The Chameleon Attack: Manipulating Content Display in Online Social Media

3Citations
Citations of this article
45Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Online social networks (OSNs) are ubiquitous attracting millions of users all over the world. Being a popular communication media OSNs are exploited in a variety of cyber-attacks. In this article, we discuss the chameleon attack technique, a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection. Using this technique, adversaries can, for example, avoid censorship by concealing true content when it is about to be inspected; acquire social capital to promote new content while piggybacking a trending one; cause embarrassment and serious reputation damage by tricking a victim to like, retweet, or comment a message that he wouldn't normally do without any indication for the trickery within the OSN. An experiment performed with closed Facebook groups of sports fans shows that (1) chameleon pages can pass by the moderation filters by changing the way their posts are displayed and (2) moderators do not distinguish between regular and chameleon pages. We list the OSN weaknesses that facilitate the chameleon attack and propose a set of mitigation guidelines.

Cite

CITATION STYLE

APA

Elyashar, A., Uziel, S., Paradise, A., & Puzis, R. (2020). The Chameleon Attack: Manipulating Content Display in Online Social Media. In The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020 (pp. 848–859). Association for Computing Machinery, Inc. https://doi.org/10.1145/3366423.3380165

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free