Skip to main content

Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities

  • Reference work entry

Definition of the Subject

Online social networking communities are connecting hundreds of millions of individuals across the globe and facilitating new modes ofinteraction. Due to their immense popularity, an important question is whether these communities are safe for their users. In this paper, we address thissafety question and show that social networking communities are susceptible to numerous attacks. Specifically, we identify two attack classes:traditional attacks that have been adapted to these communities (e. g., malware propagation, spam, and phishing) and new attacks that have emergedthrough malicious social networking profiles (e. g., rogue advertising profiles and impersonating profiles). Concretely, we describe examples ofthese attack types that are observable in MySpace, which is currently the most popular social networking community.

Introduction

Over the past few years, social networking communities have experienced unprecedented growth. Communities such as MySpace and...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   3,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Abbreviations

Social networking community :

A community of individuals (users) that are connected based on mutually shared activities, beliefs, goals, or relationships.

Profile :

A user‐controlled web page that contains a picture of a community user along with various pieces of personal information for that user. This is often the online representation of an individual in a social networking community.

Friend request:

A communication mechanism that allows community users to initiate connections between their profiles and the profiles of their friends.

Bibliography

  1. Associated Press (2006) Official Sues Students Over MySpace Page.http://www.sfgate.com/cgi-bin/article.cgi?file=/news/archive/2006/09/22/national/a092749D95.DTL

  2. Boyd C (2006) Teenagers used to push Zango on Myspace.http://www.vitalsecurity.org/2006/07/teenagers-used-to-push-zango-on.html

  3. Freiert M (2008) February Top Social Networks - Make way for the new guys.http://blog.compete.com/2008/03/07/top-social-networks-traffic-feb-2008

  4. Geer D (2005) Malicious bots threaten network security. IEEE Computer38(1):18–20

    MathSciNet  Google Scholar 

  5. Google Press Center (2006) Google To Acquire YouTube for $1.65 Billion in Stock.http://www.google.com/press/pressrel/google_youtube.html

  6. Hitwise (2008) Hitwise US - Top 20 Websites - February, 2008.http://www.hitwise.com/datacenter/rankings.php

  7. Jagatic T et al (2007) Social Phishing. Communications of the ACM50(10):94–100

    Google Scholar 

  8. King R (2006) Marketing to Kids Where They Live.http://www.businessweek.com/technology/content/sep2006/tc20060908_974400.htm?campaign_id=bier_tcs.g3a.091106a

  9. Krebs B (2006) Hacked Ad Seen on MySpace Served Spyware to a Million.http://blog.washingtonpost.com/securityfix/2006/07/myspace_ad_served_adware_to_mo.html

  10. Ross B et al (2005) Stronger password authentication using browserextensions. In: Proceedings of the 14th Usenix SecuritySymposium, Baltimore, 31 Jul – 5 Aug 2005, pp 17–32

    Google Scholar 

  11. Samy (2005) Technical explanation of the MySpace worm.http://namb.la/popular/tech.html

  12. Sanchez M (2006) Pranksters posting fake profiles on MySpace.http://www.dfw.com/mld/dfw/news/local/15255785.htm?template=contentModules/printstory.jsp

  13. Seibel J (2006) Boy charged in creating fake Myspace profile.http://www.jsonline.com/story/index.aspx?id=413620

  14. Swartz J (2008) Social‐networking sites going global.http://www.usatoday.com/money/industries/technology/2008-02-10-social-networking-global_N.htm

  15. Technocrat (2006) Myspace Phishing Attacks on the Rise.http://djtechnocrat.blogspot.com/2006/05/myspace-phishing-attacks-on-rise.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag

About this entry

Cite this entry

Webb, S., Caverlee, J., Pu, C. (2009). Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities. In: Meyers, R. (eds) Encyclopedia of Complexity and Systems Science. Springer, New York, NY. https://doi.org/10.1007/978-0-387-30440-3_258

Download citation

Publish with us

Policies and ethics