SlideShare a Scribd company logo
Software Insecurity Distribution
Through Social Networking
by
Alireza Aghamohammadi
Samir Tout (Ph.D.)
Graduate Research Fair

March 17, 2010
Quick preview
- Introduction
- Background
B. Background Social Network
A. Background Software Insecurity
- Core Topic
A. Virus propagation via communication
in social networks
B. Applications and tools of social
networking a device for insecurity
Quick preview, cntd..
C. Automated social networks bots,
crawler, spider, scanners and sniffers
- Conclusion
Introduction
- Information Security Challenges
A. Complexity while being dynamic
B. Multiplicity
- Internet Growth
A. Share, learn …
B. Vulnerabilities and information insecurity
(examples ?)
C. Data mining increase
Introduction, cntd..
According to Solomon Eyal Shimony and
Natalia Vanetik, (2008, p. 1441)

- Social Network Analysis and Social
Networking increase.
Introduction , cntd..
- Researchers use of social network analysis
and Data Mining studies.
- Many risks associated with social
networking.
- let’s examine how software insecurity can be
distributed via social networking.
Background social network
1920 - Kurt Lewin
1960 - Anthropological study of kinship
systems
1997 - Medical researchers
2008 - social networking represents a
novel approach to the approximate similarity
query processing
Background software insecurity
- Personal Computers
- Sharing Floppy disks
- Early 1970s
- Internet
- Today ?
Background software insecurity
Botrobot

Key
logger

Spam

adware

spyware

botnets

trojan
sql
injectors

Phishing
+Pharming
Definitions
- Social networking: a network of entities which
have properties, actions and (direct or
indirect) communication. Entities could be
humans, computers or other beings or things.
However, in this paper social networking
refers to none-physical social networking in
most cases.
Definitions , cntd..
- Software insecurity: this is referred to any
system weakness, failure, risk or functionality
problems due to poor software quality or
malfunction as it pertains to security only.
Bot or Robots: are automated programs to do
various functionalities including collecting
data.
Definitions , cntd..
- Web crawler: are a form of bot which run on
web to search for data or perform other
searching tasks on webs sites.
-Trojan: it is a software that may appear as
something useful on the computer but it
actually is a harmful software.
-Virus: is a computer program/code that
performs harmful activities. Virus will spread
unlike Trojans.
Core topic
1.Virus propagation via communication in
social networks
- facebook, linkedin, twitter
- staying connected and find new friends
- risks ?
Social network and transmitting software
insecurity
A: flash drive, CD/DVD
B:emails, social network sites, SMS, IM, Posts
Core topic , cntd..
1.Virus propagation via communication in
social networks
A. Lack of virus scan for social networking
sites.
B. IM, SMS and Images as a medium.
applications for social networking sites do not
have the functionality to prevent insecurity
propagation to other users or encrypt users
contact lists and information.
Core topic , cntd..
1.Virus propagation via communication in
social networks
C. Hand held devices and cell phones have
applications for social networking ! another
method to propagate .
Core topic , cntd..
2. Applications and tools of social
networking a device for insecurity
Type A (does not require local installation ):
tools for entertainment, gaming or simply for
fun. Examples:
- Facebook - Who Has The Biggest Brain?
- Orkut -MindJolt Games
- Myspace –Mobsters
Problem ? application could be a host to
infect other computers.
2. Applications and tools of social
networking a device for insecurity
Type B:
Collaborations or sharing tools
•
Google -groups.google.com
•
Google- google docs
•
Yahoo-groups.yahoo.com
Problem : infected macros or viruses can get
propagated via social networking
2. Applications and tools of social
networking a device for insecurity
Type C:
The API or tools created by other third parties
to allow users to take full advantage of social
networking.
http://www.digsby.com/
(works with facebook, twitter, myspace)
http://www.meebo.com/notifier/
(works with facebook, AIM, MSN, Yahoo)
Problem : channels of insecurity distribution.
3. Automated social networks bots,
crawler, spider, scanners and sniffers
- Many bots or robots which automatically can
crawl into various social network sites and
perform data gathering and even analysis to
launch attacks on user’s computer or host .
Web crawler/spider
demo
A research of software vulnerabilities
3. Automated social networks bots,
crawler, spider, scanners and sniffers,
cntd..
- Collecting data from users profile or
gaining access to an individual account will
allow hackers to attack and harm computers
or systems indirectly.
So, how is it going to create software
insecurity ?
3. Automated social networks bots,
crawler, spider, scanners and sniffers ,
cntd..
•
create crawler
•
launch crawler to collect data
•
analyze data
•
attempt to hack users profile
•
send emails or invitations to other to
open a file or visit a website
Conclusion
•
Social networking has become a
medium of communication for many
Internet users.
•
However, there are many ways which
social networking allows for software
insecurity distribution.
Reference
Gudes, E., Shimony, S., Member, & Vanetik,
N. (2006). Discovering frequent graph
patterns using disjoint paths. IEEE
Computer Society, 18(11), November 1,
2009. doi:10.1109/TKDE.2006.173

More Related Content

PPT
Dan Trottier
PDF
Jan 2012 Threats Trend Report
PPTX
The issues of security and privacy in social network
PDF
Security threats and trends topic-3
PPTX
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
PPTX
Security threats and trends-topic 2
PDF
Insecure trends in web technologies 2009
PPTX
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
Dan Trottier
Jan 2012 Threats Trend Report
The issues of security and privacy in social network
Security threats and trends topic-3
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
Security threats and trends-topic 2
Insecure trends in web technologies 2009
1 empowerment technology_by_rey_anthon_&_elma_mea[1]

What's hot (20)

PDF
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
DOCX
Spammer detection and fake user Identification on Social Networks
PPTX
The Networked Creativity in the Censored Web 2.0
PPTX
Empowerment technology by: Irene Petere
PDF
Inappropriate use of the network ppt
PPTX
Blogging today
PPT
Safety And Security on the Net Podcast
PPTX
Project work
PPT
Protecting Your Campus With Shared Intelligence
PPT
Sifting through twitter
PPTX
DOCX
PPTX
CYBERBULLY IDENTIFICATION SYSTEM
PPTX
Empowerment technology Josua De Guzman and Chariza
PPT
Ibm risk management-30min
PPT
Internet Research
PPTX
Melanie g done 6565
PPT
Twitter tweet presentation_2011
PPTX
Privacy on the internet presentation_kf_final
PPTX
Empowerment technology Grecille Mae Gesulga and Catalino
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
Spammer detection and fake user Identification on Social Networks
The Networked Creativity in the Censored Web 2.0
Empowerment technology by: Irene Petere
Inappropriate use of the network ppt
Blogging today
Safety And Security on the Net Podcast
Project work
Protecting Your Campus With Shared Intelligence
Sifting through twitter
CYBERBULLY IDENTIFICATION SYSTEM
Empowerment technology Josua De Guzman and Chariza
Ibm risk management-30min
Internet Research
Melanie g done 6565
Twitter tweet presentation_2011
Privacy on the internet presentation_kf_final
Empowerment technology Grecille Mae Gesulga and Catalino
Ad

Similar to A research of software vulnerabilities (20)

PPTX
_1ST-DAY_1ST-DAY._1ST-DAY._1ST-DAY..pptx
PPTX
Brandon + Eddie users guide phi 235
PPTX
PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL N...
DOCX
REVIEWER-FOR-ETECH.docx
DOCX
REVIEWER-FOR-ETECH.docx
DOCX
REVIEWER ETECH
DOCX
REVIEWER-FOR-ETECH (1).docx
DOCX
REVIEWER-FOR-ETECH.docx
DOCX
REVIEWER-FOR-ETECH (1).docx
DOCX
REVIEWER-FOR-ETECH.docx
DOCX
Empowerment Technology
PPTX
Social Media Security
PPT
Oman presentation revised
PDF
Social networking
PDF
Social Networking Information Security
PPTX
Social Media And It's Effect on Security
PPTX
etech ppt.pptxjhgkjiuyiopopioyuydrtstsrtyrrr
PPTX
Social groups for awareness
PPTX
Netiquette, Safety in using the internet
PPTX
Social media-threats
_1ST-DAY_1ST-DAY._1ST-DAY._1ST-DAY..pptx
Brandon + Eddie users guide phi 235
PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL N...
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
REVIEWER ETECH
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH.docx
Empowerment Technology
Social Media Security
Oman presentation revised
Social networking
Social Networking Information Security
Social Media And It's Effect on Security
etech ppt.pptxjhgkjiuyiopopioyuydrtstsrtyrrr
Social groups for awareness
Netiquette, Safety in using the internet
Social media-threats
Ad

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Getting Started with Data Integration: FME Form 101
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
1. Introduction to Computer Programming.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
A Presentation on Artificial Intelligence
PPTX
Tartificialntelligence_presentation.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Machine Learning_overview_presentation.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
August Patch Tuesday
PDF
Empathic Computing: Creating Shared Understanding
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Getting Started with Data Integration: FME Form 101
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectroscopy.pptx food analysis technology
1. Introduction to Computer Programming.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A Presentation on Artificial Intelligence
Tartificialntelligence_presentation.pptx
Encapsulation theory and applications.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Programs and apps: productivity, graphics, security and other tools
Group 1 Presentation -Planning and Decision Making .pptx
Machine Learning_overview_presentation.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
August Patch Tuesday
Empathic Computing: Creating Shared Understanding
Assigned Numbers - 2025 - Bluetooth® Document
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction

A research of software vulnerabilities

  • 1. Software Insecurity Distribution Through Social Networking by Alireza Aghamohammadi Samir Tout (Ph.D.) Graduate Research Fair March 17, 2010
  • 2. Quick preview - Introduction - Background B. Background Social Network A. Background Software Insecurity - Core Topic A. Virus propagation via communication in social networks B. Applications and tools of social networking a device for insecurity
  • 3. Quick preview, cntd.. C. Automated social networks bots, crawler, spider, scanners and sniffers - Conclusion
  • 4. Introduction - Information Security Challenges A. Complexity while being dynamic B. Multiplicity - Internet Growth A. Share, learn … B. Vulnerabilities and information insecurity (examples ?) C. Data mining increase
  • 5. Introduction, cntd.. According to Solomon Eyal Shimony and Natalia Vanetik, (2008, p. 1441) - Social Network Analysis and Social Networking increase.
  • 6. Introduction , cntd.. - Researchers use of social network analysis and Data Mining studies. - Many risks associated with social networking. - let’s examine how software insecurity can be distributed via social networking.
  • 7. Background social network 1920 - Kurt Lewin 1960 - Anthropological study of kinship systems 1997 - Medical researchers 2008 - social networking represents a novel approach to the approximate similarity query processing
  • 8. Background software insecurity - Personal Computers - Sharing Floppy disks - Early 1970s - Internet - Today ?
  • 10. Definitions - Social networking: a network of entities which have properties, actions and (direct or indirect) communication. Entities could be humans, computers or other beings or things. However, in this paper social networking refers to none-physical social networking in most cases.
  • 11. Definitions , cntd.. - Software insecurity: this is referred to any system weakness, failure, risk or functionality problems due to poor software quality or malfunction as it pertains to security only. Bot or Robots: are automated programs to do various functionalities including collecting data.
  • 12. Definitions , cntd.. - Web crawler: are a form of bot which run on web to search for data or perform other searching tasks on webs sites. -Trojan: it is a software that may appear as something useful on the computer but it actually is a harmful software. -Virus: is a computer program/code that performs harmful activities. Virus will spread unlike Trojans.
  • 13. Core topic 1.Virus propagation via communication in social networks - facebook, linkedin, twitter - staying connected and find new friends - risks ? Social network and transmitting software insecurity A: flash drive, CD/DVD B:emails, social network sites, SMS, IM, Posts
  • 14. Core topic , cntd.. 1.Virus propagation via communication in social networks A. Lack of virus scan for social networking sites. B. IM, SMS and Images as a medium. applications for social networking sites do not have the functionality to prevent insecurity propagation to other users or encrypt users contact lists and information.
  • 15. Core topic , cntd.. 1.Virus propagation via communication in social networks C. Hand held devices and cell phones have applications for social networking ! another method to propagate .
  • 16. Core topic , cntd.. 2. Applications and tools of social networking a device for insecurity Type A (does not require local installation ): tools for entertainment, gaming or simply for fun. Examples: - Facebook - Who Has The Biggest Brain? - Orkut -MindJolt Games - Myspace –Mobsters Problem ? application could be a host to infect other computers.
  • 17. 2. Applications and tools of social networking a device for insecurity Type B: Collaborations or sharing tools • Google -groups.google.com • Google- google docs • Yahoo-groups.yahoo.com Problem : infected macros or viruses can get propagated via social networking
  • 18. 2. Applications and tools of social networking a device for insecurity Type C: The API or tools created by other third parties to allow users to take full advantage of social networking. http://www.digsby.com/ (works with facebook, twitter, myspace) http://www.meebo.com/notifier/ (works with facebook, AIM, MSN, Yahoo) Problem : channels of insecurity distribution.
  • 19. 3. Automated social networks bots, crawler, spider, scanners and sniffers - Many bots or robots which automatically can crawl into various social network sites and perform data gathering and even analysis to launch attacks on user’s computer or host . Web crawler/spider demo
  • 21. 3. Automated social networks bots, crawler, spider, scanners and sniffers, cntd.. - Collecting data from users profile or gaining access to an individual account will allow hackers to attack and harm computers or systems indirectly. So, how is it going to create software insecurity ?
  • 22. 3. Automated social networks bots, crawler, spider, scanners and sniffers , cntd.. • create crawler • launch crawler to collect data • analyze data • attempt to hack users profile • send emails or invitations to other to open a file or visit a website
  • 23. Conclusion • Social networking has become a medium of communication for many Internet users. • However, there are many ways which social networking allows for software insecurity distribution.
  • 24. Reference Gudes, E., Shimony, S., Member, & Vanetik, N. (2006). Discovering frequent graph patterns using disjoint paths. IEEE Computer Society, 18(11), November 1, 2009. doi:10.1109/TKDE.2006.173

Editor's Notes

  • #5: -Information security has been very important to personal, corporate computer users, engineers, Information security experts and researchers for many yearsInformation Security is complex and dynamic because every day at least a new threat is explored by hackers and new viruses are created for various operating systems or software. Furthermore, it is important to recognize security is not just one dimensional and has various aspects and types. For example, just installing anti-virus software will not resolve all security problems. It is critical to address and consider all variety of security risks in order to prevent, detect and manage security vulnerabilities in a comprehensive manner.
  • #8: 1920 : according to Helen Northen, Roselle Kurland, “perhaps the best known theoretical approaches to the study of small groups in field theory, is associated with work of Kurt Lewin”-He studied the relationships between individual behaviors as it pertains to space, environments and groups.- In 1960s, the concept of social network analysis improved and things such as roles and positions came as a part of social network analysis concept-. For example, Samuel R. Friedman, Alan Neaigus, Benny Jose,D, Richard Curtis, Marjorie Goldstein, Gilbert Ildefonso, Richard B. Rothenberg,and Don C. Des Jarlais , (1997) studied how HIV spreads via social networking. -example, Jan Sedmidubsky, StanislavBartonl, VlastislavDohnal and PavelZezula, (2008) studied “the concepts of social networking represents a novel approach to the approximate similarity query processing” (p. 1424).
  • #9: 1920 : according to Helen Northen, Roselle Kurland, “perhaps the best known theoretical approaches to the study of small groups in field theory, is associated with work of Kurt Lewin”-He studied the relationships between individual behaviors as it pertains to space, environments and groups.- In 1960s, the concept of social network analysis improved and things such as roles and positions came as a part of social network analysis concept-. For example, Samuel R. Friedman, Alan Neaigus, Benny Jose,D, Richard Curtis, Marjorie Goldstein, Gilbert Ildefonso, Richard B. Rothenberg,and Don C. Des Jarlais , (1997) studied how HIV spreads via social networking. -example, Jan Sedmidubsky, StanislavBartonl, VlastislavDohnal and PavelZezula, (2008) studied “the concepts of social networking represents a novel approach to the approximate similarity query processing” (p. 1424).
  • #19: installed on users local computer
  • #20: installed on users local computer