Online Social Media (OSM) |
||||||||||||||||||||||||
Phone number, a unique identifier has emerged as an important Personally Identifiable Information (PII) in the last few years. Other PII like e-mail and online identity have been exploited in the past to launch phishing and spam attacks against them. The reach and security of a phone number provides a genuine advantage over e-mail or online identity, making it the most vulnerable attack vector. In this work, we explore the emerging threats that abuse phone numbers by exploiting cross-platform features. One of the prominent and new form of mobile communication, due to the convergence of telephony with the Internet, are Over-The-Top (OTT) messaging applications (like WhatsApp, Viber, and WeChat). In this research, we studied the feasibility and scalability of crafting targeted attacks on OTT messaging applications.
Applications like Truecaller and Facebook can be exploited to collect private and personal information which can be aggregated for targeted attacks. We investigated how easy it would be for a potential attacker to launch automated targeted and non-targeted attacks on OTT messaging applications to a fairly large user population. Given that the telephony medium is not as well defended as e-mail, we believe that these contributions offer a promising new direction and demonstrate the urgent need for better security for such applications. This work is in collaboration with Dr. Payas Gupta and Prof. Mustaque Ahamad. If you are interested in knowing more or helping us with the research please write to pk [at] iiitd [dot] ac [dot] in |
||||||||||||||||||||||||
About project... |
||||||||||||||||||||||||
Online Social Media (OSM) has emerged as a promising resource for police to connect with citizens for collective action. In contrast to traditional media, OSM offers velocity, variety, veracity and large volume of information. These introduce new challenges for police like platforms selection, secure usage strategy, developing trust, handling offensive comments, and security / privacy implication of information shared through OSM. Success of police initiatives on OSM to maintain law and order depends both on their understanding of OSM and citizen’s acceptance / participation on these platforms. The attributes of police citizen interactions on OSM remain under-explored. We are working towards proposing and designing technological support for improved policing and to help understand citizen opinions and safety concerns via social media. We have also been actively helping police departments to create their own social media space.
Relevant publications Team Members Portals Developed as part of the project
If you are interested in knowing more or helping us with the research please write to pk [at] iiitd [dot] ac [dot] in |
||||||||||||||||||||||||
Online social media provides people with a platform to disseminate ideas, learn information, explore knowledge, and express their opinions on diverse topics. Especially during crisis and emergency situations, there is a sudden rise in activity over the Internet. People log on to social media websites to check for updates about the event and also to share information about the event with others. In such situations, these [social media content] provide a vast resource of unmonitored and unstructured but rich information and content about events. Since the data is generated in real time and by users many of whom are some times directly or indirectly in the actual event; mining this content can yield quite useful knowledge about the crisis situation. Though a large volume of content is posted on Twitter, not all of the information is trustworthy or useful in providing information about the event. We propose an algorithm based on information retrieval and machine learning techniques to assess the credibility of tweets during high-impact events. Relevant publications
Gupta, A., and Kumaraguru, P. Credibility ranking of tweets during high impact events. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media (PSOSM), In conjuction with WWW'12. Author's version
If you are interested in knowing more or helping us with the research please write to pk [at] iiitd [dot] ac [dot] in |
||||||||||||||||||||||||
The past one decade has witnessed an astounding outburst in the number of online social media (OSM) services, and a lot of these services have enthralled millions of users across the globe. With such tremendous number of users, the amount of content being generated and shared on OSM services is also enormous. As a result, trying to visualize all this overwhelming amount of content, and gain useful insights from it has become a challenge. We present uTrack, a personalized web service to analyze and visualize the diffusion of content shared by users across multiple OSM platforms. Curiosity, understanding the audience, and analysis of professional content like advertisements and marketing campaigns are examples of key benefits provided by our technology. To the best of our knowledge, there exists no work which concentrates on monitoring information diffusion for personal accounts. Currently, uTrack monitors and supports logging in from Facebook, Twitter, and Google+. Once granted permissions by the user, uTrack monitors all URLs (like videos, photos, news articles) the user has shared in all OSM services supported, and generates useful visualizations and statistics from the collected data. Relevant publications Magalhães, T., Dewan, P., Kumaraguru, P., Melo-Minardi, R., and Almeida, V. uTrack: Track Yourself! Monitoring Information on Online Social Media. Accepted at the 22nd International World Wide Web Conference (WWW) (2013). | Author's version Link to uTrack portal Team: If you are interested in knowing more or helping us with the research please write to pk [at] iiitd [dot] ac [dot] in |
||||||||||||||||||||||||
An online user joins multiple social networks in order to enjoy different services. On each joined social network, she creates an identity and constitutes its three major dimensions namely profile, content and connection network. She largely governs her identity formulation on any social network and therefore can manipulate multiple aspects of it. With no global identifier to mark her presence uniquely in the online domain, her online identities remain unlinked, isolated and difficult to search. Earlier research has explored the above mentioned dimensions, to search and link her multiple identities with an assumption that the considered dimensions have been least disturbed across her identities. However, majority of the approaches are restricted to exploitation of one or two dimensions. We make a first attempt to deploy an integrated system (Finding Nemo) which uses all the three dimensions of an identity to search for a user on multiple social networks. The system exploits a known identity on one social network to search for her identities on other social networks. We test our system on two most popular and distinct social networks - Twitter and Facebook. We show that the integrated system gives better accuracy than the individual algorithms. We report experimental findings in the paper. Relevant publications Core members In News (selected ones) Tool If you are interested in knowing more, or helping us with the research, please write to pk [dot] guru [at] iiit [dot] ac [dot] in | ||||||||||||||||||||||||
We are investigating cyber-hate, illegal or malicious form of cyber-protest and cyber-activism in online social media. As a first step, we are focussing on mining YouTube to discover hate videos, users and virtual hidden communities. Finding precise information on YouTube is a challenging task because of the huge size of the YouTube repository and a large subscriber base. Relevant publications Core members Past members |
||||||||||||||||||||||||
Online Social Networks (OSNs) witness a rise in user activity whenever a news-making event takes place. Cyber criminals exploit this spur in user-engagement levels to spread malicious content that compromises system reputation, causes financial losses and degrades user experience. To mitigate the spread of such malicious content, we created the Facebook Inspector. We used two well-established methodologies (URL blacklists and human annotation) for establishing the ground truth and obtained two separate datasets of malicious Facebook posts. Our observations revealed some characteristic differences between malicious posts obtained from the two methodologies, thus demanding a two-fold filtering process for a more complete and robust filtering system. We proposed an extensive feature set based on user profile, textual content, metadata, and URL features to automatically identify malicious content on Facebook in real time. This feature set was used to train multiple machine learning models and achieved an accuracy of over 80% on both datasets. Both models did not perform well when tested across datasets, confirming the need for separate models to detect different types of malicious posts. These models were used to create FbI, browser plug-in to identify malicious Facebook posts in real time.
Relevant publications Core members Developed by Downloads If you are interested in knowing more or helping us with the research please write to pk [at] iiitd [dot] ac [dot] in
Online Social Networks (OSNs) are populated with billions of images, with more than 350 million images being uploaded daily on Facebook itself. With this surge in the amount of image-based content, extracting meaningful content from images has become more important that ever. Native features used in classic image analysis, like color histograms, edges, etc. are not completely representative of what humans perceive when they look at an image. As a preliminary step towards understanding and interpreting image content from a human perspective, we propose Helix, a system that tries to extract some meaningful, human understandable features from an image. Helix summarizes an image with the following: sentiment of the image, sentiment of faces present in the image (if any), and a text label for the image. These features can be used by researchers for image coding, categorization and summarization tasks on a large scale, which are currently carried out manually through human annotation.
Anshuman Suri, CSE undergrad. student, IIIT-D Varun Bharadhwaj, CSE undergrad. student, NIT-Trichy Aditi Mithal, CSE undergrad. student, IIIT-D Prateek Dewan, PhD student, IIIT-D Prof. Ponnurangam Kumaraguru Online demo http://labs.precog.iiitd.edu.in/resources/Helix/ Relevant blog entry http://precog.iiit.ac.in/blog/2016/08/imagesononlinesocialmedia/ If you are interested in knowing more or helping us with the research, please write to pk [dot] guru [at] iiit [dot] ac [dot] in [1] https://www.tensorflow.org/versions/r0.10/tutorials/image_recognition/index.html [2] http://www.ee.columbia.edu/ln/dvmm/vso/download/sentibank.html [3] http://www.pitt.edu/~emotion/ck-spread.htm |
||||||||||||||||||||||||