social networks and security - joseph bonneau€¦ · 22/6/2010  · social networks and security...

90
Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Upload: others

Post on 17-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Social networks and security

Check Point Jun 22, 2010

Joseph Bonneau, Computer Laboratory

Page 2: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Building a secure social web is very difficult

Page 3: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Building a secure social web is very difficult

web application environment

inferencecontrol onhuge graphs

human fallibility & laziness

Page 4: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Building a secure social web is very difficult

web application environment

inferencecontrol onhuge graphs

human fallibility & laziness

Page 5: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #1a: Photo URL Forging

Photo Exploits: PHP parameter fiddling (Ng, 2008)

Page 6: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #1b: Photo URL Forging

Photo Exploits: Content Delivery Network URL fiddling

Page 7: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #1c: JS Photo Album listing

Page 8: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #1c: JS Photo Album listing

JavaScript addition:

javascript:(function(){function y(){if(x.readyState==4){q=x.responseText.substring(9);p=eval(’('+q+’)');document.getElementById(’tab_canvas’).innerHTML=p.payload.tab_content;}}x=window.XMLHttpRequest?new window.XMLHttpRequest:(window.ActiveXObject?new ActiveXObject(”MSXML2.XMLHTTP”):null);x.onreadystatechange=y;x.open(’POST’,'http://www.facebook.com/ajax/profile/tab.php’,true);x.send(’id=’+ProfileURIController._profileId+’&v=photos&__a=1′);})()

Page 9: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #1c: JS Photo Album listing

Page 10: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

The complexity of modern web applications

Page 11: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

The complexity of modern web applications

Page 12: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

The complexity of modern web applications

Page 13: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

The complexity of modern web applications

Page 14: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Web 2.0

Function Internet versionHTML, JavaScript FBML

DB Queries SQL FBQLEmail SMTP FB Mail

Forums Usenet, etc. FB GroupsInstant Messages XMPP FB Chat

News Streams RSS FB StreamAuthentication FB ConnectPhoto Sharing FB PhotosVideo Sharing FB Video

FB NotesTwitter, etc. FB Status Updates

FB PointsEvent Planning FB EventsClassified Ads FB Marketplace

Facebook versionPage Markup

OpenIDFlickr, etc.

YouTube, etc.Blogging Blogger, etc.

MicrobloggingMicropayment Peppercoin, etc.

E-Vitecraigslist

Page 15: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #2: FBML Translation

Facebook Markup Language

Result: arbitrary JavaScript execution (Felt, 2007)

Translated into HTML:

Page 16: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #3: Facebook Query Language

Facebook Query Language Exploits (Bonneau, Anderson, Danezis, 2009)

Page 17: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #4: Facebook XSRF/Automatic Authentication

Credit: Ronan Zilberman

Page 18: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Parallel Trend: The Addition of Social Context

“Given sufficient funding, all web sites expand in functionality until users can add each other as friends”

Page 19: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Rapid growth of the social web

Given sufficient funding, all web sites expand in functionality until users can add each other as friendsuntil users can share their activity with their friends

Page 20: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Facebook appears to have 'won'

Page 21: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #5: Data leakage to third parties

Page 22: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Facebook Application Architecture

Hack #5: Data leakage to third parties

Page 23: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

URL for banner ad

http://sochr.com/i.php&name=[Joseph Bonneau]&nx=[My User ID]&age=[My DOB]&gender=[My Gender]&pic=[My Photo URL]&fname0=[Friend #1 Name 1]&fname1=[Friend #2 Name]&fname2=[Friend #3 Name]&fname3=[Friend #4 Name]&fpic0=[Friend #1 Photo URL]&fpic0=[Friend #2 Photo URL]&fpic0=[Friend #3 Photo URL]&fpic0=[Friend #4 Photo URL]&fb_session_params=[All of the quiz application's session parameters]

Hack #5: Data leakage to third parties

Page 24: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

What the users sees...

Hack #5: Data leakage to third parties

Page 25: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #5: Data leakage to third parties

Many ways to leak!

Referer:http://delb.opt.fimserve.com/adopt/...&uid=XXXX&

Request URI:www.ilike.com&utmhid=1289997851&utmr=http://fb.ilike.com/facebook/auto_playlist_search?name=XXX&

Cookie (“hidden” third-party server)

Page 26: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #6: Cross-site scripting

http://www.facebook.com/connect/prompt_permissions.php?ext_perm=read_stream

Credit: theharmonyguy

Page 27: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #6: Cross-site scripting

http://www.facebook.com/connect/prompt_permissions.php?ext_perm=1

Credit: theharmonyguy

Page 28: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #6: Cross-site scripting

http://www.facebook.com/connect/prompt_permissions.php?ext_perm=%3Cscript%3Ealert(document.getElementById(%22post_form_id%22).value);%3C/script%3E

Credit: theharmonyguy

Page 29: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #7: Clickjacking

Page 30: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #7: Clickjacking

Page 31: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #7: Clickjacking

Page 32: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #8: User identification by history stealing

(Wondracek, Holz, Kirda, Kruegel 2010)

Page 33: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #8: User identification by history stealing

(Wondracek, Holz, Kirda, Kruegel 2010)

Page 34: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #9: User identification by Google docs

(Narayanan 2010)

Page 35: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Hack #10: Facebook chat bug

Page 36: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Building a secure social web is very difficult

web application environment

inferencecontrol onhuge graphs

human fallibility & laziness

Page 37: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

SNS Threat Model

Page 38: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

SNS Threat Model

Account compromise

Computer compromise

Monetary Fraud

Undesired sharing

Impersonation

Page 39: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

All internet security scams have an SNS variant

− Phishing− Spam− 419 Scams & Fraud− Identity Theft/Impersonation− Malware− Cross-site Scripting− Click-Fraud− Stalking, Harassment, Bullying, Blackmail

Page 40: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Phishing

Genuine Facebook emails

Page 41: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Password Sharing

Page 42: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Spam

Page 43: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Malware

Koobface worm, launched August 2008

Page 44: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Malware

Koobface worm, launched August 2008

Page 45: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

“Lost in London” Scams

Calvin: heyEvan: holy moly. what's up man?Calvin: i need your help urgentlyEvan: yes sirCalvin: am stuck here in londonEvan: stuck?Calvin: yes i came here for a vacationCalvin: on my process coming back home i was robbed inside the hotel i loged inEvan: ok so what do you needCalvin: can you loan me $900 to get a return ticket back home and pay my hotel billsEvan: how do you want me to loan it to you?Calvin: you can have the money send via western union

Page 46: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Profile Hijacking

Facebook Linkedin

Page 47: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Scam differences in the SNS world

Each has advantages and disadvantages

− Centralisation

− Social Connections

− Personal Information

Page 48: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Easy to share more than intended

Page 49: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Complexity of privacy controls

Page 50: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Complexity of privacy controls

Page 51: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Orkut Photo Tagging

Complexity of privacy controls

Page 52: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Facebook Connect

Complexity of privacy controls

Page 53: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Granularity problems with third party apps

− Applications given full access to profile data of installed users− Even less revenue available for application developers...

Page 54: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Invisibility of privacy

Page 55: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Invisibility of privacy

Page 56: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Invisibility of privacy

Page 57: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Don't read the TOS

Terms of Service, hi5:

Page 58: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Building a secure social web is very difficult

web application environment

inferencecontrol onhuge graphs

human fallibility & laziness

Page 59: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

“A powerful window into our souls”

Page 60: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

“Traditional” Social Network Analysis

• Performed by sociologists, anthropologists, etc. since the 70's

• Use data carefully collected through interviews & observation

• Typically < 100 nodes

• Complete knowledge

• Links have consistent meaning

• All of these assumptions fail badly for online social network data

Page 61: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Traditional Graph Theory

• Nice Proofs

• Tons of definitions

• Ignored topics:

• Large graphs

• Sampling

• Uncertainty

Page 62: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Models Of Complex Networks From Math & Physics

Many nice models

• Erdos-Renyi

• Watts-Strogatz

• Barabasi-Albert

Social Networks properties:

• Power-law

• Small-world

• High clustering coefficient

Page 63: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Real social graphs are complicated!

Page 64: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

When In Doubt, Compute!

We do know many graph algorithms:

• Find important nodes

• Identify communities

• Train classifiers

• Identify anomalous connections

Major Privacy Implications!

Page 65: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Link structure yields a surprising amount

• Popularity

• Centrality

• Introvert vs. Extrovert

• Leadership potential

• Communities

Page 66: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Homophily causes neighbors to leak even more

• Sexual Orientation

• Gender

• Political Beliefs

• Location

• Breed?

Page 67: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Anonymising a graph is very difficult

B

CF

A

H

D G

E I

A Social Graph with Private Links

Page 68: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Anonymising a graph is very difficult

B

CF 3

2

4A

1H

D G5

E I

Attacker adds k nodes with random edges

Page 69: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Anonymising a graph is very difficult

B

CF 3

2

4A

1H

D G5

E I

Attacker links to targeted nodes

Page 70: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Anonymising a graph is very difficult

Graph is anonymised and edges are released

Page 71: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Anonymising a graph is very difficult

3

2

4

1

5

Attacker searches for unique k-subgroup

Page 72: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Anonymising a graph is very difficult

3

2

4

1H

G5

Link between targeted nodes is confirmed

Page 73: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Public graphs can de-anonymise private graphs

Public Graph Private Graph

Page 74: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Public graphs can de-anonymise private graphs

A

C

BA'

C'

B'

Public Graph Private GraphPublic Graph

Step 1: Identify Seed Nodes

Page 75: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Public graphs can de-anonymise private graphs

A

DC

BA'

D'C'

B'

Public Graph Private GraphPublic Graph

Step 2: Assign mappings based on mapped neighbors

Page 76: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Public graphs can de-anonymise private graphs

A

DC

E

BA'

D'C'

E'

B'

Public Graph Private GraphPublic Graph

Step 3: Iterate

Page 77: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Public graphs can de-anonymise private graphs

A

DC

E

BA'

D'C'

E'

B'

Public Graph Private GraphPublic Graph

Twitter/Flickr: 31% of common users identified with just 30 seeds!

Page 78: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Limited graph views are still useful

3

33

4

4

21

2

6

Average Degree: 3.5

Page 79: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Limited graph views are still useful

3

33

4

4

21

2

6

Sampled with k=2

Page 80: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Limited graph views are still useful

?

??

?

?

?1

?

?

Degree known exactly for one node

Page 81: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Limited graph views are still useful

3.5

3.51.75

3.5

5.25

1.751

1.75

7

Naïve approach: Multiply in-degree by average degree / k

Page 82: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Limited graph views are still useful

3.5

3.52

3.5

5.25

21

2

7

Raise estimates which are less than k

Page 83: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Limited graph views are still useful

3.5

3.52

3.5

5.25

21

2

7

Nodes with high-degree neighbors underestimated

Page 84: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Limited graph views are still useful

3.5

3.53.5

3.5

5.25

21

2

7

Iteratively scale by current estimate / k in each step

Page 85: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Limited graph views are still useful

2.75

2.753.5

3.63

5.5

21

2

5.5

After 1 iteration

Page 86: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Limited graph views are still useful

2.68

2.683.41

3.53

5.35

21

2

5.35

Normalise to estimated total degree

Page 87: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Limited graph views are still useful

2.48

2.833.04

3.64

5.09

21

2

5.91

Convergence after n > 10 iterations

Page 88: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

Large graphs are very fragile to partial compromise

Page 89: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

On the horizon

More interconnectionMore playersanalysing data

More data shared (location)

Page 90: Social networks and security - Joseph Bonneau€¦ · 22/6/2010  · Social networks and security Check Point Jun 22, 2010 Joseph Bonneau, Computer Laboratory

My Reading List

Academic papers:

• http://www.cl.cam.ac.uk/~jcb82/sns_bib/main.html

Blogs

• www.theharmonyguy.com

• www.allfacebook.com

• www.insidefacebook.com

• www.mashable.com

• Questions?