 Accesses

Abstract

Antisocial Networks are distributed systems based on social networking Web sites that can be exploited by attackers, and directed to carry out network attacks. Malicious users are able to take control of the visitors of social sites by remotely manipulating their browsers through legitimate Web control functionality such as image-loading HTML tags, JavaScript instructions, etc. In this paper we experimentally show that Social Network web sites have the ideal properties to become attack platforms.

We start by identifying all the properties of Facebook, a real-world Social Network, and then study how we can utilize these properties and transform it into an attack platform against any host connected to the Internet. Towards this end, we developed a real-world Facebook application that can perform malicious actions covertly. We experimentally measured it’s impact by studying how innocent Facebook users can be manipulated into carrying out a Denial-of-Service attack. Finally, we explored other possible misuses of Facebook and how they can be applied to other online Social Network web sites.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Facebook Analytics and Advertising, http://adonomics.com

  2. Facebook Statistics, http://www.facebook.com/press/info.php?statistics

  3. Geo IP Tool, http://www.geoiptool.com

  4. Hackers crash the Social Networking Party, http://www.pcworld.com/article/id,127347-page,1-c,internettips/article.html

  5. Identity ’at risk’ on Facebook, http://news.bbc.co.uk/2/hi/programmes/click_online/7375772.stm

  6. National Geographic Content Usage, http://www.nationalgeographic.com/community/terms.html#content

  7. National Geographic Photo of the Day Utility, http://photography.nationalgeographic.com/photography/photo-of-the-day

  8. Photo of the Day, http://www.facebook.com/apps/application.php?id=8752912084

  9. Ahn, Y.-Y., Han, S., Kwak, H., Moon, S., Jeong, H.: Analysis of Topological Characteristics of Huge Online Social Networking Sites. In: Proceedings of the 16th International Conference on World Wide Web, (May 2007)

    Google Scholar 

  10. Athanasopoulos, E., Anagnostakis, K.G., Markatos, E.P.: Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 130–145. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Backstrom, L., Huttenlocher, D., Kleinberg, J., Lan, X.: Group Formation in Large Social Networks: Membership, Growth, and Evolution. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2006), (August 2006)

    Google Scholar 

  12. Defrawy, K.E., Gjoka, M., Markopoulou, A.: Bottorrent: Misusing bittorrent to launch ddos attacks. In: Proceedings of the USENIX 3rd Workshop on Steps Towards Reducing Unwanted Traffic on the Internet (SRUTI) (2007)

    Google Scholar 

  13. Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: CHI 2006: Proceedings of the SIGCHI conference on Human Factors in com puting systems, pp. 581–590. ACM Press, New York (2006)

    Chapter  Google Scholar 

  14. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)

    Google Scholar 

  15. Halavais, A.: The Slashdot Effect: Analysis of a Large-Scale Public Conversation on the World Wide Web (2001)

    Google Scholar 

  16. Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94–100 (2007)

    Article  Google Scholar 

  17. Lam, V.T., Antonatos, S., Akritidis, P., Anagnostakis, K.G.: Puppetnets: misusing web browsers as a distributed attack infrastructure. In: CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security, pp. 221–234. ACM, New York (2006)

    Chapter  Google Scholar 

  18. Mislove, A., Marcon, M., Gummadi, K.P., Drushcel, P., Bhattacharjee, B.: Measurement and Analysis of Online Social Networks. In: Proceedings of the Internet Measurements Conference (IMC 2007) (2007)

    Google Scholar 

  19. Naoumov, N., Ross, K.: Exploiting P2P systems for DDoS attacks. In: InfoScale 2006: Proceedings of the 1st international conference on Scalable information systems, p. 47. ACM Press, New York (2006)

    Chapter  Google Scholar 

  20. Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. SIGCOMM Comput. Commun. Rev. 31(3), 38–47 (2001)

    Article  Google Scholar 

  21. Steiner, M., Biersack, E.W., En-Najjary, T.: Exploiting kad: Possible uses and misuses. Computer Communication Review 37(5) (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tzong-Chen Wu Chin-Laung Lei Vincent Rijmen Der-Tsai Lee

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Athanasopoulos, E. et al. (2008). Antisocial Networks: Turning a Social Network into a Botnet. In: Wu, TC., Lei, CL., Rijmen, V., Lee, DT. (eds) Information Security. ISC 2008. Lecture Notes in Computer Science, vol 5222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85886-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85886-7_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85884-3

  • Online ISBN: 978-3-540-85886-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics