Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning
Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth...
Ausführliche Beschreibung
Autor*in: |
Kumar, Chanchal [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2021 |
---|
Schlagwörter: |
---|
Anmerkung: |
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021 |
---|
Übergeordnetes Werk: |
Enthalten in: Neural processing letters - Springer US, 1994, 53(2021), 1 vom: 05. Jan., Seite 843-861 |
---|---|
Übergeordnetes Werk: |
volume:53 ; year:2021 ; number:1 ; day:05 ; month:01 ; pages:843-861 |
Links: |
---|
DOI / URN: |
10.1007/s11063-020-10416-3 |
---|
Katalog-ID: |
OLC2124185314 |
---|
LEADER | 01000naa a22002652 4500 | ||
---|---|---|---|
001 | OLC2124185314 | ||
003 | DE-627 | ||
005 | 20230505084329.0 | ||
007 | tu | ||
008 | 230505s2021 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11063-020-10416-3 |2 doi | |
035 | |a (DE-627)OLC2124185314 | ||
035 | |a (DE-He213)s11063-020-10416-3-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 000 |q VZ |
100 | 1 | |a Kumar, Chanchal |e verfasserin |4 aut | |
245 | 1 | 0 | |a Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning |
264 | 1 | |c 2021 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021 | ||
520 | |a Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution. | ||
650 | 4 | |a Online social networks | |
650 | 4 | |a Attacks | |
650 | 4 | |a Security | |
650 | 4 | |a Malware analysis | |
650 | 4 | |a Feature extraction | |
650 | 4 | |a Big data | |
650 | 4 | |a Machine learning | |
650 | 4 | |a Deep learning | |
700 | 1 | |a Bharati, Taran Singh |4 aut | |
700 | 1 | |a Prakash, Shiv |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Neural processing letters |d Springer US, 1994 |g 53(2021), 1 vom: 05. Jan., Seite 843-861 |w (DE-627)198692617 |w (DE-600)1316823-X |w (DE-576)052842762 |x 1370-4621 |7 nnns |
773 | 1 | 8 | |g volume:53 |g year:2021 |g number:1 |g day:05 |g month:01 |g pages:843-861 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11063-020-10416-3 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-PSY | ||
912 | |a SSG-OLC-MAT | ||
951 | |a AR | ||
952 | |d 53 |j 2021 |e 1 |b 05 |c 01 |h 843-861 |
author_variant |
c k ck t s b ts tsb s p sp |
---|---|
matchkey_str |
article:13704621:2021----::nieoilewrscrtaoprtvrveuigahnla |
hierarchy_sort_str |
2021 |
publishDate |
2021 |
allfields |
10.1007/s11063-020-10416-3 doi (DE-627)OLC2124185314 (DE-He213)s11063-020-10416-3-p DE-627 ger DE-627 rakwb eng 000 VZ Kumar, Chanchal verfasserin aut Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning 2021 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021 Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution. Online social networks Attacks Security Malware analysis Feature extraction Big data Machine learning Deep learning Bharati, Taran Singh aut Prakash, Shiv aut Enthalten in Neural processing letters Springer US, 1994 53(2021), 1 vom: 05. Jan., Seite 843-861 (DE-627)198692617 (DE-600)1316823-X (DE-576)052842762 1370-4621 nnns volume:53 year:2021 number:1 day:05 month:01 pages:843-861 https://doi.org/10.1007/s11063-020-10416-3 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-PSY SSG-OLC-MAT AR 53 2021 1 05 01 843-861 |
spelling |
10.1007/s11063-020-10416-3 doi (DE-627)OLC2124185314 (DE-He213)s11063-020-10416-3-p DE-627 ger DE-627 rakwb eng 000 VZ Kumar, Chanchal verfasserin aut Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning 2021 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021 Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution. Online social networks Attacks Security Malware analysis Feature extraction Big data Machine learning Deep learning Bharati, Taran Singh aut Prakash, Shiv aut Enthalten in Neural processing letters Springer US, 1994 53(2021), 1 vom: 05. Jan., Seite 843-861 (DE-627)198692617 (DE-600)1316823-X (DE-576)052842762 1370-4621 nnns volume:53 year:2021 number:1 day:05 month:01 pages:843-861 https://doi.org/10.1007/s11063-020-10416-3 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-PSY SSG-OLC-MAT AR 53 2021 1 05 01 843-861 |
allfields_unstemmed |
10.1007/s11063-020-10416-3 doi (DE-627)OLC2124185314 (DE-He213)s11063-020-10416-3-p DE-627 ger DE-627 rakwb eng 000 VZ Kumar, Chanchal verfasserin aut Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning 2021 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021 Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution. Online social networks Attacks Security Malware analysis Feature extraction Big data Machine learning Deep learning Bharati, Taran Singh aut Prakash, Shiv aut Enthalten in Neural processing letters Springer US, 1994 53(2021), 1 vom: 05. Jan., Seite 843-861 (DE-627)198692617 (DE-600)1316823-X (DE-576)052842762 1370-4621 nnns volume:53 year:2021 number:1 day:05 month:01 pages:843-861 https://doi.org/10.1007/s11063-020-10416-3 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-PSY SSG-OLC-MAT AR 53 2021 1 05 01 843-861 |
allfieldsGer |
10.1007/s11063-020-10416-3 doi (DE-627)OLC2124185314 (DE-He213)s11063-020-10416-3-p DE-627 ger DE-627 rakwb eng 000 VZ Kumar, Chanchal verfasserin aut Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning 2021 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021 Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution. Online social networks Attacks Security Malware analysis Feature extraction Big data Machine learning Deep learning Bharati, Taran Singh aut Prakash, Shiv aut Enthalten in Neural processing letters Springer US, 1994 53(2021), 1 vom: 05. Jan., Seite 843-861 (DE-627)198692617 (DE-600)1316823-X (DE-576)052842762 1370-4621 nnns volume:53 year:2021 number:1 day:05 month:01 pages:843-861 https://doi.org/10.1007/s11063-020-10416-3 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-PSY SSG-OLC-MAT AR 53 2021 1 05 01 843-861 |
allfieldsSound |
10.1007/s11063-020-10416-3 doi (DE-627)OLC2124185314 (DE-He213)s11063-020-10416-3-p DE-627 ger DE-627 rakwb eng 000 VZ Kumar, Chanchal verfasserin aut Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning 2021 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021 Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution. Online social networks Attacks Security Malware analysis Feature extraction Big data Machine learning Deep learning Bharati, Taran Singh aut Prakash, Shiv aut Enthalten in Neural processing letters Springer US, 1994 53(2021), 1 vom: 05. Jan., Seite 843-861 (DE-627)198692617 (DE-600)1316823-X (DE-576)052842762 1370-4621 nnns volume:53 year:2021 number:1 day:05 month:01 pages:843-861 https://doi.org/10.1007/s11063-020-10416-3 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-PSY SSG-OLC-MAT AR 53 2021 1 05 01 843-861 |
language |
English |
source |
Enthalten in Neural processing letters 53(2021), 1 vom: 05. Jan., Seite 843-861 volume:53 year:2021 number:1 day:05 month:01 pages:843-861 |
sourceStr |
Enthalten in Neural processing letters 53(2021), 1 vom: 05. Jan., Seite 843-861 volume:53 year:2021 number:1 day:05 month:01 pages:843-861 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Online social networks Attacks Security Malware analysis Feature extraction Big data Machine learning Deep learning |
dewey-raw |
000 |
isfreeaccess_bool |
false |
container_title |
Neural processing letters |
authorswithroles_txt_mv |
Kumar, Chanchal @@aut@@ Bharati, Taran Singh @@aut@@ Prakash, Shiv @@aut@@ |
publishDateDaySort_date |
2021-01-05T00:00:00Z |
hierarchy_top_id |
198692617 |
dewey-sort |
0 |
id |
OLC2124185314 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000naa a22002652 4500</leader><controlfield tag="001">OLC2124185314</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230505084329.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">230505s2021 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11063-020-10416-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2124185314</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11063-020-10416-3-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">000</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kumar, Chanchal</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online social networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Feature extraction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Deep learning</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bharati, Taran Singh</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prakash, Shiv</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Neural processing letters</subfield><subfield code="d">Springer US, 1994</subfield><subfield code="g">53(2021), 1 vom: 05. Jan., Seite 843-861</subfield><subfield code="w">(DE-627)198692617</subfield><subfield code="w">(DE-600)1316823-X</subfield><subfield code="w">(DE-576)052842762</subfield><subfield code="x">1370-4621</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:53</subfield><subfield code="g">year:2021</subfield><subfield code="g">number:1</subfield><subfield code="g">day:05</subfield><subfield code="g">month:01</subfield><subfield code="g">pages:843-861</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11063-020-10416-3</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PSY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">53</subfield><subfield code="j">2021</subfield><subfield code="e">1</subfield><subfield code="b">05</subfield><subfield code="c">01</subfield><subfield code="h">843-861</subfield></datafield></record></collection>
|
author |
Kumar, Chanchal |
spellingShingle |
Kumar, Chanchal ddc 000 misc Online social networks misc Attacks misc Security misc Malware analysis misc Feature extraction misc Big data misc Machine learning misc Deep learning Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning |
authorStr |
Kumar, Chanchal |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)198692617 |
format |
Article |
dewey-ones |
000 - Computer science, information & general works |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1370-4621 |
topic_title |
000 VZ Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning Online social networks Attacks Security Malware analysis Feature extraction Big data Machine learning Deep learning |
topic |
ddc 000 misc Online social networks misc Attacks misc Security misc Malware analysis misc Feature extraction misc Big data misc Machine learning misc Deep learning |
topic_unstemmed |
ddc 000 misc Online social networks misc Attacks misc Security misc Malware analysis misc Feature extraction misc Big data misc Machine learning misc Deep learning |
topic_browse |
ddc 000 misc Online social networks misc Attacks misc Security misc Malware analysis misc Feature extraction misc Big data misc Machine learning misc Deep learning |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Neural processing letters |
hierarchy_parent_id |
198692617 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Neural processing letters |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)198692617 (DE-600)1316823-X (DE-576)052842762 |
title |
Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning |
ctrlnum |
(DE-627)OLC2124185314 (DE-He213)s11063-020-10416-3-p |
title_full |
Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning |
author_sort |
Kumar, Chanchal |
journal |
Neural processing letters |
journalStr |
Neural processing letters |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2021 |
contenttype_str_mv |
txt |
container_start_page |
843 |
author_browse |
Kumar, Chanchal Bharati, Taran Singh Prakash, Shiv |
container_volume |
53 |
class |
000 VZ |
format_se |
Aufsätze |
author-letter |
Kumar, Chanchal |
doi_str_mv |
10.1007/s11063-020-10416-3 |
dewey-full |
000 |
title_sort |
online social network security: a comparative review using machine learning and deep learning |
title_auth |
Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning |
abstract |
Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021 |
abstractGer |
Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021 |
abstract_unstemmed |
Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-PSY SSG-OLC-MAT |
container_issue |
1 |
title_short |
Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning |
url |
https://doi.org/10.1007/s11063-020-10416-3 |
remote_bool |
false |
author2 |
Bharati, Taran Singh Prakash, Shiv |
author2Str |
Bharati, Taran Singh Prakash, Shiv |
ppnlink |
198692617 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11063-020-10416-3 |
up_date |
2024-07-03T22:19:00.490Z |
_version_ |
1803598053237587969 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000naa a22002652 4500</leader><controlfield tag="001">OLC2124185314</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230505084329.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">230505s2021 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11063-020-10416-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2124185314</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11063-020-10416-3-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">000</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kumar, Chanchal</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online social networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Feature extraction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Deep learning</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bharati, Taran Singh</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prakash, Shiv</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Neural processing letters</subfield><subfield code="d">Springer US, 1994</subfield><subfield code="g">53(2021), 1 vom: 05. Jan., Seite 843-861</subfield><subfield code="w">(DE-627)198692617</subfield><subfield code="w">(DE-600)1316823-X</subfield><subfield code="w">(DE-576)052842762</subfield><subfield code="x">1370-4621</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:53</subfield><subfield code="g">year:2021</subfield><subfield code="g">number:1</subfield><subfield code="g">day:05</subfield><subfield code="g">month:01</subfield><subfield code="g">pages:843-861</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11063-020-10416-3</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PSY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">53</subfield><subfield code="j">2021</subfield><subfield code="e">1</subfield><subfield code="b">05</subfield><subfield code="c">01</subfield><subfield code="h">843-861</subfield></datafield></record></collection>
|
score |
7.401991 |