skip to main content
10.1145/2656434.2656444acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

A survey of security vulnerabilities in social networking media: the case of facebook

Published: 13 October 2014 Publication History

Abstract

This paper conducted a survey study on the security vulnerabilities in one of most popular social networking site, Facebook. We divide the vulnerabilities into two main categories: platform-related and user-related. For each vulnerability, we present its origin, description and remedy if there is any. Our work not only increases users' awareness of those vulnerabilities, but also provides a comprehensive view to the researchers who are interested in improving security measures of social media services.

References

[1]
Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems. ACM Trans. Program. Lang. Syst. 15, 5 (Nov. 1993), 795--825. DOI= http://doi.acm.org/10.1145/161468.16147.
[2]
Kirk, J. (2013, July 27). Researcher nets @20K for finding serious Facebook flaw. Retrieved September 25, 2013, from CSO: http://www.cso.com.au/article/466029/researcher_nets_20k_finding_serious_facebook_flaw/
[3]
Albesher, A., & Alhussain, T. (2013). Privacy and Security Issues in Social Networks: An Evaluation of Facebook. ISDOC '13 Proceedings of the 2013 International Conference on Information Systems and Design of Communication (pp. 7--10). New York: ACM.
[4]
Polakis, I., Lancini, M., Kontaxis, G., Maggi, F., Ioannidis, S., Keromytis, A. D., et al. (2012). All Your Face Are Belong to Us: Breaking Faceook's Social Authentication. Annual Computer Security Applications Conference (p. 399). Orlando: ACSAC.
[5]
Sharma, R., Jain, A., & Rastogi, R. (2013). A new face to photo security of Facebook. 2013 Sixth International Conference on Contemporary Computing (IC3) (pp. 415--420). Noida: IEEE.
[6]
Rahman, M. S., Huang, T.-K., Madhyastha, H. V., & Faloutsos, M. (2012). FRAppE: Detecting Malicious Facebook Applications. CoNEXT 2012 Proceedings of the 8th International Conference on Emerging Network Experiments and Technologies (pp. 313--324). New York: ACM.
[7]
Huber, M., Mulazzani, M., Schrittwieser, S., & Weippi, E. (2013). AppInspect: Large-scale Evaluation of Social Networking Apps. ACM COSN Proceedings of the First ACM Conference on Online Social Networks (pp. 143--154). Boston: ACM.
[8]
Jagnere, P. (2012). Vulnerabilities in Social Networking Sites. 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC) (pp. 463--468). Solan: IEEE.
[9]
Lam, V. T., Antonatos, S., Akritidis, P., & Anagnostakis, K. G. (2006). Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. ACM Conference on Computer and Communications Security. 12. New York: ACM.
[10]
Galpin, R., & Flowerday, S. V. (2011). Online Social Networks: Enhancing User Trust Through Effective Controls and Identity Management. Information Security South Africa (ISSA), 1--8.
[11]
Chang, W., & Wu, J. (n.d). A Survey of Sybil Attacks in Networks. Temple University, Computer and Information Sciences. Philadelphia: Temple University.
[12]
Douceur, J. R., & Donath, J. S. (2002). The Sybil Attack. International Workshop on Peer-to-Peer Systems (pp. 251--260). Cambridge, MA: IPTPS.
[13]
Jin, L., Long, X., Takabi, H., & Joshi, J. B. (n.d). Sybil Attacks VS Identity Clone Attacks in Online Social Networks. Pittsburgh: University of Pittsburgh.
[14]
Mittal, P., Caesar, M., & Borisov, N. (2010). Facebook under attack on all fronts. Network Security, 5, 1--2.
[15]
McNaughton, M. (2012). 77% of Fortune Global 100 Companies Use Twitter. Retrieved November 20, 2013, from The Realtime Report: http://therealtimereport.com/2011/03/18/77-of-fortune-global-100-companies-use-twitter/
[16]
Parwani, T., Kholoussi, R., & Karras, P. (2013). How To Hack Into Facebook Without Being A Hacker. WWW '13 Proceedings of the 22nd International Conference on World Wide Web Companion, 751--754.
[17]
Murphy, D. (2008, March 27). The Tip of the Facebook Exploit Iceberg. MaximumPC.
[18]
Social Networking Statistics. (2013, August 12). Retrieved November 5, 2013, from Statistic Brain: http://www.statisticbrain.com/social-networking-statistics/
[19]
Traverso, M. (2013, November 6). Presto: Interating with petabytes of data at Facebook. Retrieved February 4, 2014, from Facebook Engineering: https://www.facebook.com/notes/facebook-engineering/presto-interacting-with-petabytes-of-data-at-facebook/10151786197628920

Cited By

View all
  • (2016)The Paradox of Social Media SecurityProceedings of the 5th Annual Conference on Research in Information Technology10.1145/2978178.2978187(29-34)Online publication date: 28-Sep-2016
  • (2016)Using Real-Time Fear Appeals to Improve Social Media Security2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)10.1109/COMPSAC.2016.217(610-611)Online publication date: Jun-2016

Index Terms

  1. A survey of security vulnerabilities in social networking media: the case of facebook

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    RIIT '14: Proceedings of the 3rd annual conference on Research in information technology
    October 2014
    98 pages
    ISBN:9781450327114
    DOI:10.1145/2656434
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 October 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. facebook
    2. security
    3. social media
    4. vulnerability

    Qualifiers

    • Research-article

    Conference

    SIGITE/RIIT'14
    Sponsor:
    SIGITE/RIIT'14: SIGITE/RIIT 2014
    October 15 - 18, 2014
    Georgia, Atlanta, USA

    Acceptance Rates

    RIIT '14 Paper Acceptance Rate 14 of 39 submissions, 36%;
    Overall Acceptance Rate 51 of 116 submissions, 44%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)The Paradox of Social Media SecurityProceedings of the 5th Annual Conference on Research in Information Technology10.1145/2978178.2978187(29-34)Online publication date: 28-Sep-2016
    • (2016)Using Real-Time Fear Appeals to Improve Social Media Security2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)10.1109/COMPSAC.2016.217(610-611)Online publication date: Jun-2016

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media