Security Content Used To Protect Data From Social Media
الكلمات المفتاحية:
Social media، Security، Privacyالملخص
Abstract
Social media networks have revolutionized global connectivity, enabling billions of users to engage in virtual communities and mutual interactions. However, their widespread adoption has attracted malicious actors who exploit platform vulnerabilities to compromise user security and privacy. Despite preventive measures, cyber-attacks targeting social media have surged, necessitating advanced intrusion detection systems (IDS) to mitigate risks. Although these platforms fetch never-seen convenience, users do not have the technical ability to understand the privacy implications of their shared content. As a result the use of available privacy settings fall short compared to the general practice of security. This study initiates the development of a holistic framework for social media security that integrates
- Policy-driven safeguards: Use strong passwords, keep updating your credentials often, share data carefully, use antivirus software, and stick to your own software.
- Artificial Intelligence (AI) and Machine Learning (ML)-driven solutions:: Machine learning algorithms for user sentiment analysis, disinformation detection, combating illicit activities such as child trafficking, and adversarial machine learning-based enhancement of intrusion detection.
- Ethical AI integration: Aligning with "AI for Good" efforts can help cut down biases and ensure fairness in automated security setups.
The paper takes a close look at the latest improvements in social media security, stressing how important it is to protect private information as more breaches happen that could harm economic stability and confidence in using these platforms. This helps connect tech creativity with strict rules and offers a new way to strengthen platform trustworthiness and ability to bounce back in a digital world that is becoming more competitive.
التنزيلات
المراجع
V. Benson, G. Saridakis, H. Tennakoon, and J. N. Ezingeard, "The role of security notices and online consumer behaviour: an empirical study of social networking users," International Journal of Human-Computer Studies, vol. 80, pp. 36–44, 2015.
Fatima Hassan, Suhad Faisal Behadili, ‘Modeling Social Networks using Data Mining Approaches-Review’, Iraqi Journal of Science, 2022, Vol. 63, No. 3, pp: 1313-1338, doi: 10.24996/ijs.2022.63.3.35
Etuh, E., Bakpo, F. S., and Agozie, H. E. 'Social Media Network Attacks and Their Preventive Mechanisms: A Review', Science Direct, Volume 140,14 (2022).
Li, L. and Qian, K. 'Using Real-Time Fear Appeals to Improve Social Media Security', Science Direct, Science Direct ,volume 125 , 4 (2016).
Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31
Mislove A, Viswanath B, Gummadi KP, Druschel P (2010) You are who you know. In: Proceedings of the third ACM international conference on Web search and data mining—WSDM ’10, p 251
Top 15 Most Popular Social Networking Sites and Apps [August 2018] @DreamGrow [Online]. https://www.dreamgrow.com/top-15-most-popular-social-networking-sites/. Accessed 14 Dec 2020
Rathore S, Loia V, Park JH (2018) SpamSpotter: an efficient spammer detection framework based on intelligent decision support system on facebook. Appl Soft Comput 67:920–932
Gao, H.; Hu, J.; Wilson, C.; Li, Z.; Chen, Y.; Zhao, B.Y. Detecting and characterizing social spam campaigns. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, Melbourne, Australia, 1–3 November 2010; pp. 35–47. 25.
Thomas, K.; Grier, C.; Ma, J.; Paxson, V.; Song, D. Design and evaluation of a real-time URL spam filtering service. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 22–25 May 2011; pp. 447–462.
Gao, H.; Chen, Y.; Lee, K.; Palsetia, D.; Choudhary, A.N. Towards Online Spam Filtering in Social Networks. In Proceedings of the 19th Annual Network & Distributed System Security Symposium, San Diego, CA, USA, 5–8 February 2012; pp. 1–16.
Gupta, S.; Gupta, B.B. Cross-Site Scripting (XSS) attacks and defense mechanisms: Classification and state-of-the-art. Int. J. Syst. Assur. Eng. Manag. 2017, 8, 512–530. [CrossRef]
Faghani, M.R.; Nguyen, U.T. A study of XSS worm propagation and detection mechanisms in online social networks. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1815–1826. [CrossRef]
Lundeen, R.; Ou, J.; Rhodes, T. New Ways Im Going to Hack Your Web APP. Black Hat Abu Dhabi. Available online: https://www.blackhat.com/html/bh-ad-11/bh-ad-11-archives.html#Lundeen (accessed on 1 November 2018).
Ding, X.; Zhang, L.; Wan, Z.; Gu, M. A brief survey on de-anonymization attacks in online social networks. In Proceedings of the IEEE International Conference on Computational Aspects of Social Networks (CASoN 2010), Taiyuan, China, 26–28 September 2010; pp. 611–615.
Gulyás, G.G.; Simon, B.; Imre, S. An Efficient and Robust Social Network De-anonymization Attack. In Proceedings of the Workshop on Privacy in the Electronic Society, Vienna, Austria, 24 October 2016; pp. 1–11.
Wani, M.A.; Jabin, S.; Ahmad, N. A sneak into the Devil’s Colony-Fake Profiles in Online Social Networks. Available online: https://arxiv.org/ftp/arxiv/papers/1705/1705.09929.pdf (accessed on 29 October 2018).
Perlroth, N. Fake Twitter Followers Become Multimillion-Dollar Business. The New York Times, 9 April 2013. Available online: https://bits.blogs.nytimes.com/2013/04/05/fake-twitter-followers-becomes-multimilliondollar-business/?_php=true&_type=blogs&ref=technology&_r=0 (accessed on 1 November 2018).
Kharaji, M.Y.; Rizi, F.S.; Khayyambashi, M.R. A New Approach for Finding Cloned Profiles in Online Social Networks. arXiv, 2014, arXiv:1406.7377.
Balduzzi M, Egele M, Kirda E, Balzarotti D, Kruegel C (2010) A solution for the automated detection of clickjacking attacks. Asiaccs 4(2):135
Gordhan Jethava a, Udai Pratap Rao b ,Exploring security and trust mechanisms in online social networks: An extensive review, volume 140 ,13 (2023).
David Tayouri,,The Human Factor in the Social Media Security – Combining Education and Technology to Reduce Social Engineering Risks and Damages, Science Direct, Volume 3, 5 (2015)
Lionel Khalil a, Nancy Abi Karam b ,Security Management: Real versus Perceived Risk of Commercial Exploitation of Social Media Personal Data, Science Direct ,Volume 65,10 (2015) , .
منشور
كيفية الاقتباس
إصدار
القسم
الحقوق الفكرية (c) 2025 Zina Alshukri (Author)

هذا العمل مرخص بموجب Creative Commons Attribution 4.0 International License.