Hilal Almarabeh, Amjad Sulieman


Social networks are websites that enable people to communicate with others, express their opinions, and share their thoughts, experiences, and interests. It also contributes to job creation and facilitates the marketing of various products and services. A cyber threat is the malicious attempt to access a computer network through a data communications pathway by illegal means; they can be intended or unintended, direct or indirect, and are usually carried out by hackers, virus code writers, industrial spies, organized crime unions, vengeful employees and spiteful intruders. This paper presents the history of online social networking and classifies their types; it also discusses cyber threats on social networking websites and puts forward a policy and action plan to counter threats to social networks in the future.


Social Networking Sites; Cyber Threats; Security Issues; Risk Prevention; Threats Vulnerabilities

Full Text:



S. Hathi, “How Social Networking Increases Collaboration at IBM”, Strategic Communication Management, vol. 14, no. 1, (2009), pp. 32-35., «”Instant” threats», Denis Maslennikov, Boris Yampolskiy, 27.05.2008.

Hak J. Kim " Online Social Media Networking and Assessing Its Security Risks:, International Journal of Security and Its Applications, Vol. 6, No. 3, July, 2012.

Davison, H.K.; Maraist, C.C.; Hamilton, R.; Bing, M.N. To Screen or Not to Screen? Using the Internet for Selection Decisions. Empl. Responsib. Rights J. 2012, 24, 1–21.

Baltazar, J.; Costoya, J.; Flores, R. “The Real Face of Koobface”: The Largest Web 2.0 Botnet Explained. Trend Micro Threat Research, 2009.

Alghamdi, B.; Watson, J.; Xu, Y. “Toward detecting malicious links in online social networks through user behavior”. In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence Workshops, Omaha, NE, USA, 13-16 October 2016; pp.5-8.

Muhammet Baykara and Zahit Ziya Gürel, “Detection of phishing attacks”, 2018 IEEE, 978-1-5386-3449-3/18.

Protalinski, E. Chinese Spies Used Fake Facebook Profile to Friend Nato Officials. Available online:

A.Vishwanath,”Getting phished on social media”, “Decisios Support Systems”, ELSEVIER., Vol. 103, November 2017, Pages 70-81.

Raman, P.: ,”JaSPIn: JavaScript based anomaly detection of cross-site scripting attacks.”, Ph.D. thesis, Carleton University, Ottawa (2008).

Faghani, M.R.; Nguyen, U.T., “A study of XSS worm propagation and detection mechanisms in online social

networks.”, IEEE Trans. Inf. Forensics Secur. 2013, 8, 1815–1826.

S. T., Joshi, J., & Tipper, D. Zargar, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. ," IEEE communications surveys & tutorials, 2013.

Anstee, D., Escobar, J., Chui, C.F., Sockrider,G.2015,Jan 27). 10th Annual Worldwide Infrastructure Security Report. Arbor Networks Inc.

Arora, K., Kumar, K., & Sachdeva, M. (2011). Impact analysis of recent DDoS attacks. International Journal on Computer Science and Engineering,3(2), 877-883.

Zainab S. Alwan, Manal F. Younis, "Detection and Prevention of SQL Injection Attack: A Survey", International Journal of Computer Science and Mobile Computing, Vol.6 Issue.8, August- 2017, pp. 5-17.

Rua Mohamed Thiyah, Iyab Musab A. M. Ali, Farooq Basil Abdulqader," THE IMPACT OF SQL INJECTION ATTACKS ON THE SECURITY OF DATABASES", Proceedings of the 6th International Conference on Computing and Informatics, ICOCI 2017 25-27 April, 2017 Kuala Lumpur. Universiti Utara Malaysia .

Vatu, G., (2017), Critical SQL Injection Vulnerability Found in NextGEN Gallery WorldPress Plugin

Amir, W., (2017), Gun retailer Airsoft GI’s Forum hacked; 65,000 user accounts leaked

Fuchs, C.; Trottier, D., “Towards a theoretical model of social media surveillance in contemporary society”, Commun. Eur. J. Commun. Res. 2015, 40, 113–135.

IAN BROWN,” Social Media Surveillance”, The International Encyclopedia of Digital Communication and Society, First Edition”, 2015 John Wiley & Sons, Inc. Published 2015 by John Wiley & Sons, Inc., DOI: 10.1002/9781118290743.wbiedcs122.

S. Nowson and J. Oberlander, "The identity of bloggers: Openness and gender in personal weblogs In Proc. of AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs", pages 163–167, 2006.

Ali, S.; Rauf, A.; Islam, N.; Farman, H.; Khan, S. User Profiling:, "A Privacy Issue in Online Public Network.", Sindh Univ. Res. J. (Sci. Seri.) 2017, 49, 125–128.

N. Z. Gong and B. Liu,” Attribute Inference Attacks in Online Social Networks”, ACM Transactions on Privacy and Security, Vol. 21, No. 1, Article 3. Publication date: January 2018.

Heatherly, R.; Kantarcioglu, M.; Thuraisingham, B. “Preventing private information inference attacks on social networks.”, IEEE Trans. Knowl. Data Eng. 2013, 25, 1849–1862.

Viswanath, B.; Bashir, M.A.; Crovella, M.; Guha, S.; Gummadi, K.P.; Krishnamurthy, B.; Mislove, A., “Towards Detecting Anomalous User Behavior in Online Social Networks.”, In Proceedings of the USENIX Security Symposium, San Diego, CA, USA, 20–22 August 2014; pp. 223–238.

Sloane Burke Winkelman, Jody Oomen Early, Ashley D. Walker, Lawrence Chu , Alice Yick-Flanagan,” Exploring Cyber Harassment among Women Who Use Social Media”, Universal Journal of Public Health 3(5): 194-201, 2015. DOI: 10.13189/ujph.2015.030504. harassment-2017/

Lundeen, R.; Ou, J.; Rhodes, T.," New Ways Im Going to Hack Your Web APP". Black Hat Abu Dhabi, 2011. Available Online: 11/bh-ad-11-archives.html#Lundeen.

BCC Risk Advisory Ltd., 2016 Vulnerability Statistics Report Edgescan, 2016. Available Online:

K. MURPHY, "Web Photos That Reveal Secrets, Like Where You Live", The New York Times, AUG,11, 2010.

L. Humphreys, P. Gill, and B. Krishnamurthy,"How much is too much? Privacy issues on Twitters.", In Conference of International Communication, Pages 1-29. ACM Press, 2010.

H. Mao, X. Shuai, A.Kapadia, "Loose Tweets: An Analysis of Privacy Leaks on Twitter", In proceeding of the 10th annual ACM workshop on privacy in the electronic scoiety, pages 1-12. ACM, October, 2011.

Bolton, R.J. and Hand, D.J. 2002. Statistical Fraud Detection: A Review. Statistical Science. 17, 3 (2002), 235–249.

Torabi, S.; Beznosov, K. Privacy Aspects of Health Related Information Sharing in Online Social Networks. In Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, Washington, DC, USA, 12 August 2013; p. 3.

Scism, L.; Maremont, M. Insurers Test Data Profiles to Identify Risky Clients. The Wall Street Journal, 19 November 2010.

Wani, M.A.; Jabin, S.; Ahmad, N. A sneak into the Devil’s Colony-Fake Profiles in Online Social Networks. Available online: 2018.

Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu," The Socialbot Network: When Bots Socialize for Fame and Money",In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011.

Ding, X.; Zhang, L.; Wan, Z.; Gu, M.,” A brief survey on de-anonymization attacks in online social networks”. In Proceedings of the IEEE International Conference on Computational Aspects of Social Networks (CASoN 2010), Taiyuan, China, 26–28 September 2010; pp. 611–615.

Gulyás, G.G.; Simon, B.; Imre, S. An Efficient and Robust Social Network De-anonymization Attack. In Proceedings of the Workshop on Privacy in the Electronic Society, Vienna, Austria, 24 October 2016; pp. 1–11.

Wei-Han Lee, Changchang Liu, Shouling Ji, “Blind De-anonymization Attacks using Social Networks”, Proceedings of the 2017 on Workshop on privacy in the Electronic Society. Dallas, Texas, USA, October 2017.

Chang, Lulu, "Wookie mistake: 'starwars' is now one of the world's 25 worst passwords". January 19, 2016. Digital Trends.

Bruner, Raisa,"The 25 Worst Passwords You Should Never Use". January 23, 2017. TIME.

Korosec, Kirsten,"The 25 Most Common Passwords of 2017 Include 'Star Wars'". FORTUNE. December 19, 2017

Ehrenkranz, Melanie, "The 25 Most Popular Passwords of 2018 Will Make You Feel Like a Security Genius". Gizmodo. December 13, 2018. 2018/10/Cybersecurity-Presentation-October-2018.pdf.



  • There are currently no refbacks.

Copyright (c) 2019 International Journal of Advanced Research in Computer Science