A First Look at Zoombombing

作者: Gianluca Stringhini , Jeremy Blackburn , Chen Ling , Utkucan Balcı

DOI:

关键词:

摘要: Online meeting tools like Zoom and Google Meet have become central to our professional, educational, personal lives. This has opened up new opportunities for large scale harassment. In particular, a phenomenon known as zoombombing emerged, in which aggressors join online meetings with the goal of disrupting them harassing their participants. this paper, we conduct first data-driven analysis calls attacks on social media. We identify ten popular extract posts containing invitations these platforms mainstream network, Twitter, fringe community organizing coordinated against users, 4chan. then perform manual annotation that are calling attacks, apply thematic develop codebook better characterize discussion surrounding zoombombing. During seven months 2020, over 200 between Twitter 4chan, analyze both quantitatively qualitatively. Our findings indicate vast majority not made by attackers stumbling upon or bruteforcing ID, but rather insiders who legitimate access meetings, particularly students high school college classes. important security implications, because it makes common protections zoombombing, such password protection, ineffective. also find instances instructing adopt names participants class avoid detection, making countermeasures setting waiting room vetting less effective. Based observations, argue only effective defense is creating unique links each participant.

参考文章(45)
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, Virg ´ ilio Almeida, Detecting Spammers on Twitter ,(2010)
Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, Engin Kirda, William Robertson, Mohamed Ali Kaafar, Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters recent advances in intrusion detection. pp. 369- 389 ,(2013) , 10.1007/978-3-642-41284-4_19
Chao Yang, Robert Chandler Harkreader, Guofei Gu, Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers Lecture Notes in Computer Science. pp. 318- 337 ,(2011) , 10.1007/978-3-642-23644-0_17
Yinglian Xie, Qifa Ke, Eliot Gillum, Yuan Yu, Yan Chen, Fang Yu, Yao Zhao, BotGraph: large scale spamming botnet detection networked systems design and implementation. pp. 321- 334 ,(2009)
Ben Y. Zhao, Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Detecting and characterizing social spam campaigns internet measurement conference. pp. 35- 47 ,(2010) , 10.1145/1879141.1879147
Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq, Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots internet measurement conference. pp. 129- 136 ,(2014) , 10.1145/2663716.2663729
Joseph L. Fleiss, Measuring nominal scale agreement among many raters. Psychological Bulletin. ,vol. 76, pp. 378- 382 ,(1971) , 10.1037/H0031619
Virginia Braun, Victoria Clarke, Using thematic analysis in psychology Qualitative Research in Psychology. ,vol. 3, pp. 77- 101 ,(2006) , 10.1191/1478088706QP063OA
Michael Bailey, David Dittrich, Erin Kenneally, Doug Maughan, None, The Menlo Report ieee symposium on security and privacy. ,vol. 10, pp. 71- 75 ,(2012) , 10.1109/MSP.2012.52
Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna, Detecting spammers on social networks annual computer security applications conference. pp. 1- 9 ,(2010) , 10.1145/1920261.1920263