Title :
A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks
Author :
Faghani, M.R. ; Uyen Trang Nguyen
Author_Institution :
Dept. of Comput. Sci. & Eng., York Univ., Toronto, ON, Canada
Abstract :
We present analytical models and simulation results that characterize the impacts of the following factors on the propagation of cross-site scripting (XSS) worms in online social networks (OSNs): 1) user behaviors, namely, the probability of visiting a friend´s profile versus a stranger´s; 2) the highly clustered structure of communities; and 3) community sizes. Our analyses and simulation results show that the clustered structure of a community and users´ tendency to visit their friends more often than strangers help slow down the propagation of XSS worms in OSNs. We then present a study of selective monitoring schemes that are more resource efficient than the exhaustive checking approach used by the Facebook detection system which monitors every possible read and write operation of every user in the network. The studied selective monitoring schemes take advantage of the characteristics of OSNs such as the highly clustered structure and short average distance to select only a subset of strategically placed users to monitor, thus minimizing resource usage while maximizing the monitoring coverage. We present simulation results to show the effectiveness of the studied selective monitoring schemes for XSS worm detection.
Keywords :
graph theory; invasive software; social networking (online); user interfaces; Facebook detection system; OSN; XSS worm detection mechanism; XSS worm propagation mechanism; community size; community structure; cross-site scripting worm; exhaustive checking approach; monitoring coverage; online social networks; probability; selective monitoring schemes; user behaviors; user read operation; user write operation; Computer worms; Malware; Modeling; Social network services; Computer worms; cross-site scripting; malware; online social networks; worm propagation modeling;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2013.2280884