Security Model to Control on Social Media using ...

3 downloads 457 Views 749KB Size Report
Rumors have its own life expectancy and most conversations last for a short ... Another difficulty in implementing social media campaigns is the current lack of ...
Security Model to Control on Social Media using Visualization and Forensic Approach Mohd Nazri Bin Ismail, Mohd Afizi Bin Mohd Shukran, Kamaruzaman Bin Maskat

Security Model to Control on Social Media using Visualization and Forensic Approach 1

Mohd Nazri Bin Ismail, 2Mohd Afizi Bin Mohd Shukran, 3Kamaruzaman Bin Maskat Universiti Pertahanan Nasional Malaysia Kem Sungai Besi, Kuala Lumpur, Malaysia, [email protected] 2,Corresponding Author Universiti Pertahanan Nasional Malaysia Kem Sungai Besi, Kuala Lumpur, Malaysia, [email protected] 3 Universiti Pertahanan Nasional Malaysia Kem Sungai Besi, Kuala Lumpur, Malaysia, [email protected] 1

Abstract Nowadays, alternative media especially social media has played an important role in influencing people on any issues. If there is no controls on social media contents such as illegitimate rumours, edited images or videos and unauthentic statements, then it will affects the way people perceive certain issues based on the social media writers’ view. Therefore, providing cyber security controls on social media is becoming critical particularly for the enforcer in Malaysia such as police. Controlling on social media contents are much more demanding than the conversational media. Moreover, the enforcer has identified the real and virtual information should be protected from any devastating physical, logical/cyber impact. In this long term project, this research has focused on cyber impact to society and also identified cyber problems area like illegitimate rumours, fake non-textual content, wrong perception, unfeasible to trace the irresponsible writers and detecting any malicious data on social media contents. At the end of this project, it is expected to produce controlling rumours propagation model, network forensic analyser prediction model and intelligent image to identify factors on shaping appropriate perception on social media readers activities. This fundamental finding can turn out to be a precursor of NKEA (NKRA) in the field of security. This is because by having security model to control on social media can help to increase the national image, defence and security which in turn can simulate national economic strength.

Keywords: Forensic, Visualization, Social Media 1. Introduction Various false rumors spread through Twitter that can have an impact on society as the declaration of emergency in several areas in Sabah [1] and dissolution of Parliament [2]. Rumors have its own life expectancy and most conversations last for a short period of time. However, control of the spread of rumors is necessary to ensure that the impact to society can be minimized as possible. Facebook has reported that 300 million photos/pictures are uploaded per day. The large volume of images leaving a network presents a challenge to network security professionals auditing traffic due to the fact that data covert communication can take advantage of this legitimate traffic. Modern network security devices fail to catch this traffic due to the ubiquitous characteristics of this traffic. One possible way to overcome this problem is by running a detection system that would analyse for any activities message which has been sent through social media within the network. The term “social media” is used somewhat loosely to describe an array of new Web 2.0 platforms. Although they are not always clearly distinguished in the literature, the interactivity associated with “social media” should be differentiated from more generalized forms of onlineuser engagement. For

Advances in Information Sciences and Service Sciences(AISS) Volume7, Number4, August 2015

37

Security Model to Control on Social Media using Visualization and Forensic Approach Mohd Nazri Bin Ismail, Mohd Afizi Bin Mohd Shukran, Kamaruzaman Bin Maskat

instance, many websites invite users to input their own information, customize the layout and look of a page, prioritize certain kinds of content, or keep track of their own online activities overtime. Social media, by contrast, is characterized by interactivity across multiple horizontal connections, which produce in aggregate a mutable, collectively generated user experience. Even within a single platform, users make use, to varying degrees, of the opportunities afforded for collaboration and social networking. YouTube, for instance, can be used simply as a broadcast medium for propagating a movie trailer or public service ad. It is only when other users begin to link to, remix, repurpose, and discuss posted content that YouTube’s character as a social media platform comes fully into view. Due to the above problems, this study will design a tool that able to analyse the meaningful information for network administrator and easy to investigate and capture illegal activities on social media impacts.

2. Related works Social media is defined as “the use of technology combined with social interaction to create or cocreate value” [2]. It is an emerging channel for marketing around the globe. In the modern days where social media is widely used, what needs to be communicated to the customers is, in a way, determined by them [2]. This means corporations have become less powerful in controlling the flow of communication even about their brands. The sharing of tweets, Facebook posts, blogs, videos, pictures etc. among the public shapes the brand image of a corporation [3]. Chris Fill [3] points out that there are many factors that make this channel more effective than the traditional ways of marketing communication. While traditional media communicates on a one-to-many basis which leads to mass marketing, the new media achieves one-to-one and many-to-many communication which is more successful due to an individualized approach [5]. The traditional media creates a flow of information from one party to the other whereas the digital media allows two-way dialogues. The social media caters to the individual needs of the consumers and is thereby more effective than conventional communication channels fulfilling general needs. The target population is divided into various segments based on their characteristics for traditional communication while the new generation media creates communities among the target audience for better reach of communicated messages. It is also important for all the members of the organizations to communicate the same message. David Williamson [6] says that all staff needs to be aware of the brand position and communicate a consistent message, particularly in the case of non-profit organizations. Another difficulty in implementing social media campaigns is the current lack of evidence supporting a positive impact on desired behaviour changes. As described in this report, there is good evidence that these strategies increase reach, and with user-generated content can improve confidence in messaging but little evidence connecting the use of social media platforms with behavioural changes [7]. The lag between the research cycle and the rapid evolution of social media platforms and norms in health information seeking behaviours continues to pose challenges for evidence-based communications strategies [8]. Frequently it takes between six months and two years to bring a controlled study of a health communication intervention to press. Yet, social media trends are measured in months, not years, and while some behaviours seem to be evolving slowly over time and relatively stable (searching Google for health information), others, like the emergence of micro-blogging, have rapidly transformed day-to-day communication habits and similarly require rapid responses by public health agencies [9].

38

Security Model to Control on Social Media using Visualization and Forensic Approach Mohd Nazri Bin Ismail, Mohd Afizi Bin Mohd Shukran, Kamaruzaman Bin Maskat

The Journal of Medical Internet Research is attempting to address these issues by implementing a rapid review process, bringing original research to press within six weeks of submission [10]. To summarize, the significant pitfalls in implementing social media campaigns for public healthcommunication identified by this review are: agencies’ capacity and responsiveness; the digital divide; the rapid evolution of social media platforms and usage patterns; and the lack of an evidence-base to guide best practices. Social media is becoming a powerful addition to the health communicators’ toolkit. Social media is currently utilized both as broadcasting platform to amplify messages from traditional media sources (e.g., radio, television, print media) to demographics who are abandoning traditional broadcast technologies (e.g., telephones, television) and as an entirely new way of collaborating and co-creating content w ith target audiences [11]. There is a general belief that the participatory web, or social media, is rapidly transforming how the public relates to medical professions and how average citizens seek out and consume medical information [12]. Leading public health organizations are driven to integrate social media tools into their communication strategies because of this profound shift in citizen’s communication behaviours and new expectations about the degree of openness, transparency and responsiveness of the communication environment. As research and experience with diverse social media platforms grows, it is likely that a more finegrained typology will emerge to describe the distinct capabilities of each platform and the utility for specific public health interventions. There is a trend toward platform convergence, indicating that engaging with social media should be thought of as a complex and inter-related system: Twitter feeds direct traffic to YouTube , widgets enable connectivity to Facebook, and social bookmarking or aggregators transform users’ interface with the web and with mobile devices [10]. Researchers are exploring opportunities to measure the impact of social media campaigns through user surveys conducted over Facebook, Twitter, or other platforms but more intervention research is critically needed. Social media platforms allow organizations to freely take advantage of existing social networks and virally spread their messages. While creative costs to develop a public health campaign for social media are likely similar to traditional media, the costs of amplifying transmission or modifying a campaign in response to audience reception are negligible [13]. The only barrier to responding to changing conditions in real time lies in the limits of organizational capacity.

3. Proposed Framework In this paper, there are four steps in developing secure social media framework that would use foresic approach. The four steps are shown below:

Step 1: Develop a conceptual framework model and specification on controlling rumours propagation, intelligent image and forensic activities on social media At first phase, the mechanisms rumours propagation on social media is studied. Second phase, several computational and algorithm will be conducted. We will then analyse the best model and algorithm to formulate [13]. Next phase, the framework and specification model of the research will be designed which can help to have a correct information of the social media activities.

39

Security Model to Control on Social Media using Visualization and Forensic Approach Mohd Nazri Bin Ismail, Mohd Afizi Bin Mohd Shukran, Kamaruzaman Bin Maskat

Step 2: Analysing user behaviour model in social media in terms of controlling atrocious and malicious media data This project has three modules. The first module will concentrate on image and video intelligent searching agent which will act autonomously to find required information; it has intelligence and can learn that will improve performance in executing the searching process. The second module is image and video authentication that verifies the originality of the media by detecting malicious manipulations and forgery media. The last module is digital image and video pattern recognition for identifying feature of that particular data through photo image and video analysis that can then be used to generate a comprehensive report about social media user activities, as well as to evaluate their characteristics. The analysis will be generated through the use of a photo image and video detection system. At the end, an integrated intelligent image/video analysis tool will be produced to analyse user behaviour in social media in terms of controlling atrocious and malicious media data [14].

Step 3: Design and develop forensic analyser tool and intelligent image for social media impact This project composes of three modules. In first module, an empirical study will be focused to content and service provider in order to select suitable information. In second module, the study will design new model for capturing social media activities that able to trace and identified the illegal url domain/profile. Mathematical model will be used in the propose model (forensic analyser model). The propose model can be used for collecting network data, identifying suspicious packets, examining protocol features misused and validating the attack. Finally, this proposed model will be transformed to application tool with supporting by GUI interface to the network administrator. Application tool with GUI interface development that can identify and process the results more effective and faster analysis [14].

Step 4: Apply on real environment and validate the reliability of Cyber Security Controls Model On Social Media At this phase, apply on real environment and validation process will be conducted. This process to perform and indicate the reliability of cyber security model on social media activities.

4. Discussion and findings From this research, service and content provider can use this model to trace, investigate and analyze any abnormal activities on social media. There several significant contribution by using this framework The significant contributions are shown below: · New hybrid approach/technique (integration of visualization and forensic with intelligent agent) for social media model ·

New prediction forensic model for social media activities

·

New knowledge in forensic analyzer using hybrid technique to investigate and capture any abnormal activity usage in social media. Recommendations

40

Security Model to Control on Social Media using Visualization and Forensic Approach Mohd Nazri Bin Ismail, Mohd Afizi Bin Mohd Shukran, Kamaruzaman Bin Maskat

The strategies adopted by both researchers and public health agencies sampled in this study and their lessons learned leads us to suggest the following guidelines and recommendations for developing a social media strategy: 1. Establish clear objectives: Distinguish between increasing reach and awareness (message amplification) and expanding the scope of messages (collaborative, iterative message development). 2. Know your target audiences where they are “present” online and what key behaviours they engage in (understand the cultural norms of each platform): (e.g., youth are currently more likely to Twitter; women between the ages of 25-35 are likely to be posting to Facebook daily). 3. Design campaigns for longevity and/or have exit strategies and clear archiving processes: Material from social media campaigns can “live forever” online and can reappear in circulation years after the campaign ends. It is important to consider date-stamping or providing explicit local and temporal context to information in order to prevent users in the future from using dated information that may no longer be appropriate. 4. Determine Resource Needs: For many platforms that require daily monitoring and responses (e.g., Facebook, Twitter) it is important to allocate sufficient time and resources for ongoing interactions. 5. Determine an Agency Content-Clearance Processes and / or Prepare Pre-approved Messaging Scripts: Some social media platforms require rapid clearance processes to enable real-time interactions with users (SecondLife, Twitter, Facebook) while immediate response are not critical on other platforms (YouTube). 6. Listen to online health discourse. Monitor the reception of campaign materials, and react to gaps, contradictory information or satirical responses to campaign materials. Both manual and automated infoveillance tools are available. Most platforms have freely available analytic tools, news aggregators and fee-for-service monitoring is available. 7. Encourage or sponsor research investigating social media applications and specific health objectives. 8. Encourage coordination of materials and messages with municipal, provincial and federal agencies (share resources and leverage national-level campaigns). Consider incorporating high quality content from existing campaigns. Integrating popular and high quality materials from other public health agencies will not only leverage existing public health resources but through cross-linking and redirecting of traffic can improve the visibility of high-quality of information online and through reverse traffic flow, improve your own agency’s visibility. As research and experience with diverse social media platforms grows, it is likely that a more fine-grained typology will emerge to describe the distinct capabilities of each platform and the utility for specific public health interventions. There is a trend toward platform convergence, indicating that engaging with social media should be thought of as a complex and inter-related system: Twitter feeds direct traffic to YouTube, widgets enable connectivity to Facebook, and social bookmarking or aggregators transform users’ interface with the web and with mobile devices [10]. Researchers are exploring opportunities to measure the impact of social media campaigns through user surveys conducted over Facebook, Twitter, or other platforms but more intervention research is critically needed.

41

Security Model to Control on Social Media using Visualization and Forensic Approach Mohd Nazri Bin Ismail, Mohd Afizi Bin Mohd Shukran, Kamaruzaman Bin Maskat

5. Conclusion In conclusion, providing cyber security controls on social media is becoming critical particularly for the enforcer in Malaysia such as police. Controlling on social media contents are much more demanding than the conversational media. Moreover, the enforcer has identified the real and virtual information should be protected from any devastating physical, logical/cyber impact. In this long term project, this research has focused on cyber impact to society and also identified cyber problems area like illegitimate rumours, fake non-textual content, wrong perception, unfeasible to trace the irresponsible writers and detecting any malicious data on social media contents.

6. Reference [1] Waters E, Sullivan HW, Nelson W, Hessel B. 2009. What Is My Cancer Risk? How InternetBased Cancer Risk Assessment Tools Communicate Individualized Risk Estimates to the Public: Content Analysis. J Med Internet Res 2009; 11(3): e33 18. [2] Lo A, Esser M, Gordon K. YouTube: A gauge of public perception and awareness surrounding epilepsy. Epilepsy & Behavior 2009; 17(2010): 541–545. 19. [3] Tian Y. Organ Donation on Web 2.0: Content and Audience Analysis of Organ Donation Videos on YouTube. Health Communication 2010; 25:238 - 246. [4] Thackery R, Neiger B. A Multidirectional communication model: Implications for social marketing practice. Health Promotion Practice 2009; 10: 171-5. [5] DeBar L, Dickerson J, Clarke G, Stevens V, Ritenbaugh C, Aickin, M. Using a Website to Build Community and Enhance Outcomes in a Group, Multi-Component Intervention Promoting Healthy Diet and Exercise in Adolescents. Journal of Pediatric Psychology 2009; 34(5) 539–550. [6] Bennet G, Glasgow R. The Delivery of Public Health Interventions via the Internet: Actualizing Their Potential. Annu. Rev. Public Health 2009; 30:273–92. [7] Norman C, Skinner H. Engaging Youth in eHealth Promotion: Lessons learned from a Decade of TeenNet Research. Adolescent Medicine: State of the Art Reviews 2007 Aug;18(2):357-69. [8] Freeman B, Chapman S. Gone viral? Heard the buzz? A guide for public health practitioners and researchers on how Web 2.0 can subvert advertising restrictions and spread health information. J Epidemiol Community Health 2008; 62:778-782. [9] Kamel Boulos MN, Scotch M, Cheung K, David Burden D. Web GIS in practice VI: a demo playlist of geo-mashups for public health neogeographers. Int J Health Geogr. 2008; 7: 38. [10] Khanna M. Icyou: How social media is the new resource for online health information. Medscape J Med 2008; 10(5): 113. [11] Timpka T, Eriksson H, Ludvigsson J, Ekberg J, Nordfeldt S, Hanberger L. Web 2.0 systems supporting childhood chronic disease management: A pattern language representation of a general architecture. BMC Medical Informatics and Decision Making 2008; 8:54-65. [12] Freeman B, Chapman S. Open source marketing: Camel cigarette brand marketing in the “Web 2.0” world. Tob Control 2009; 18:212-217. [13] Wilson K, Keelan J. Coping with Public Health 2.0. CMAJ 2009; 80(10): 1080. [14] Reitmeijer C, McFarlane M. Web 2.0 and beyond: risks for sexually transmitted infections and opportunities for prevention. Current Opinion in Infectious Diseases 2009; 22:67–71. [15] Siti Rohaidah Ahmad, Mohd Afizi Mohd Shukran, Suhaila Ismail, Arniyati Ahmad, "A New Teaching Approach in Object Oriented Programming Subject in Learning Military Environment", JDCTA, Vol. 6, No. 15, pp. 85 ~ 90, 2012. [16] Omar Zakaria, Toomaj Zangooei, Mohd Afizi Mohd Shukran, "Enhancing Mixing Recognition-Based and Recall-Based Approach in Graphical Password Scheme", IJACT, Vol. 4, No. 15, pp. 189 ~ 197, 2012. [17] Puteri N.E Nohuddin, Mohd Rizal Mohd Isa, Mohd Afizi Mohd Shukran, "Information Technology Knowledge Management in Malaysian Armed Forces", JCIT, Vol. 7, No. 6, pp. 178 ~ 184, 2012

42

Suggest Documents