Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective tools for executing spam campaigns and spreading malware. Intuitively, a user is more likely to respond to a message from a Facebook friend than from a stranger, thus making social spam a more effective distribution mechanism than traditional email. In fact, existing evidence shows malicious entities are already attempting to compromise OSN account credentials to support these "high-return" spam campaigns.In this paper, we present an initial study to quantify and characterize spam campaigns launched using accounts on online social networks. We study a large anonymized dataset of asynchronous "wall" messages between Facebook users. We analyze all wall messages received by roughly 3.5 million Facebook users (more than 187 million messages in all), and use a set of automated techniques to detect and characterize coordinated spam campaigns. Our system detected roughly 200,000 malicious wall posts with embedded URLs, originating from more than 57,000 user accounts. We find that more than 70% of all malicious wall posts advertise phishing sites. We also study the characteristics of malicious accounts, and see that more than 97% are compromised accounts, rather than "fake" accounts created solely for the purpose of spamming. Finally, we observe that, when adjusted to the local time of the sender, spamming dominates actual wall post activity in the early morning hours, when normal users are asleep.
Recently, a series of data center network architectures have been proposed. The goal of these works is to interconnect a large number of servers with significant bandwidth requirements. Coupled with these new DCN structures, routing protocols play an important role in exploring the network capacities that can be potentially delivered by the topologies. This article conducts a survey on the current state of the art of DCN routing techniques. The article focuses on the insights behind these routing schemes and also points out the open research issues hoping to spark new interests and developments in this field.
Abstract-Routing in wireless communication systems such as ad hoc networks remains a challenging problem given the limited wireless bandwidth, users' mobility, and potentially large scale. Recently, a thrust of research has addressed these problems-the ondemand routing, geographical routing, and virtual coordinates. In this paper, we focus on geographical routing that has been shown to achieve good scalability without flooding; however, this usually requires the availability of location information and can suffer from poor routing performance and severe dead end problems, especially in sparse networks. Specifically, we propose a new Hop ID routing scheme, which is a virtual coordinate-based routing protocol and does not require any location information. This achieves excellent routing performance comparable with that obtained by the shortest path routing schemes. In addition, we design efficient algorithms for setting up the system and adapt to the node mobility quickly and can effectively route out of dead ends. Extensive analysis and simulation show that the Hop ID-based routing achieves efficient routing for mobile ad hoc networks with various density, irregular topologies, and obstacles.
Abstract-Radio nodes can obtain illegal security gains by performing attacks, and they are motivated to do so if the illegal gains are larger than the resulting costs. Most existing direct reciprocity-based works assume constant interaction among players, which does not always hold in large-scale networks. In this paper, we propose a security system that applies the indirect reciprocity principle to combat attacks in wireless networks. Because network access is highly desirable for most nodes, including potential attackers, our system punishes attackers by stopping their network services. With a properly designed social norm and reputation updating process, the aim is to incur a cost due to the loss of network access to exceed the illegal security gain. Thus rational nodes are motivated to abandon adversary behavior for their own interests. We derive the optimal strategy and the corresponding stationary reputation distribution, and evaluate the stability condition of the optimal strategy using the evolutionarily stable strategy concept. This security system is robust against collusion attacks and can significantly reduce the attacker population for a wide range of attacks when the stability condition is satisfied. Simulation results show that the proposed system significantly outperforms the existing direct reciprocity-based systems, especially in the large-scale networks with terminal mobility. This technique can be extended to many wireless networks, including cognitive radio networks, to improve their security performance.Index Terms-Collusion attacks, evolutionarily stable strategy (ESS), indirect reciprocity, large-scale network, wireless security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.