Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks

Slim Trabelsi, Hana Bouafif

Abstract

In Social Network websites, the users can report the bad behaviors of other users. In order to do so, they can create a kind of escalation ticket called abuse report in which they detail the infraction made by the “bad” user and help the website moderator to decide on a penalty. Today Social Networks count billions of users, the handling of the abuse reports is no more executed manually by moderators; they currently rely on some algorithms that automatically block the “bad” users until a moderator takes care of the case. In this paper we purport to demonstrate how such algorithms are maliciously used by attackers to illegally block innocent victims. We also propose to automate such an attack to demonstrate the big damage that can be caused in current social network websites. We also took the case study of Facebook as proof of concept.

References

  1. Morozov, E., 2011. “The Net Delusion: The Dark Side of Internet Freedom” (New York: Public Affairs, 2011)
  2. Srivatsa, M., Xiong, L., Liu, L., 2005. “TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks”, Proceeding of the 14th international conference on World Wide Web (WWW'05), New York, USA
  3. Hoffman, K., Zage, D., Nita-Rotaru, C., 2007. “A Survey of attacks on Reputation Systems”, Computer Science Technical Report - Number 07-013 - Perdue University (2007)
  4. Tennenholtz, M., 2004 “Reputation Systems: An Axiomatic Approach”, UAI 7804 Proceedings of the 20th conference on Uncertainty in artificial intelligence - Pages 544-551 - AUAI Press Arlington, Virginia, United States 2004.
  5. Cristani, M., Karafili, E. and Viganò, L., 2011. “Blocking Underhand Attacks by Hidden Coalitions”, 3rd International Conference on Agents and Artificial Intelligence, Rome, Italy, 28-30, ICAART 2011.
  6. Pauly, M., 2002 “A modal logic for coalition power in games”. Journal of Logic and Computation, 12(1):149-166. (2002)
  7. M. Pauly, “Logic for social software”. PhD thesis, Institute for Logic Language and Computation, University of Amsterdam. (2001)
  8. Von Ahn, L., Blum, M., Hopper, N. and Langford, J., 2003. “CAPTCHA: Using Hard AI Problems for Security”. In Proceedings of Eurocrypt 2003, May 4- 8, 2003, Warsaw, Poland.
  9. Mirkovic, J. and Reiher, P., 2004. “A taxonomy of DDoS attack and DDoS defense mechanisms”. ACM SIGCOMM 2004, Comput. Commun.
  10. Slashdot, http://tech.slashdot.org/story/11/04/15/1545213/ Crowdsourcing-the-Censors-A-Contest
Download


Paper Citation


in Harvard Style

Trabelsi S. and Bouafif H. (2013). Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 500-505. DOI: 10.5220/0004523005000505


in Bibtex Style

@conference{secrypt13,
author={Slim Trabelsi and Hana Bouafif},
title={Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={500-505},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004523005000505},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks
SN - 978-989-8565-73-0
AU - Trabelsi S.
AU - Bouafif H.
PY - 2013
SP - 500
EP - 505
DO - 10.5220/0004523005000505