Cargando…

Disrupting drive-by download networks on Twitter

This paper tests disruption strategies in Twitter networks containing malicious URLs used in drive-by download attacks. Cybercriminals use popular events that attract a large number of Twitter users to infect and propagate malware by using trending hashtags and creating misleading tweets to lure use...

Descripción completa

Detalles Bibliográficos
Autores principales: Javed, Amir, Ikwu, Ruth, Burnap, Pete, Giommoni, Luca, Williams, Matthew L.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Vienna 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9391206/
https://www.ncbi.nlm.nih.gov/pubmed/36035378
http://dx.doi.org/10.1007/s13278-022-00944-2
_version_ 1784770822357909504
author Javed, Amir
Ikwu, Ruth
Burnap, Pete
Giommoni, Luca
Williams, Matthew L.
author_facet Javed, Amir
Ikwu, Ruth
Burnap, Pete
Giommoni, Luca
Williams, Matthew L.
author_sort Javed, Amir
collection PubMed
description This paper tests disruption strategies in Twitter networks containing malicious URLs used in drive-by download attacks. Cybercriminals use popular events that attract a large number of Twitter users to infect and propagate malware by using trending hashtags and creating misleading tweets to lure users to malicious webpages. Due to Twitter’s 280 character restriction and automatic shortening of URLs, it is particularly susceptible to the propagation of malware involved in drive-by download attacks. Considering the number of online users and the network formed by retweeting a tweet, a cybercriminal can infect millions of users in a short period. Policymakers and researchers have struggled to develop an efficient network disruption strategy to stop malware propagation effectively. We define an efficient strategy as one that considers network topology and dependency on network resilience, where resilience is the ability of the network to continue to disseminate information even when users are removed from it. One of the challenges faced while curbing malware propagation on online social platforms is understanding the cybercriminal network spreading the malware. Combining computational modelling and social network analysis, we identify the most effective strategy for disrupting networks of malicious URLs. Our results emphasise the importance of specific network disruption parameters such as network and emotion features, which have proved to be more effective in disrupting malicious networks compared to random strategies. In conclusion, disruption strategies force cybercriminal networks to become more vulnerable by strategically removing malicious users, which causes successful network disruption to become a long-term effort.
format Online
Article
Text
id pubmed-9391206
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Springer Vienna
record_format MEDLINE/PubMed
spelling pubmed-93912062022-08-22 Disrupting drive-by download networks on Twitter Javed, Amir Ikwu, Ruth Burnap, Pete Giommoni, Luca Williams, Matthew L. Soc Netw Anal Min Original Article This paper tests disruption strategies in Twitter networks containing malicious URLs used in drive-by download attacks. Cybercriminals use popular events that attract a large number of Twitter users to infect and propagate malware by using trending hashtags and creating misleading tweets to lure users to malicious webpages. Due to Twitter’s 280 character restriction and automatic shortening of URLs, it is particularly susceptible to the propagation of malware involved in drive-by download attacks. Considering the number of online users and the network formed by retweeting a tweet, a cybercriminal can infect millions of users in a short period. Policymakers and researchers have struggled to develop an efficient network disruption strategy to stop malware propagation effectively. We define an efficient strategy as one that considers network topology and dependency on network resilience, where resilience is the ability of the network to continue to disseminate information even when users are removed from it. One of the challenges faced while curbing malware propagation on online social platforms is understanding the cybercriminal network spreading the malware. Combining computational modelling and social network analysis, we identify the most effective strategy for disrupting networks of malicious URLs. Our results emphasise the importance of specific network disruption parameters such as network and emotion features, which have proved to be more effective in disrupting malicious networks compared to random strategies. In conclusion, disruption strategies force cybercriminal networks to become more vulnerable by strategically removing malicious users, which causes successful network disruption to become a long-term effort. Springer Vienna 2022-08-20 2022 /pmc/articles/PMC9391206/ /pubmed/36035378 http://dx.doi.org/10.1007/s13278-022-00944-2 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Original Article
Javed, Amir
Ikwu, Ruth
Burnap, Pete
Giommoni, Luca
Williams, Matthew L.
Disrupting drive-by download networks on Twitter
title Disrupting drive-by download networks on Twitter
title_full Disrupting drive-by download networks on Twitter
title_fullStr Disrupting drive-by download networks on Twitter
title_full_unstemmed Disrupting drive-by download networks on Twitter
title_short Disrupting drive-by download networks on Twitter
title_sort disrupting drive-by download networks on twitter
topic Original Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9391206/
https://www.ncbi.nlm.nih.gov/pubmed/36035378
http://dx.doi.org/10.1007/s13278-022-00944-2
work_keys_str_mv AT javedamir disruptingdrivebydownloadnetworksontwitter
AT ikwuruth disruptingdrivebydownloadnetworksontwitter
AT burnappete disruptingdrivebydownloadnetworksontwitter
AT giommoniluca disruptingdrivebydownloadnetworksontwitter
AT williamsmatthewl disruptingdrivebydownloadnetworksontwitter