Design e implementação de uma arquitetura conceitual para a criação de social botnet em redes sociais
Abstract
The socialbots safety implications are evident because of the large number of users that social networks present and the high capacity of data sharing, which results in the high propagation of information. Based on this, the objective of this research is to present a conceptual architecture proposal for the creation of social botnet that can be used together with the detection tools for socialbots simulation. By implementing it on Facebook, a security analysis of this social network is performed to present the observed aspects that need to be improved by it and by the detection area of social botnet.References
Alex, B. (2015). 2015 brazil digital future in focus. Disponível em: https://www.comscore.com/por/Insights/Apresentacoes-e-documentos/2015/2015-Brazil-Digital-Future-in-Focus. Acesso em: 18 mai. de 2018.
Bollen, J., Mao, H., and Zeng, X. (2011). Twitter mood predicts the stock market. Journal of Computational Science, 2(1):1 – 8.
Boshmaf, Y., Muslukhov, I., Beznosov, K., and Ripeanu, M. (2013). Design and analysis of a social botnet. Comput. Netw., 57(2):556–578.
Compagno, A., Conti, M., Lain, D., Lovisotto, G., and Mancini, L. V. (2015). Boten elisa: A novel approach for botnet c&c in online social networks. In 2015 IEEE Conference on Communications and Network Security (CNS), pages 74–82.
DAPP, F. (2017a). Robôs, redes sociais e política: estudo da FGV/DAPP aponta interferências ilegítimas no debate público na web. Disponível em: http://dapp.fgv.br/robos-redes-sociais-e-politica-estudo-da-fgvdapp-apontainterferencias-ilegitimas-no-debate-publico-na-web/. Acesso em: 27 set. de 2018.
DAPP, F. (2017b). Robôs, redes sociais e política no Brasil: estudo sobre interferências ilegítimas no debate público na web, riscos à democracia e processo eleitoral de 2018. Disponível em: http://dapp.fgv.br/wp-content/uploads/2017/08/Robos-redessociais-politica-fgv-dapp.pdf. Acesso em: 20 ago. de 2017.
Douglas, C. G. A. (2017). Extração de dados em redes sociais usando python. Disponível em: http://www.linc.ufpa.br/fabricasistemas/cursoextracao/materiais/3.%20Twitter%20e%20Facebook%20API.pdf. Acesso em: 21 set. de 2017.
Economist, T. (2016). Could facebook influence the outcome of the presidential election? Disponível em: http://www.economist.com/blogs/economistexplains/2016/05/economist-explains-15. Acesso em: 19 ago. de 2018.
Ferrara, E., Varol, O., Davis, C., Menczer, F., and Flammini, A. (2016). The rise of social bots. Commun. ACM, 59(7):96–104.
Garcia-Teodoro, P., Diaz-Verdejo, J., Macià-Fernàndez, G., and Vàzquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. computers & security, 28(1):18–28.
Globo (2014). Sequestrador diz ter planejado crime com informações de rede social. Disponível em: http://g1.globo.com/sc/santa-catarina/noticia/2014/06/sequestrador-dizter-planejado-crime-com-informacoes-de-rede-social.html. Acesso em: 4 jun. de 2018.
Globo (2019). Facebook completa 15 anos com 2,3 bilh˜oes de usuários. Disponível em: https://g1.globo.com/economia/tecnologia/noticia/2019/02/04/facebookcompleta-15-anos-com-23-bilhoes-de-usuarios.ghtml. Acesso em: 18 jul. de 2019.
Goga, O., Venkatadri, G., and Gummadi, K. P. (2015). The doppelgänger bot attack: Exploring identity impersonation in online social networks. Disponível em: https://people.mpi-sws.org/gummadi/papers/impersonators IMC2015.pdf. Acesso em: 23 jan. de 2018.
Goveia, F. (2014). Conversas citando aécio no twitter. Disponível em: http://www.labic.net/blog/internet-2/bots-contra-a-sociedade/. Acesso em: 15 mai. de 2018.
He, Y., Zhang, G., Wu, J., and QiangL (2015). Understanding a prospective approach to designing malicious social bots. Security and Communication Networks, 2:1–18. Ji, Y., He, Y., Jiang, X., Cao, J., and Qiang, L. (2016). Combating the evasion mechanisms of social bots. Computers & Security, 58:230–249.
Jin, L., Joshi, J. B. D., and Anwar, M. (2013). Mutual-friend based attacks in social network systems. Comput. Secur., 37:15–30. 8 de ago. de 2016.
Kimurai, H., Basso, L. F. C., and Martin, D. M. L. (2008). Redes sociais e o marketing de inovações. RAM. Revista de Administração Mackenzie, 9:157 – 181.
Kumar, N. and Reddy, R. N. (2012). Automatic detection of fake profiles in online social networks. PhD thesis, National Institute of Technology Rourkela, Orissa, índia.
Poster, T. W. (2016). Obama raised half a billion online. Disponível em: http://voices.washingtonpost.com/44/2008/11/obama-raised-half-a-billion-on.html. Acesso em: 3 mai. de 2018.
Project, S. (2012). Seleniumhq. Disponível em: https://www.seleniumhq.org/docs/. Acesso em: 4 jun. de 2018.
Shao, C., Ciampaglia, G. L., Varol, O., Flammini, A., and Menczer, F. (2017). The spread of fake news by social bots. Nature Communications.
Shawar, B. A. and Atwell, E. (2007). Chatbots: are they really useful? In Ldv forum, volume 22, pages 29–49.
Statista (2018). Facebook - statistics & facts. Disponível em: https://www.statista.com/topics/751/facebook/. Acesso em: 03 jan. de 2018.
Tanner, B. K.,Warner, G., Stern, H., and Olechowski, S. (2010). Koobface: The evolution of the social botnet. In 2010 eCrime Researchers Summit, pages 1–10.
Thomas, K. and Nicol, D. M. (2010). The koobface botnet and the rise of social malware. In 2010 5th International Conference on Malicious and Unwanted Software, pages 63–70.
Tiwari, V. (2017). Analysis and detection of fake profile over social network. In 2017 International Conference on Computing, Communication and Automation (ICCCA), pages 175–179.
Bollen, J., Mao, H., and Zeng, X. (2011). Twitter mood predicts the stock market. Journal of Computational Science, 2(1):1 – 8.
Boshmaf, Y., Muslukhov, I., Beznosov, K., and Ripeanu, M. (2013). Design and analysis of a social botnet. Comput. Netw., 57(2):556–578.
Compagno, A., Conti, M., Lain, D., Lovisotto, G., and Mancini, L. V. (2015). Boten elisa: A novel approach for botnet c&c in online social networks. In 2015 IEEE Conference on Communications and Network Security (CNS), pages 74–82.
DAPP, F. (2017a). Robôs, redes sociais e política: estudo da FGV/DAPP aponta interferências ilegítimas no debate público na web. Disponível em: http://dapp.fgv.br/robos-redes-sociais-e-politica-estudo-da-fgvdapp-apontainterferencias-ilegitimas-no-debate-publico-na-web/. Acesso em: 27 set. de 2018.
DAPP, F. (2017b). Robôs, redes sociais e política no Brasil: estudo sobre interferências ilegítimas no debate público na web, riscos à democracia e processo eleitoral de 2018. Disponível em: http://dapp.fgv.br/wp-content/uploads/2017/08/Robos-redessociais-politica-fgv-dapp.pdf. Acesso em: 20 ago. de 2017.
Douglas, C. G. A. (2017). Extração de dados em redes sociais usando python. Disponível em: http://www.linc.ufpa.br/fabricasistemas/cursoextracao/materiais/3.%20Twitter%20e%20Facebook%20API.pdf. Acesso em: 21 set. de 2017.
Economist, T. (2016). Could facebook influence the outcome of the presidential election? Disponível em: http://www.economist.com/blogs/economistexplains/2016/05/economist-explains-15. Acesso em: 19 ago. de 2018.
Ferrara, E., Varol, O., Davis, C., Menczer, F., and Flammini, A. (2016). The rise of social bots. Commun. ACM, 59(7):96–104.
Garcia-Teodoro, P., Diaz-Verdejo, J., Macià-Fernàndez, G., and Vàzquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. computers & security, 28(1):18–28.
Globo (2014). Sequestrador diz ter planejado crime com informações de rede social. Disponível em: http://g1.globo.com/sc/santa-catarina/noticia/2014/06/sequestrador-dizter-planejado-crime-com-informacoes-de-rede-social.html. Acesso em: 4 jun. de 2018.
Globo (2019). Facebook completa 15 anos com 2,3 bilh˜oes de usuários. Disponível em: https://g1.globo.com/economia/tecnologia/noticia/2019/02/04/facebookcompleta-15-anos-com-23-bilhoes-de-usuarios.ghtml. Acesso em: 18 jul. de 2019.
Goga, O., Venkatadri, G., and Gummadi, K. P. (2015). The doppelgänger bot attack: Exploring identity impersonation in online social networks. Disponível em: https://people.mpi-sws.org/gummadi/papers/impersonators IMC2015.pdf. Acesso em: 23 jan. de 2018.
Goveia, F. (2014). Conversas citando aécio no twitter. Disponível em: http://www.labic.net/blog/internet-2/bots-contra-a-sociedade/. Acesso em: 15 mai. de 2018.
He, Y., Zhang, G., Wu, J., and QiangL (2015). Understanding a prospective approach to designing malicious social bots. Security and Communication Networks, 2:1–18. Ji, Y., He, Y., Jiang, X., Cao, J., and Qiang, L. (2016). Combating the evasion mechanisms of social bots. Computers & Security, 58:230–249.
Jin, L., Joshi, J. B. D., and Anwar, M. (2013). Mutual-friend based attacks in social network systems. Comput. Secur., 37:15–30. 8 de ago. de 2016.
Kimurai, H., Basso, L. F. C., and Martin, D. M. L. (2008). Redes sociais e o marketing de inovações. RAM. Revista de Administração Mackenzie, 9:157 – 181.
Kumar, N. and Reddy, R. N. (2012). Automatic detection of fake profiles in online social networks. PhD thesis, National Institute of Technology Rourkela, Orissa, índia.
Poster, T. W. (2016). Obama raised half a billion online. Disponível em: http://voices.washingtonpost.com/44/2008/11/obama-raised-half-a-billion-on.html. Acesso em: 3 mai. de 2018.
Project, S. (2012). Seleniumhq. Disponível em: https://www.seleniumhq.org/docs/. Acesso em: 4 jun. de 2018.
Shao, C., Ciampaglia, G. L., Varol, O., Flammini, A., and Menczer, F. (2017). The spread of fake news by social bots. Nature Communications.
Shawar, B. A. and Atwell, E. (2007). Chatbots: are they really useful? In Ldv forum, volume 22, pages 29–49.
Statista (2018). Facebook - statistics & facts. Disponível em: https://www.statista.com/topics/751/facebook/. Acesso em: 03 jan. de 2018.
Tanner, B. K.,Warner, G., Stern, H., and Olechowski, S. (2010). Koobface: The evolution of the social botnet. In 2010 eCrime Researchers Summit, pages 1–10.
Thomas, K. and Nicol, D. M. (2010). The koobface botnet and the rise of social malware. In 2010 5th International Conference on Malicious and Unwanted Software, pages 63–70.
Tiwari, V. (2017). Analysis and detection of fake profile over social network. In 2017 International Conference on Computing, Communication and Automation (ICCCA), pages 175–179.
Published
2019-09-02
How to Cite
LEITE, Vanessa; SALLES, Ronaldo.
Design e implementação de uma arquitetura conceitual para a criação de social botnet em redes sociais. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 19. , 2019, São Paulo.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2019
.
p. 337-350.
DOI: https://doi.org/10.5753/sbseg.2019.13982.
