온라인 소셜 네트워크 서비스에서의 프라이버시 및 보안

  • Published : 2013.12.31

Abstract

페이스북이나 트위터 같은 소셜 네트워킹은 최근 몇 년간 큰 인기를 얻고 있다. 매우 많은 사용자가 엄청난 양의 정보를 네트워크상에서 주고받기 때문에, 소셜 네트워크 서비스가 악의적인 사용자들에게는 유용한 공격수단이 될 수 있다. 많은 서비스 제공업체들이 그러한 취약점을 보완하기 위해서 노력을 하지만, 다양한 공격방법들이 새롭게 개발되면서 여전히 소셜 네트워크 서비스 사용자들을 위협하고 있다. 따라서 본 고에서는 온라인 소셜 네트워크에서의 프라이버시 및 보안 이슈를 점검해 보고자 한다.

Keywords

References

  1. "Social Network Users Statistics," http://www. socialnomics.net/2011/08/16/social-network-usersstatistics/
  2. Gilbert Wondracek, Thorsten Holz, Engin Kirda, and Christopher Kruegel, ""Practical Attack to Deanonymize Social Network Users,"" IEEE Symposium on Security and Privacy, 2010, pp.223-238. http:// iseclab.org/papers/sonda-TR.pdf
  3. "Steal Browser History without JavaScript," http:// ha.ckers.org/blog/20070228/steal-browser-historywithout- javascript
  4. Bin Zhou and Jian Pei, "Preserving Privacy in Social Networks Against Neighborhood Attacks," Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, Apr. 2008, pp.506- 515. http://www.cs.sfu.ca/-jpei/publications/ NeighborhoodAnonymization-ICDE08.pdf
  5. Balachander Krishnamurthy and Craig E. Wills, Characterizing Privacy in Online Social Networks," WOSN '08 Proceedings of the first workshop on Online social networks, 2008, pp. 37-42. http:// www2.research.att.com/-bala/papers/posn.pdf
  6. Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda, "All your contacts are belong to us: automated identity theft attacks on social networks," WWW '09Proceedings of the 18th international conference on World Wide Web, 2009, pp.551-560. http://www.iseclab.org/papers/wwwsocialnets. pdf
  7. M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch, "Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam," Internet Computing, IEEE,vol.15, no.3, May- Jun. 2011, pp.28-34. http://www.sba-research. org/wp-content/uploads/publications/FITM_ InternetComputing_preprint.pdf https://doi.org/10.1109/MIC.2011.24
  8. M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch, "Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam," Internet Computing, IEEE,vol.15, no.3, May- Jun. 2011, pp.28-34. http://www.sba-research. org/wp-content/uploads/publications/FITM_ InternetComputing_preprint.pdf https://doi.org/10.1109/MIC.2011.24
  9. Exploitation-Social Networks Malware, ISACA Journal, http://www.rkmingenieria.com/ifol/ wp-content/uploads/2011/03/ISACA_JAN_2011_ ChainExploitation.pdf
  10. "Exploiting a cross-site scripting vulnerability on Facebook, "http://www.acunetix.com/websitesecurity/xss-facebook.htm
  11. M.R.Faghani and H. Saidi, "Social Networks XSS Worms," Computational Science and Engineering, 2009. CSE '09. International Conference on, Oct 2009, pp. 1137-1141.http://faghani.info/CSE09.pdf