Abstract
In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution.
Similar content being viewed by others
References
Rathore S, Sharma PK, Loia V, Jeong Y-S, Park JH (2017) Social network security: issues, challenges, threats, and solutions. Inf Sci (Ny) 421:43–69
Dutta P (2020) 5 Biggest Data Breaches of 2020 (So Far). Security Boulevard, 2020 [Online]. Available: https://securityboulevard.com/2020/08/5-biggest-data-breaches-of-2020-so-far/
Hernández-García Á (2014) Using Gephi to visualize online course participation: a Social Learning Analytics approach. Ital J Educ Technol 22(3):148–156
Shu W, Chuang YH (2011) The perceived benefits of six-degree-separation social networks. Internet Res 21(1):26–45
Adewole KS, Anuar NB, Kamsin A, Varathan KD, Razak SA (2017) Malicious accounts: dark of the social networks. J Netw Comput Appl 79:41–67
Abdulhamid SM, Ahmad S, Waziri VO, Jibril FN (2011) Privacy and national security issues in social networks: the challenges. Int J Comput Internet Manag 19(3):14–20
Beye M, Jeckmans A, Erkin Z, Hartel P, Lagendijk R, Tang Q (2010) Literature overview-privacy in online social networks. Enschede
Stallings W (2017) Cryptography and network security: principles and practice. Pearson, Upper Saddle River
Salama M, Panda M, Elbarawy Y, Hassanien AE, Abraham A (2012) Computational social networks: security and privacy. In: Computational social networks. Springer, pp 3–21
Fire M, Goldschmidt R, Elovici Y (2014) Online social networks: threats and solutions. IEEE Commun Surv Tutor 16(4):2019–2036
Badra M, El-Sawda S, Hajjeh I (2007) Phishing attacks and solutions. In: Proceedings of the 3rd international conference on Mobile multimedia communications, p 42
Joshi Y, Saklikar S, Das D, Saha S (2008) PhishGuard: a browser plug-in for protection from phishing. In: 2nd international conference on internet multimedia services architecture and applications, 2008. IMSAA 2008. pp 1–6
Tootoonchian A, Saroiu S, Ganjali Y, Wolman A (2009) Lockr: better privacy for social networks. In: Proceedings of the 5th international conference on emerging networking experiments and technologies, pp 169–180
Nagy J, Pecho P (2009) Social networks security. In: Third international conference on emerging security information, systems and technologies, SECURWARE’09. pp 321–325
Yue C, Wang H (2010) BogusBiter: a transparent protection against phishing attacks. ACM Trans Internet Technol 10(2):6
Zheng X, Zhang X, Yu Y, Kechadi T, Rong C (2016) ELM-based spammer detection in social networks. J Supercomput 72(8):2991–3005
Zhang Y, Ruan X, Wang H, Wang H, He S (2017) Twitter trends manipulation: a first look inside the security of twitter trending. IEEE Trans Inf Forensics Secur 12(1):144–156
Agarwal N, Liu H, Tang L, Yu PS (2008) Identifying the influential bloggers in a community. In: Proceedings of the 2008 international conference on web search and data mining. pp 207–218
Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society, pp 71–80
Al-Janabi M, de Quincey E, Andras P (2017) Using supervised machine learning algorithms to detect suspicious URLs in online social networks. In: Proceedings of the 2017 IEEE/ACM international conference on advances in social networks analysis and mining 2017, pp 1104–1111
Makridakis A, Athanasopoulos E, Antonatos S, Antoniades D, Ioannidis S, Markatos E (2010) Understanding the behavior of malicious applications in social networks. IEEE Netw 24(5):14–19
Heymann P, Koutrika G, Garcia-Molina H (2007) Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput 11(6):36–45
Yao D, Frikken KB, Atallah MJ, Tamassia R (2008) Private information: to reveal or not to reveal. ACM Trans Inf Syst Secur 12(1):6
Luo W, Liu J, Liu J, Fan C (2009) An analysis of security in social networks. In: Eighth IEEE international conference on dependable, autonomic and secure computing, DASC’09. pp 648–651
Irani D, Webb S, Li K, Pu C (2009) Large online social footprints—an emerging threat. In: 2009 International conference on computational science and engineering, pp 271–276
Zhang C, Sun J, Zhu X, Fang Y (2010) Privacy and security for online social networks: challenges and opportunities. IEEE Netw 24(4):13–18
Meraji S, Tropper C (2010) A machine learning approach for linux malware detection. In: Proceedings - international conference on parallel processing, pp 545–554
Korolova A (2010) Privacy violations using microtargeted ads: a case study. In: Proceedings - IEEE international conference on data mining, ICDM, pp 474–482
Irani D, Webb S, Li K, Pu C (2011) Modeling unintended personal-information leakage from multiple online social networks. IEEE Internet Comput 15(3):13–19
Liu C, Wang G (2017) Analysis and detection of spam accounts in social networks. In: 2016 2nd IEEE International Conference on Computer and Communications, ICCC. pp 2526–2530
Zheng X, Zeng Z, Chen Z, Yu Y, Rong C (2015) Detecting spammers on social networks. Neurocomputing 159(1):27–34
Xu L, Zheng X, Rong C (2013) Trust evaluation based content filtering in social interactive data. In: Proceedings - 2013 international conference on cloud computing and big data, CLOUDCOM-ASIA, pp 538–542
Wang AH (2011) Don’t follow me - Spam detection in twitter,” pp 142–151
Gao H, Chen Y, Lee K, Palsetia D, Choudhary A (2012) Towards online spam filtering in social networks. In: NDSS
Li N, Zhang N, Das SK (2012) Online social networks. In: Handbook on securing cyber-physical critical infrastructure found. Challenges, p 431
Schwartz PM, Solove DJ (2011) The PII problem: privacy and a new concept of personally identifiable information. NYUL Rev 86:1814
Shin S, Ko Y, Jang J (2011) The conflict between privacy and self-disclosure in social networking services. In: 2011 IEEE 3rd international conference on communication software and networks (ICCSN), pp 490–493
Huber M, Mulazzani M, Weippl E, Kitzler G, Goluch S (2011) Friend-in-the-middle attacks: exploiting social networking sites for spam. IEEE Internet Comput 15(3):28–34
Qazvinian V, Rosengren E, Radev DR, Mei Q (2011) Rumor has it: Identifying misinformation in microblogs. In: Proceedings of the conference on empirical methods in natural language processing, pp 1589–1599
Nguyen H (2013) State of social media spam. Publ. NexGate, USA, from websites http//nexgate.com/wpcontent/uploads/2013/09/Nexgate-2013-State-of-Social-Media-Spam-Research-Report.pdf
Savage D, Zhang X, Yu X, Chou P, Wang Q (2014) Anomaly detection in online social networks. Soc Netw 39:62–70
Bliss CA, Frank MR, Danforth CM, Dodds PS (2014) An evolutionary algorithm approach to link prediction in dynamic social networks. J Comput Sci 5(5):750–764
Pizzuti C (2014) GA-Net : a genetic algorithm for community detection in social networks GA-Net : a genetic algorithm for community detection in social networks. January 2008
Mohaisen A, Alrawi O, Mohaisen M (2015) AMAL: high-fidelity, behavior-based automated malware analysis and classification. Comput Secur 52:251–266
Ebenazer MP, Sumathi P (2015) An overview of identity deception approaches and its effects. Int J Comput Trends Technol 25(3):123–126
Multani HS, Sinh-Marod A, Pillai V, Gaware V (2015) Spam detection in social media networks: a data mining approach. Int J Comput Appl 115(9):9–12
Jeong S et al (2017) Social network security: issues, challenges, threats, and solutions. Inf Sci (Ny) 421(3):43–69
Saikumar T, Sriramya P (2016) Security issues in social networks. Int J Pharm Technol 8(4):20835–20841
Kharde V, Sonawane P et al (2016) Sentiment analysis of twitter data: a survey of techniques. arXiv: 1601.06971
Zadeh PM, Kobti Z (2015) A multi-population cultural algorithm for community detection in social networks. Procedia Comput Sci 52:342–349
Jalili M, Orouskhani Y, Asgari M, Alipourfard N, Perc M (2017) Link prediction in multiplex online social networks subject category : subject areas
Lü L, Zhou T (2011) Link prediction in complex networks: a survey. Phys A Stat Mech Appl 390(6):1150–1170
Zhang K, Du H, Feldman MW (2017) Maximizing influence in a social network: improved results using a genetic algorithm. Phys A Stat Mech Appl 478:20–30
Ala’M A-Z, Faris H, Hassonah MA et al (2018) Evolving support vector machines using whale optimization algorithm for spam profiles detection on online social networks in different lingual contexts. Knowl Based Syst 153:91–104
Mutlag AA, Abd-Ghani MK, Arunkumar N, Mohammed MA, Mohd O (2019) Enabling technologies for fog computing in healthcare IoT systems. Future Gener Comput Syst 90:62–78
Zhang Z, Choo K-KR, Gupta BB (2018) The convergence of new computing paradigms and big data analytics methodologies for online social networks. J Comput Sci 26:453–455
Ali M, Siarry P, Pant M (2011) An efficient differential evolution based algorithm for solving multi-objective optimization problems. Eur J Oper Res 217:404–416
Prateek K, Jay JC–C (2011) Security and privacy in online social networks : a survey. In: 2011 IEEE International Conference on Multimedia and Expo (ICME). Prateek Joshi, C–C Jay Kuo University of Southern California, Los Angeles, California, USA, pp 1–6
Altshuler Y, Elovici Y, Cremers AB, Aharony N, Pentland A (2013) Security and privacy in social networks. Secur Priv Soc Netw 15:1–253
Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl 50:102419
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kumar, C., Bharati, T.S. & Prakash, S. Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning. Neural Process Lett 53, 843–861 (2021). https://doi.org/10.1007/s11063-020-10416-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11063-020-10416-3