ebook img

Securing Social Networks in Cyberspace PDF

317 Pages·2021·13.076 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Securing Social Networks in Cyberspace

Securing Social Networks in Cyberspace Securing Social Networks in Cyberspace Edited by Al- Sakib Khan Pathan First edition published 2022 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487- 2742 and by CRC Press 2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN CRC Press is an imprint of Taylor & Francis Group, LLC © 2022 Taylor & Francis Group, LLC The right of Al-S akib Khan Pathan to be identified as the author of the editorial material, and of the authors for their indi- vidual chapters, has been asserted in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopy- ing, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978- 750- 8400. For works that are not available on CCC please contact [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identifica- tion and explanation without intent to infringe. ISBN: 978- 0- 367- 68173- 9 (hbk) ISBN: 978- 0- 367- 68175- 3 (pbk) ISBN: 978- 1- 003- 13452- 7 (ebk) DOI: 10.1201/9781003134527 Typeset in Times by SPi Technologies India Pvt Ltd (Straive) To my family Contents Preface ...............................................................................................................................................ix Acknowledgment ..............................................................................................................................xi Editor ...............................................................................................................................................xiii Contributors .....................................................................................................................................xv PART I Protection of Personal Information in Social Networks Chapter 1 User Awareness for Securing Social Networks ............................................................3 Abhijit Bhowmik, S. M. Raihan Gafur, Abrar Rafid, Saiful Azad, Mufti Mahmud, and M. Shamim Kaiser Chapter 2 Privacy-Preserving Analytics for Social Network Data: A Survey of Currently Prevalent Tools ...........................................................................................................17 Rishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed Chapter 3 Enabling Location k- Anonymity in Social Networks ................................................35 Francesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, and Cecilia Labrini Part II Securing Multimedia Contents Chapter 4 Automated Content Classification in Social Media Platforms ...................................53 Thomas M. Chen Chapter 5 Steganographic Botnet C&C Channel Using Twitter .................................................73 Nicholas Pantic and Mohammad Husain Chapter 6 A Deep Learning- Based Model for an Efficient Hate-S peech Detection in Twitter ..................................................................................................123 P. R. Vishnu, Basant Agarwal, P. Vinod, K. A. Dhanya, and Alice Baroni Part III Cyberbullying, Cyberstalking, and Related Issues Chapter 7 Cyberbullying and Cyberstalking on Online Social Networks ................................141 Umit Can and Bilal Alatas vii viii Contents Chapter 8 Cyberbullying Severity Detection Using Deep Learning Techniques: A Multi- Class Classification over Varied Class Balance Data .............163 Sharyar Wani, Khan Nasik Sami, Zian Md Afique Amin, and Yonis Gulzar Chapter 9 Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID- 19 ..............................................................................195 Mohammad Shadab Khan, Sharyar Wani, and Eima Fatima Part IV Other Issues for Securing Social Networks and Online Profiles Chapter 10 Profiling Online Users: Emerging Approaches and Challenges ...............................221 Mohammad Mamun, Muhammad Al- Digeil, and Sherif Saad Ahmed Chapter 11 Securing Mobile Social Networks ............................................................................241 Robert Gordon Chapter 12 Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures ....................255 Md. Tanvir Hasan, Md. Redwan Hossain, and Al- Sakib Khan Pathan Chapter 13 A Tutorial on Cross- Site Scripting Attack: Defense against Online Social Networks ............................................................................................277 Vassilis Papaspirou, Leandros Maglaras, and Mohamed Amine Ferrag Index ..............................................................................................................................................297 Preface Today’s world is unimaginable without online social networks. Nowadays, millions of people con- nect with their friends and families by sharing their personal information with the help of different forms of social media. Using social media is often more convenient than meeting with one another in person but sometimes individuals face different types of issues while maintaining the multimedia contents. For instance, managing audios, videos, photos could be complicated because it is difficult to maintain the security and privacy of these multimedia contents uploaded on a daily basis and often, without enough care of privacy. Simple video can provide a lot of information about a person, about his/her food habit, surroundings, home setting, products used, etc. In fact, sometimes even personal or sensitive information could get viral if that leaks out unintentionally. Any leaked content can be shared and made a topic of popular talk all over the world within few seconds with the help of the social networking sites. In the setting of Internet of Things (IoT) that is supposed to connect millions of devices, such contents could be shared from anywhere anytime. Considering such a setting, this book aimed to collate the key security and privacy concerns faced by individuals and organizations who use various social networking sites differently for different reasons. Current state- of- the- art defense mechanisms that can bring somewhat long- term solutions to tackling these threats, were also be considered. As the call for chapters were disseminated, we got a great response from the authors, based all around the globe. After a rigorous selection process, we could accept and include a total of 13 chap- ters in this book. A total of 40 authors represent at least 12 countries: Algeria, Australia, Bangladesh, Canada, Greece, India, Italy, Malaysia, Saudi Arabia, Turkey, UK, and USA. This shows the diver- sity of geographical locations for the contributors to this book. The book has four parts, and each part has similarly themed chapters. The first three parts contain three chapters each and the last one contains four chapters. The parts are labeled as follows: Part I: Protection of Personal Information in Social Networks Part II: Securing Multimedia Contents Part III: Cyberbullying, Cyberstalking, and Related Issues Part IV: Other Issues for Securing Social Networks and Online Profiles Each chapter is written in a way that should be easily accessible to the general readers as well as to the experts working in this domain. We hope that the chapters would provide a sufficient amount of beneficial information for research works for the graduate students at the PhD and master’s levels, for the academics, researchers in the laboratories, and the people related to the industry. Al- Sakib Khan Pathan Independent University, Bangladesh ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.