14
Enhancing and Identifying Cloning Attacks in Online Social Networks Zifei Shan, Haowen Cao, Jason Lv, Cong Yan, Annie Liu Peking University, China 1

Enhancing and Identifying Cloning Attacks in Online Social Networks

  • Upload
    aleron

  • View
    66

  • Download
    0

Embed Size (px)

DESCRIPTION

Enhancing and Identifying Cloning Attacks in Online Social Networks. Zifei Shan , Haowen Cao, Jason Lv , Cong Yan, Annie Liu Peking University, China. Outline. Motivation Background: Cloning Attack An enhanced attack pattern Experiment: Attacking Renren Detecting Cloning Attacks - PowerPoint PPT Presentation

Citation preview

Page 1: Enhancing and Identifying Cloning Attacks  in Online Social Networks

1

Enhancing and Identifying Cloning Attacks

in Online Social NetworksZifei Shan, Haowen Cao, Jason Lv, Cong Yan,

Annie LiuPeking University, China

Page 2: Enhancing and Identifying Cloning Attacks  in Online Social Networks

2

Motivation Background: Cloning Attack An enhanced attack pattern Experiment: Attacking Renren Detecting Cloning Attacks Conclusion

Outline

Page 3: Enhancing and Identifying Cloning Attacks  in Online Social Networks

3

Online Social Networks◦ Security Problems!

Cloning Attack

Motivation

Jack Clone “Jack”

Clone profile Friend request

Jack’s Friends

Page 4: Enhancing and Identifying Cloning Attacks  in Online Social Networks

4

Cloning Attack

Jack Jack’s Partial Friend list

Attacker

Clone “Jack”Peek, get a

partial friend list

Create

Clone profile

Friend request: I am another ID of Jack!

Cheated, add back

Page 5: Enhancing and Identifying Cloning Attacks  in Online Social Networks

5

Enhanced Cloning Attack: Snowball Sampling

Jack Jack’s Friends

Attacker

Clone “Jack”

Other Friends In the community

Friend request: I am another ID of Jack!

Common friends

Easier to get cheated

Page 6: Enhancing and Identifying Cloning Attacks  in Online Social Networks

6

Enhanced Cloning Attack: Iteration Attack

Jack Jack’s Friends

Attacker

Clone “Jack”

Create

Other users in the community

Friend request

Clone “Alice”Clone “Bob”

Alice Bob

Clone profile of

Jack’s friends

Page 7: Enhancing and Identifying Cloning Attacks  in Online Social Networks

7

Renren: Chinese largest online social network

We conduct a series of experiments to test the threat of traditional sybil attacks, original cloning attacks, and improved cloning attacks.

Experiments: Attacking Renren

Experiment

different attack

patterns

Page 8: Enhancing and Identifying Cloning Attacks  in Online Social Networks

8

Statistics

Traditional Sybil Attack

Basic Cloning Attack Cloning + Snowball Sampling

Profile similarity

N/A Low Medium High Low

Accepted requests (avg.) (%)

11.3% 26.3% 47.1% 45.8% 52.1%

Experiment Results

1.Cloning attack is much powerful than traditional sybil attacks2.Snowball sampling makes cloning attack stronger3.Higher profile similarity leads to more successful attacks

Page 9: Enhancing and Identifying Cloning Attacks  in Online Social Networks

9

Real-time, server-side, lightweight detector to be deployed into real OSNs.

Initial Filter: (Called on friend requests)◦ Same name ◦ >5 common friends (requests)◦ High profile similarity

school, city… tweets, blogs…

Judging Condition --- Login IP Sequence◦ Login IP Sequence of two IDs

Joint: another real account Disjoint: cloning account

CloneSpotter: Real-Time Content-free Detector

Page 10: Enhancing and Identifying Cloning Attacks  in Online Social Networks

10

CloneSpotter: Architecture

Jack Jack’s Friend

Another “Jack”Friend request: I am another ID of Jack!

Check:1. High profile

similarity with Jack?2. Disjoint login IP

sequence with Jack?

Ban this ID!

83.24.*.*167.31.*.*162.105.*.*

90.25.*.*87.200.*.*

Birthday: 10/20/1990, EECS, Peking University

Birthday: 10/20/1990, EECS, Peking University

Page 11: Enhancing and Identifying Cloning Attacks  in Online Social Networks

11

Strengths:◦ Real-time: called on friend requests◦ low cost:

Storage: need login IP sequence for users Time: O(d) for each incoming request, d is social

degree Weaknesses:

◦ Vulnerable against IP spoofing

Evaluation of CloneSpotter

Page 12: Enhancing and Identifying Cloning Attacks  in Online Social Networks

“All your contacts are belong to us: automated identity theft attacks on social networks”, Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda, in Proceedings of the 18th international conference on World wide web (WWW ‘09)

12

Contributions

Define the cloning attack pattern

Test attack feasibility in a real system (Facebook)Enhance the cloning attack pattern by Snowball sampling and Iteration attacksExperiments of improved cloning attacks in real OSN (Renren)

Provide effective defense methods to detect cloning attacks

Our Contribution

Previous Work

Page 13: Enhancing and Identifying Cloning Attacks  in Online Social Networks

13

Deploy into real systems Measure detected users

◦ Action patterns◦ Malicious activities

Further detecting methods◦ Content-free: User action logs, Click-patterns,

Action Time◦ Content-related: semantics analysis

Future work

Page 14: Enhancing and Identifying Cloning Attacks  in Online Social Networks

14

Thanks!Contact: Zifei ShanPeking University, [email protected]://www.zifeishan.org