Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th, 2009Forensics Tools for Social Network Security SolutionsJanet Cheng, Jennifer Hoffman, Therese LaMarche, Ahmet Tavil, Amit Yavad, and Steve KimSeidenberg School of CSIS, Pace University, White Plains, NY 10606, USAAbstractThe usage of Social Network Sites has increasedrapidly in recent years. Since the success of a SocialNetwork Site depends on the number of users itattracts, there is pressure on providers of SocialNetwork sites to design systems that encouragebehavior which increases both the number of usersand their connections. However, like any fast-growing technology, security has not been a highpriority in the development of Social Network Sites.As a result, along with the benefits of Social NetworkSites, significant security risks have resulted.Providing Social Network Site users with tools whichwill help protect them is ideal.Tools are developedfor installation on a user’s computer to provide themthe ability to retrieve other online user informationvia chat and social network websites. These tools willalso benefit law enforcement agents when crimes arecommitted.1.IntroductionThis paper analyzes and extends the forensic toolsdeveloped in an earlier study for protecting SocialNetwork Site users from security threats [14].First,we will identify the security issues found in SocialNetwork Sites.Second, we will demonstrate how ourtools can provide users with more information whichwe hope will help prevent them from becomingvictims.Finally, if a crime has been committed, wewill detail the tools available to assist inapprehending the perpetrator.The tools we developed retrieve Social Network Siteuser’s non-personal-identifiable information, such asIP address, operating system, browser type, etc.Retrieval of this information occurs upon the virtualcontact from that other person, be it by them simplybrowsing our personal page, or by other personcontacting via Virtual Meeting, for example chatting.This paper covers methodologies used, test results,and future goals.The Social Network Site security issues are: [4]Corporate Espionage; Cross Site Scripting, Viruses &Worms; Social Network Site Aggregators; SpearPhishing & Social Network specific Phishing;Infiltration of Networks Leading to data leakage; I.D.Theft; Bullying; Digital Dossier AggregationVulnerabilities;SecondaryDataCollectionVulnerabilities; Face Recognition Vulnerabilities;CBIR (Content-based Image Retrieval); Difficulty ofComplete Account Deletion; Spam; and Stalking.2.Case StudiesThere are many criminal activities arising from theuse of social network sites.For example, a motherwas convicted of computer fraud for her involvementin creating a phony account on MySpace to trick ateenager, who later committed suicide [15].Thetools found in this paper can be used to track and helpminimize or prevent crimes related to social networks.3.MethodologyThe methods used in designing the data retrievaltools and storage mechanisms include PHP websiteswith MySQL databases, Java applets, a Java webapplication with an Access database and NetStat viaMSDOS scripting. We anticipate that many of themethods can be used on any computer without anytechnical know-how.4.Social Networking Websites4.1.DefinitionWe define social network sites as web-based servicesthat allow individuals to (1) construct a public orsemi-public profile within a bounded system, (2)articulate a list of other users with whom they share aconnection, and (3) view and traverse their list ofconnections and those made by others within thesystem. The nature and nomenclature of theseconnections may vary from site to site [2].4.2.Privacy IssuesFacebook's Beacon service tracks activities from allusers in third-party partner sites, including peoplewho never signed up with Facebook or who havedeactivated their accounts.This is an example of avulnerability in Facebook (among others) [10], yet auser can use this vulnerability to their advantage.
