Home   >   CSC-OpenAccess Library   >    Manuscript Information
A Security Architecture for Automated Social Engineering (ASE) Attacks over Fiber-Wireless (FiWi) Access Networks
Mohammad Zohirul Islam, Sarwarul Chowdhury
Pages - 233 - 243     |    Revised - 15-07-2012     |    Published - 10-08-2012
Volume - 6   Issue - 4    |    Publication Date - August 2012  Table of Contents
MORE INFORMATION
KEYWORDS
Social Networking Sites (SNS), Automated Social Engineering (ASE), Hybrid Fiber-wireless (FiWi) Access Networks, WiMAX BS, EPON (ONU, OLT), ONU-BS
ABSTRACT
Future communication networks will integrate `SSS\' concepts such as social networking, social networking device, and social desktop. In this paper, we focus on applications over social networking sites (SNS). Due to emerging bandwidth-hungry applications over SNS, hybrid fiber-wireless (FiWi) access networks are a promising solution to mitigate the last mile bandwidth bottleneck. SNS are particularly vulnerable to Automated Social Engineering (ASE) attacks due to their powerful information gathering functionalities. We discuss how integrated FiWi access networks supporting SNS systems perform, and how they can deal with threats related to ASE. In addition, we explain how an ASE attack may be launched from different networking platforms and propose a security architecture for ASE attacks over FiWi access networks.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 TechRepublic 
5 Scribd 
6 SlideShare 
7 PdfSR 
B. Potter, “Wireless Security's Future,” IEEE Security and Privacy Magazine, vol. 1,no. 4 , pp. 68-72, July/Aug. 2003.
E. Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, S. Ioannidis, K. G.Anagnostakis, and E. P. Markatos, “Antisocial Networks: Turning a Social Network into a Botnet,” in Proc., 11th International Conference on Information Security, pp. 146-160,Taipei, Taiwan, Sept. 2008.
E. Dahlman, S. Parkvall, J. Skold, and P. Beming, “3G Evolution: HSPA and LTE for Mobile Broadband,” Second Edition, Academic Press, Oct. 2008.
J. Prat, “Next-Generation FTTH Passive Optical Network s: Research towards Unlimited Bandwidth Access,” Springer , 2008.
M. Hajduczenia, P. R. M. Inacio, H. J. A. Da Silva, M. M. Freire, and P. P. Monteiro, “On EPON Security Issues,” IEEE Communications Surveys and Tutorials, vol. 9, no. 1, pp. 68-83, 1st Quarter 2007.
M. Huber, “Automated Social Engineering Proof Of Concept,” Technical Report,SecLab, KTH, Stockholm, Sweden, March 2009.
M. Maier, N. Ghazisaidi, and M. Reisslein, “The Audacity of Fiber-Wireless (FiWi) Networks (Invited Paper),” in Proc., ICST ACCESSNETS, Las Vegas, NV, USA, Oct. 2008.
M. M´edard, D. Marquis, R. A. Barry, and S. G. Finn, “Security Issues in All-Optical Networks,” IEEE Network, vol. 11, no. 3, pp. 42-48, May/June 1997.
M. Nohlberg, S. Kowalski, and M. Huber, “Measuring Readi ness for Automated Social Engineering,” in Proc., 7th Security Conference, pp. 20.1-20.13, Las Vegas, NV, USA, June 2008.
N. Ghazisaidi, M. Maier, and C. M. Assi, “Fiber-Wireless (FiWi) Access Networks: A Survey,” IEEE Communications Magazine, vol. 47, no. 2, pp. 160-167, Feb. 2009.
P. D. Townsend, G. Talli, E. K. MacHale, and C. Antony, “Long-reach PONs,” in Proc., 7th International Conference on Optical Internet, pp. 1-2, Tokyo, Japan, Oct.2008.
S. Gangxiang, R. S. Tucker, and C. Chang-Joon, “Fixed Mo bile Convergence Architectures for Broadband Access: Integration of EPON and WiMAX,” IEEE Communications Magazine, vol. 45, no. 8, pp. 44-50, Aug. 2007.
S. K. Miller, “Facing the Challenge of Wireless Security ,” IEEE Computer, vol.34, no. 7, pp. 16-18, July 2001.
S. M. Devine, “Anti-social networking: exploiting the trusting environment of Web 2.0,”Network Security, vol. 2008, no. 11, pp. 4-7, Nov. 2008.
Mr. Mohammad Zohirul Islam
- Sweden
zohirul007@gmail.com
Mr. Sarwarul Chowdhury
- Canada