36
Laboratory for Education and Research in Secure Systems Engineering (LERSSE) Networked Systems Laboratory (NetSysLab) Department of Electrical & Computer Engineering Key Challenges in Defending Against Malicious Socialbots Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu Position Paper

Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Laboratory for Education and Research in Secure Systems Engineering (LERSSE)

Networked Systems Laboratory (NetSysLab)

Department of Electrical & Computer Engineering

Key Challenges in Defending Against

Malicious Socialbots

Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu

Position Paper

Page 2: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Outline

2

Problem Motivation

Socialbots

OSN Security Challenges

Page 3: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

3

Problem Motivation

Page 4: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Reaching Out to Millions

4 (Source: Jose Vargas, Voices on The Washington Post, November, 2008)

Obama Raised Half a Billion Online in 2008

Page 5: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Mobilizing the Masses

5

Photo credit: Peter Macdiarmid, Getty Images Photo credit: Steve Crisp, Reuters

The Arab Spring, January 2011 - Now

Salem et al. Civil movements: The impact of Facebook and Twitter. The Arab Social Media Report, 2011

Page 6: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Predicting the Future: Elections

0%

5%

10%

15%

20%

25%

30%

35%

40%

YouGov Tweetminster Actual

ConservativeLib DemLabour

Twitter elections predictions (Tweetminster) outperform market research (YouGov)

(Source: Jemima Koss, The Guardian, May 2010)

2010 UK General Elections

Page 7: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Predicting the Future: Markets

7

Twitter mood (Calm) predicts Dow Jones Industrial Average (DJIA)

Bollen et al. Twitter mood predicts the stock market. J. Comp. Sc. March, 2011.

Day-to-day Overlap

Calm lagged by 3 days

Page 8: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

8

Socialbots

Page 9: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Bots and Socialbots

+

Automation software

(to pass off as human)

Social media account

Socialbot

Computer program used to perform highly repetitive operations (AI?)

9

Page 10: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Rise of the Socialbots

10

The Web Ecology Project (Social Engineering), 2011

Zack Coburn and Greg Marra, Olin College, 2010

ACM Interactions Magazine Cover Story, April 2012

Page 11: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Misusing Socialbots on a Large Scale?

11

Infiltration Misinformation Data collection

An automated social engineering tool for:

Boshmaf et al. The Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11

Page 12: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

13

OSN Security

Page 13: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

14

Tolerate Socialbots

Page 14: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Adversarial Machine Learning

Facebook Immune System

Tao Stein

Facebook

[email protected]

Erdong Chen

Facebook

[email protected]

Karan Mangla

Facebook

[email protected]

Abstract

Popular Internet sites are under attack all the time from phishers,fraudsters, and spammers. They aim to steal user information andexpose users to unwanted spam. The attackers have vast resourcesat their disposal. They arewell-funded, with full-time skilled labor,control over compromised and infected accounts, and access toglobal botnets. Protecting our users is a challenging adversariallearning problem with extreme scale and load requirements. Overthe past several years we have built and deployed a coherent,scalable, and extensible realtime system to protect our users andthe social graph. This Immune System performs realtime checksand classifications on every read and write action. As of March2011, this is25B checksper day, reaching 650K per second at peak.The system also generates signals for use as feedback in classifiersand other components. We believe this system has contributed tomaking Facebook the safest place on the Internet for people andtheir information. This paper outlines the design of the FacebookImmune System, the challenges we have faced and overcome, andthe challenges wecontinue to face.

Keywords Machine Learning, Adversarial Learning, Security,Social Network Security

1. Introduction

TheFacebook social graph compriseshundreds of millionsof usersand their relationships with each other and with objects such asevents, pages, places, and apps. The graph is an attractive targetfor attackers. Attackers target it to gain access to information or toinfluenceactions. They can attack the graph in two ways: either bycompromising existing graph nodes or by injecting new fakenodesand relationships. Protecting the graph is a challenging problemwith both algorithmic and systems components.

Algorithmically, protecting the graph is an adversarial learningproblem. Adversarial learning differs from more traditional learn-ing in one important way: the attacker creating thepattern does notwant thepattern to be learned. For many learning problems thepat-tern creator wants better learning and the interests of the learnerand thepattern creator arealigned and thepattern creator may evenbe oblivious to the efforts of the learner. For example, the receiverof ranked search results wants better search ranking and may beoblivious to the efforts being done to improve ranking. The patterncreator will not actively work to subvert the learning and may even

Permission to make digital or hard copies of all or part of this work for personal orclassroom use is granted without fee provided that copies are not made or distributedfor profit or commercial advantage and that copies bear this notice and the full citationon the first page. To copy otherwise, to republish, to post on servers or to redistributeto lists, requires prior specific permission and/or a fee.

EuroSys Social Network Systems (SNS) 2011 April 10, 2011, SalzburgCopyright c 2011 ACM Jan 1, 2011. . .$10.00

voluntarily give hints to aid learning. In adversarial learning, theattacker works to hide patterns and subvert detection. To be effec-tive, the system must respond fast and target the features that aremost expensive for the attacker to change, being careful also not tooverfit on the superficial features that are easy for the attacker tochange.

Attacker

Detects

Defender

Responds

Begin

Attack

Initial

Detection

Attacker Controls

Defender Controls

Attack Detect

Defense Mutate

Figure 1. The adversar ial cycle.This diagram shows the adversarial cycle. The attacker controls the upper

phasesand thedefender controls thebottom phases. In both Attack and De-

tect phases theattacker isonly limited by its own resourcesand global rate-

limits. During Attack, the attack has not yet been detected and is largely

unfettered. During Detect, the attack has been detected but the system is

forming a coherent response. This includes the time to train a model or ex-

pand theset of bad attack vectorsand upload thepatterns to onlineclassifier

services. The response can form continuously with some models being de-

ployed earlier than others. During Defense, theattack hasbeen rendered in-

effective. The attacker may eventually detect this and begin Mutate to work

around the defense mechanism. This cycle can repeat indefinitely. The de-

fender seeks to shorten Attack and Detect while lengthening Defense and

Mutate. Theattacker seeks theopposite, to shorten thebottom phaseswhile

lengthening Attack and Detect. This cycle illustrates why detection and re-

sponse latencies are so important for effective defense.

Adversarial learning is a cyclical process shown in Figure 1.An example will make the process more concrete. Several yearsago phishers would attack the graph using spammy messages withpredictable subject lines. The messages included links to phishingsites. They sent out these messages repeatedly from compromisedaccounts to hundreds of friends of the compromised accounts. Thepredictable text patterns and volume made these straightforward todetect and filter. To overcomethisfiltering, attackersobfuscated byinserting punctuation, HTML tags, and images into their messages.Aswell, theattackersvaried their distribution channels to evadede-tection. The system responded to this by using mark as spam feed-

15 Stein et al., The Facebook Immune System, EuroSys – SNS, 2011

Page 15: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Graph-theoretic Defense Techniques

16

Honest region

Sybil region

Attack edges

Sybil detection via social networks1

With adversary running large-scale infiltration2

Honest node

1 Haifeng Yu. Sybil Defenses via Social Networks: A Tutorial and Survey. ACM SIGACT News’11 2 Boshmaf et al. The Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11

Page 16: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

17

Prevent Socialbots

Page 17: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Observation: It’s all about automation Prevent it and the socialbot threat will go away (almost surely) Not an easy job!

18

Page 18: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

19

Challenges

Solve at least one

Page 19: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

OSN Vulnerabilities: Ineffective CAPTCHAs

20

Koobface Botnet CAPTCHA-solving businesses

Page 20: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

#1

21

Design a reverse Turing test that is usable and effective even against “illegitimate” human solvers

Page 21: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

How about Social Authentication?

22

An'Example'Use “personal” social knowledge to challenge users

Kim et al. Social authentication: Harder than it looks. FC’12

Page 22: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

23

Page 23: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

OSN Vulnerabilities: Fake (Sybil) User Accounts and Profiles

24

Page 24: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

#2

25

Guarantee an anonymous, yet credible, online-offline identity binding in online and open-access systems

Page 25: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

How can we deal with Sybils?

26

Centralized trusted authority

Tie identities to resources

Use external information

Page 26: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

OSN Vulnerabilities: Large-Scale Network Crawls

27

Page 27: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

#3

28

Effectively limit large-scale Sybil crawls of OSNs without restricting users’ social experience.

Page 28: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

How about using a credit network?

29

Page 29: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Small edge cut

Assumption #1

Assumption #2

30

Page 30: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

OSN Vulnerabilities: Exploitable Platforms and APIs

31

Page 31: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

#4

32

Detect abusive and automated usage of OSN platforms and their social APIs across the Internet

Page 32: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

OSN Vulnerabilities: Poorly Designed Privacy/Security Controls

33

Page 33: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

#5

34

Develop usable OSN security and privacy controls that help users make more informed decisions

Page 34: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

35

Page 35: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

Take-home message(s)

• Large-scale infiltration is feasible – has serious privacy and security implications

• Socialbots make it difficult for OSN security

defenses and their users to detect their true nature – defending against such bots raises a set of

unique challenges

• Effective, socio-technical defenses less vulnerable to both human and technical exploits are needed

36

Page 36: Key Challenges in Defending Against Malicious …ece.ubc.ca/~matei/papers/leet.slides.2012.pdfThe Socialbot Network: When Bots Socialize for Fame and Money. ACSAC’11 13 OSN Security

37

Yazan

Boshmaf

Ildar Muslukhov

Konstantin Beznosov

Matei Ripeanu

Key Challenges in Defending Against Malicious Socialbots

Funded by: