Leak sinks: The threat of targeted social eavesdropping

Yasmin Bokobza, Abigail Paradise, Guy Rapaport, Rami Puzis, Bracha Shapira, Asaf Shabtai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Online social networks are a popular and important channel for people to share, find and disseminate information on a massive scale. Some of the information exposed through these networks is meant to be private. However, sensitive organizational information can be accidentally leaked by employees and become exposed to adversaries or competitors. The threat is escalated due to socialbots used by adversaries to penetrate the informal social network of an organization's employees in order to harvest sensitive information. This study evaluates the ability of an attacker to harvest leaked information using socialbots versus the effort required to wire the profiles into the organizational network. The evaluation is performed using real information diffusion data of two social networks and extensive simulations of socialbot wiring strategies. Our results demonstrate that organizations whose social network topologies are characterized by low clustering coefficient are more vulnerable to eavesdropping. We also show that the most effective socialbot wiring strategy for harvesting information is different from the most effective strategies for infiltrating the organization.

Original languageEnglish
Title of host publicationProceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015
EditorsJian Pei, Jie Tang, Fabrizio Silvestri
PublisherAssociation for Computing Machinery, Inc
Pages375-382
Number of pages8
ISBN (Electronic)9781450338547
DOIs
StatePublished - 25 Aug 2015
EventIEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015 - Paris, France
Duration: 25 Aug 201528 Aug 2015

Publication series

NameProceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015

Conference

ConferenceIEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015
Country/TerritoryFrance
CityParis
Period25/08/1528/08/15

Keywords

  • Information leakage
  • Organization security
  • Social network
  • Socialbot
  • Wiring strategies

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Leak sinks: The threat of targeted social eavesdropping'. Together they form a unique fingerprint.

Cite this