Online Social Deception and Its Countermeasures: A Survey

نویسندگان

چکیده

We are living in an era when online communication over social network services (SNSs) have become indispensable part of people's everyday lives. As a consequence, deception (OSD) SNSs has emerged as serious threat cyberspace, particularly for users vulnerable to such cyberattacks. Cyber attackers exploited the sophisticated features carry out harmful OSD activities, financial fraud, privacy threat, or sexual/labor exploitation. Therefore, it is critical understand and develop effective countermeasures against building trustworthy SNSs. In this paper, we conducted extensive survey, covering (i) multidisciplinary concepts deception; (ii) types attacks their unique characteristics compared other cybercrimes; (iii) comprehensive defense mechanisms embracing prevention, detection, response (or mitigation) along with pros cons; (iv) datasets/metrics used validation verification; (v) legal ethical concerns related research. Based on provide insights into effectiveness lessons from existing literature. conclude survey paper in-depth discussions limitations state-of-the-art recommend future research directions area.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures

In this work, we propose a profile matching (or deanonymization) attack for unstructured online social networks (OSNs) in which similarity in graphical structure cannot be used for profile matching. We consider different attributes that are publicly shared by users. Such attributes include both obvious identifiers such as the user name and non-obvious identifiers such as interest similarity or ...

متن کامل

Online Social Networks and Social Network Services: A Technical Survey

Social functions are natural consequences of human societies. Before communication technologies, social functions tend to evolve within cultural boundaries, such as location and families. Communication technologies, from mountain top signaling to Voiceover-IP, have broken those boundaries more or less and enabled multi-culture social functions. Empowered by low-cost, high-power personal computi...

متن کامل

Deception Tactics and Counterfeit Deception in Online Environments

With widespread globalization happening at an alarming speed, the manufacturing and copying of goods has become a matter of routine for counterfeiters. The Internet has provided a new advantage for counterfeiters the opportunity to sell goods without prior consumer inspection. Leveraging this opportunity, deceitful purveyors of imitation goods engage in unethical practices such as selling count...

متن کامل

Lightweight Cryptography and DPA Countermeasures: A Survey

The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full control over the pervasive device, additionally to the cryptographic attacks the whole field of physical attacks has to be considered. Most notably are here so-called side channel attacks, such as Differential Power Analysis (DPA) a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2020.3047337