GR Semicolon EN

Show simple item record

dc.contributor.author
Semkou, Athanasia-Maria
en
dc.date.accessioned
2015-06-24T08:23:56Z
dc.date.available
2015-09-27T05:58:44Z
dc.date.issued
2015-06-24
dc.identifier.uri
https://repository.ihu.edu.gr//xmlui/handle/11544/512
dc.rights
Default License
dc.title
Social zombies: modus operandi and countermeasures
en
heal.type
masterThesis
heal.keyword
Internet--Security measures
en
heal.keyword
Internet--Safety measures
en
heal.keyword
Computer crimes
en
heal.keyword
Electronic countermeasures
en
heal.keyword
Computer networks--Security measures
en
heal.keyword
Instant messaging
en
heal.keyword
Dissertations, Academic
en
heal.keywordURI.LCSH
Online Social Networks
heal.keywordURI.LCSH
Social Zombies
heal.keywordURI.LCSH
Bots
heal.keywordURI.LCSH
Detection
heal.keywordURI.LCSH
Social Engineering
heal.keywordURI.LCSH
Facebook
heal.keywordURI.LCSH
ChatBot
heal.keywordURI.LCSH
Instant Messaging
heal.language
en
heal.access
free
el
heal.license
http://creativecommons.org/licenses/by-nc/4.0
heal.recordProvider
School of Science and Technology, MSc in Information & Communication Technology Systems
heal.publicationDate
2013-11
heal.bibliographicCitation
Semkou Athanasia-Maria, 2013, Social zombies : modus operandi and countermeasures, Master's Dissertation, International Hellenic University
en
heal.abstract
The development and the wide acceptance of the Online Social Networks intrigued many hackers who, taking advantage of the weaknesses in OSNs’ systems and the naivety of users by attacking them on a daily basis for profit. The objective of this thesis was to investigate and study this phenomenon and analyze the attackers’ "modus operandi", with the aim of automating the detection of Social Zombies. For the purposes of this study, there is a brief review of the social networking development and security and privacy that they provide a description of the attacker’s motives. Moreover, a presentation of OSNs’ weaknesses and incidents, suggestions for ways of protecting individual users and companies and, finally, a description of a way of using standalone Facebook chats and what they can provide.
en
heal.tableOfContents
Abstract ..................................................................................................................................... 1 Acknowledgements ................................................................................................................... 2 Table of Figures ......................................................................................................................... 4 CHAPTER 1: INTRODUCTION ..................................................................................................... 6 1.1 SOCIAL NETWORK WEBSITES ..................................................................................... 6 1.2 DEVELOPMENT .......................................................................................................... 9 1.3 PRIVACY ................................................................................................................... 14 1.4 SECURITY ................................................................................................................. 17 CHAPTER 2: LITERATURE REVIEW ............................................................................................ 19 2.1 SOCIAL ZOMBIES .......................................................................................................... 19 2.2 BOTS ............................................................................................................................ 20 2.2.1 Bots Categories and Types .................................................................................... 21 2.2.2 Bot threads and attacks ........................................................................................ 22 2.3 ATTACKERS .................................................................................................................. 25 2.3.1 Attacker’s profile .................................................................................................. 27 2.3.2 Hacker’s motivations ............................................................................................ 28 2.4 FAKE USER ACCOUNTS ............................................................................................ 30 2.4.1 Spam Messages ............................................................................................... 31 2.4.2 Viruses & Worms ............................................................................................. 34 2.4.3 Third Party Threats .......................................................................................... 36 2.4.4 Advertisements and Links ................................................................................ 38 2.4.5 Social Engineering ............................................................................................ 40 2.5 SOCIAL NETWORKING WEBSITE ERRORS ................................................................. 43 2.6 COMPUTER SECURITY/CONTROL ............................................................................. 46 2.6.1 Ariadne program ............................................................................................. 52 4 CHAPTER 3: PROBLEM DEFINITION-­‐CONTRIBUTION ............................................................... 57 3.1 CHATBOTS ............................................................................................................... 57 3.1.1 Available ChatBots ........................................................................................... 58 3.2 SOCIAL ENGINEERING .............................................................................................. 61 3.3 GENERAL IMPLEMENTATION ................................................................................... 63 3.3.1 AIML ................................................................................................................. 64 3.3.2 PYTHON ........................................................................................................... 67 3.4 INSTANT MESSAGING .............................................................................................. 68 3.4.1 The top 10 IM clients for Facebook chat ......................................................... 69 3.5 REQUIREMENTS ANALYISIS – SCENARIOS ............................................................... 80 3.5.1 Scenario 1 ........................................................................................................ 80 3.5.2 Scenario 2 ........................................................................................................ 82 CHAPTER 4: CONCLUSIONS ..................................................................................................... 85 4.1 EVALUATION ............................................................................................................ 85 4.2 PERSONAL REFLECTION ........................................................................................... 86 4.3 FUTURE WORK ......................................................................................................... 87 References ............................................................................................................................... 88 Bibliography ............................................................................................................................ 88
en
heal.advisorName
Katos, Vasileios
en
heal.committeeMemberName
Katos, Prof. Vasileios
en
heal.committeeMemberName
Vakali, A.
en
heal.committeeMemberName
Kontopoulos, Dr. E.
en
heal.academicPublisher
School of Science &Technology, Master of Science (MSc) in Information and Communication Systems
en
heal.academicPublisherID
ihu
heal.numberOfPages
90
heal.fullTextAvailability
true


This item appears in the following Collection(s)

Show simple item record

Related Items