publication . Preprint . 2017

Modeling the Propagation of Trojan Malware in Online Social Networks

Faghani, Mohammad Reza; Nugyen, Uyen Trang;
Open Access English
  • Published: 02 Aug 2017
Abstract
The popularity and widespread usage of online social networks (OSN) have attracted cyber criminals who have used OSNs as a platform to spread malware. Among different types of malware in OSNs, Trojan is the most popular type with hundreds of attacks on OSN users in the past few years. Trojans infecting a user's computer have the ability to steal confidential information, install ransomware and infect other computers in the network. Therefore, it is important to understand propagation dynamics of Trojans in OSNs in order to detect, contain and remove them as early as possible. In this article, we present an analytical model to study propagation characteristics of...
Subjects
ACM Computing Classification System: Software_OPERATINGSYSTEMSComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
free text keywords: Computer Science - Cryptography and Security
Download from
57 references, page 1 of 4

[1] Alexa, “The top 500 sites on the web.” https://goo.gl/E2GtDp, December 2014.

[2] J. Grossman, “Cross-site scripting worms and viruses: the impending threat and the best defense,” June 2007.

[3] W. Fan and K. Yeung, “Online social networks paradise of computer viruses,” Journal of Physica A: Statistical Mechanics and its Applications, vol. 390, pp. 189 - 197, January 2011.

[4] K. Thomas, C. Grier, and V. Paxson, “Adapting social spam infrastructure for political censorship,” in Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, (Berkeley, CA), USENIX, April 2012.

[5] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, “Design and analysis of a social botnet,” Elsevier Journal on Computer Networks, vol. 57, pp. 556-578, February 2013.

[6] R. Hansen and J. Grossman, “Clickjacking,” September 2008.

[7] B. Li, “An in-depth look into malicious browser extensions.” https://goo. gl/r6lwO4, October 2014.

[8] ESET, “Virus radar.” https://goo.gl/2bpwsB, November 2014.

[9] Kaspersky Labs, “Facebook malware poses as flash update, infects 110k users,” February 2015.

[10] K. Thomas and D. Nicol, “The Koobface botnet and the rise of social malware,” in Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), pp. 63-70, October 2010.

[11] ESET, “Virus radar.” https://goo.gl/LVDEJS, November 2016.

[12] R. Ziakin and D. Barda, “Imagegate: Check point uncovers a new method for distributing malware through images.” https://goo.gl/ MiU0jU, November 2016.

[13] G. Yan, G. Chen, S. Eidenbenz, and N. Li, “Malware propagation in online social networks: Nature, dynamics, and defense implications,” in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, (New York, NY, USA), pp. 196-206, ACM, March 2011.

[14] M. Faghani, A. Matrawy, and C.-H. Lung, “A study of trojan propagation in online social networks,” in In Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1- 5, May 2012.

[15] M. Faghani and H. Saidi, “Malware propagation in online social networks,” in Proceedings of the International Conference on Malicious and Unwanted Software (MALWARE), pp. 8-14, October 2009.

57 references, page 1 of 4
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue