Call for Papers
Quick Links
January, 2025 | Volume 04 | Issue 01
A review of Strategies for Enhancing Security Against Cyber Threats in Social Media Platform
Prabhat Singh
Computer Science Engineering, Institute of Technology and Management, Aligarh/ Dr.
APJ Abdul kalam University, Lucknow, India
Author
Sushil Sharma
Computer Science Engineering, Institute of Technology and Management, Aligarh/ Dr.
APJ Abdul kalam University, Lucknow, India
Author
📌 DOI: https://doi.org/10.63920/tjths.41002
🔑 Keywords: Social Platforms1, Cyber Threats2, Identity Malicious Media Theft3, Insider Attacks4, Password Breaches5, Fraudulent Marketing Schemes6, Honeyword as a Trap (HAaT)7, Password Security
📅 Publication Date: 04 January 2025
📜 License:
This work is licensed under a Creative Commons Attribution 4.0 International License
- Share — Copy and Redistribute the material
- Adapt — Remix, Transform, and build upon the material
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Abstract:
Social media platforms have revolutionized communication, information sharing, and marketing strategies worldwide. However, they are increasingly vulnerable to cyber threats such as identity theft, malicious insider attacks, password breaches, and fraudulent marketing schemes. These threats compromise user privacy, system integrity, and the overall trustworthiness of online social networks (OSNs). Addressing these challenges necessitates robust security mechanisms to mitigate cyber risks effectively. This research presents a multi-layered approach to enhance security against cyber threats in social media platforms. Firstly, a novel Honeyword as a Trap (HAaT) mechanism is introduced to strengthen password security. HAaT employs an advanced honeyword generation model integrated with a salt-chlorine hashing algorithm, making password databases more resilient against brute force and dictionary attacks. By incorporating a rule-based honeyword generator (RHG) and a salt generation strategy, HAaT significantly enhances password security and minimizes the risk of unauthorized access.
Download Full PDF Paper
References
Ahmed, R., Chen, Y., & Zhang, T. (2023). AI-driven security mechanisms for online social networks. Journal of Cybersecurity
Research, 45(2), 102-118.
Brown, P., & Taylor, S. (2019). Evaluating the effectiveness of CAPTCHA systems against AI-driven bots. Cybersecurity &
AI Review, 27(1), 45-62.
Chen, L., Wang, H., & Patel, R. (2023). Social media security challenges and AI-powered threat detection. International
Journal of Information Security, 40(4), 205-221.
Chen, X., Li, P., & Zhao, J. (2022). Botnets and automated cyber threats in online platforms. Cybercrime Studies, 36(3), 187
204.
Gupta, A., Singh, P., & Mehta, R. (2021). Privacy and security challenges in social media networks. International Journal of
Computer Security, 33(5), 340-359.
Hassan, R., Williams, K., & Brown, L. (2021). Social engineering threats: Spear-phishing and whaling attacks. Journal of
Digital Security, 29(2), 123-137.
Jones, D., Kim, S., & Patel, R. (2020). AI-powered cyber threats: Deepfakes and social media fraud. Cybersecurity & AI
Research, 18(1), 78-94.
Kim, J., & Lee, S. (2021). Fraudulent marketing in social media: Impacts and detection strategies. Marketing & Cybersecurity
Journal, 22(3), 147-163.
Kumar, A., & Sharma, V. (2023). AI and ML in cybersecurity: Opportunities and risks. Journal of AI & Cybersecurity, 39(2),
221-239.
Kumar, P., Singh, R., & Das, A. (2023). The role of insider threats in social media security. Information Systems Security
Journal, 41(1), 58-75.
Li, W., & Wang, T. (2022). The vulnerabilities of two-factor authentication: A review of SIM-swapping attacks. Journal of
Cybersecurity Studies, 34(6), 332-349.
Miller, J., Robinson, P., & Adams, K. (2022). Behavioral analytics for insider threat detection. International Journal of
Information Security, 30(5), 210-228.
Patel, R., Zhang, H., & Lee, M. (2023). Social media fraud and financial losses: Trends and solutions. Finance &
Cybersecurity Review, 28(4), 172-189.
Singh, P., Ahmed, K., & Zhao, R. (2022). Advanced AI-driven cybersecurity mechanisms in OSNs. Cybersecurity Research
Journal, 37(2), 95-112.
Singh, T., Gupta, A., & Li, Y. (2023). The role of deepfake technology in cybercrime and misinformation. Digital Forensics &
Security, 25(3), 130-146.
