Document Type
Dissertation
Degree
Doctor of Philosophy (PhD)
Major/Program
Computer Science
First Advisor's Name
Niki Pissinou
First Advisor's Committee Title
Committee Chair
Second Advisor's Name
Sundaraja Sitharama Iyengar
Second Advisor's Committee Title
Committee Member
Third Advisor's Name
Deng Pan
Third Advisor's Committee Title
Committee Member
Fourth Advisor's Name
Jean H. Andrian
Fourth Advisor's Committee Title
Committee Member
Fifth Advisor's Name
Leonardo Bobadilla
Fifth Advisor's Committee Title
Committee Member
Sixth Advisor's Name
Laurent Y. Njilla
Sixth Advisor's Committee Title
Committee Member
Keywords
Cybersecurity, Colluding Attacks, Online Social Networks, Crowdsourcing, Threats and Solutions, Social Network Analysis, Colluding Targeted Reconnaissance Attack, Identity Clone Attack, Community Detection
Date of Defense
6-28-2019
Abstract
Online Social Networks (OSNs) have created new ways for people to communicate, and for companies to engage their customers -- with these new avenues for communication come new vulnerabilities that can be exploited by attackers. This dissertation aims to investigate two attack models: Identity Clone Attacks (ICA) and Reconnaissance Attacks (RA). During an ICA, attackers impersonate users in a network and attempt to infiltrate social circles and extract confidential information. In an RA, attackers gather information on a target's resources, employees, and relationships with other entities over public venues such as OSNs and company websites. This was made easier for the RA to be efficient because well-known social networks, such as Facebook, have a policy to force people to use their real identities for their accounts. The goal of our research is to provide mechanisms to defend against colluding attackers in the presence of ICA and RA collusion attacks. In this work, we consider a scenario not addressed by previous works, wherein multiple attackers collude against the network, and propose defense mechanisms for such an attack. We take into account the asymmetric nature of social networks and include the case where colluders could add or modify some attributes of their clones. We also consider the case where attackers send few friend requests to uncover their targets.
To detect fake reviews and uncovering colluders in crowdsourcing, we propose a semantic similarity measurement between reviews and a community detection algorithm to overcome the non-adversarial attack. ICA in a colluding attack may become stronger and more sophisticated than in a single attack. We introduce a token-based comparison and a friend list structure-matching approach, resulting in stronger identifiers even in the presence of attackers who could add or modify some attributes on the clone. We also propose a stronger RA collusion mechanism in which colluders build their own legitimacy by considering asymmetric relationships among users and, while having partial information of the networks, avoid recreating social circles around their targets. Finally, we propose a defense mechanism against colluding RA which uses the weakest person (e.g., the potential victim willing to accept friend requests) to reach their target.
Identifier
FIDC007703
ORCID
0000-0003-3757-0050
Recommended Citation
Kamhoua, Georges Arsene K., "Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms" (2019). FIU Electronic Theses and Dissertations. 4281.
https://digitalcommons.fiu.edu/etd/4281
Included in
Communication Technology and New Media Commons, Mass Communication Commons, Other Electrical and Computer Engineering Commons, Social Media Commons
Rights Statement
In Copyright. URI: http://rightsstatements.org/vocab/InC/1.0/
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).