TEJAS Journal of Technologies and Humanitarian Science

ISSN : 2583-5599

Open Access | Quarterly | Peer Reviewed Journal

January, 2025 | Volume 04 | Issue 01

A review of Strategies for Enhancing Security Against Cyber Threats in Social Media Platform


Prabhat Singh
Computer Science Engineering, Institute of Technology and Management, Aligarh/ Dr. APJ Abdul kalam University, Lucknow, India

Author

Sushil Sharma
Computer Science Engineering, Institute of Technology and Management, Aligarh/ Dr. APJ Abdul kalam University, Lucknow, India

Author


📌 DOI: https://doi.org/10.63920/tjths.41002

🔑 Keywords: Social Platforms1, Cyber Threats2, Identity Malicious Media Theft3, Insider Attacks4, Password Breaches5, Fraudulent Marketing Schemes6, Honeyword as a Trap (HAaT)7, Password Security

📅 Publication Date: 04 January 2025

📜 License:

  • Share — Copy and Redistribute the material
  • Adapt — Remix, Transform, and build upon the material
  • The licensor cannot revoke these freedoms as long as you follow the license terms.

Abstract:

Social media platforms have revolutionized communication, information sharing, and marketing strategies worldwide. However, they are increasingly vulnerable to cyber threats such as identity theft, malicious insider attacks, password breaches, and fraudulent marketing schemes. These threats compromise user privacy, system integrity, and the overall trustworthiness of online social networks (OSNs). Addressing these challenges necessitates robust security mechanisms to mitigate cyber risks effectively. This research presents a multi-layered approach to enhance security against cyber threats in social media platforms. Firstly, a novel Honeyword as a Trap (HAaT) mechanism is introduced to strengthen password security. HAaT employs an advanced honeyword generation model integrated with a salt-chlorine hashing algorithm, making password databases more resilient against brute force and dictionary attacks. By incorporating a rule-based honeyword generator (RHG) and a salt generation strategy, HAaT significantly enhances password security and minimizes the risk of unauthorized access.

Download Full PDF Paper


References


Ahmed, R., Chen, Y., & Zhang, T. (2023). AI-driven security mechanisms for online social networks. Journal of Cybersecurity Research, 45(2), 102-118. Brown, P., & Taylor, S. (2019). Evaluating the effectiveness of CAPTCHA systems against AI-driven bots. Cybersecurity & AI Review, 27(1), 45-62.
Chen, L., Wang, H., & Patel, R. (2023). Social media security challenges and AI-powered threat detection. International Journal of Information Security, 40(4), 205-221.
Chen, X., Li, P., & Zhao, J. (2022). Botnets and automated cyber threats in online platforms. Cybercrime Studies, 36(3), 187 204.
Gupta, A., Singh, P., & Mehta, R. (2021). Privacy and security challenges in social media networks. International Journal of Computer Security, 33(5), 340-359.
Hassan, R., Williams, K., & Brown, L. (2021). Social engineering threats: Spear-phishing and whaling attacks. Journal of Digital Security, 29(2), 123-137.
Jones, D., Kim, S., & Patel, R. (2020). AI-powered cyber threats: Deepfakes and social media fraud. Cybersecurity & AI Research, 18(1), 78-94.
Kim, J., & Lee, S. (2021). Fraudulent marketing in social media: Impacts and detection strategies. Marketing & Cybersecurity Journal, 22(3), 147-163.
Kumar, A., & Sharma, V. (2023). AI and ML in cybersecurity: Opportunities and risks. Journal of AI & Cybersecurity, 39(2), 221-239.
Kumar, P., Singh, R., & Das, A. (2023). The role of insider threats in social media security. Information Systems Security Journal, 41(1), 58-75.
Li, W., & Wang, T. (2022). The vulnerabilities of two-factor authentication: A review of SIM-swapping attacks. Journal of Cybersecurity Studies, 34(6), 332-349. Miller, J., Robinson, P., & Adams, K. (2022). Behavioral analytics for insider threat detection. International Journal of Information Security, 30(5), 210-228.
Patel, R., Zhang, H., & Lee, M. (2023). Social media fraud and financial losses: Trends and solutions. Finance & Cybersecurity Review, 28(4), 172-189.
Singh, P., Ahmed, K., & Zhao, R. (2022). Advanced AI-driven cybersecurity mechanisms in OSNs. Cybersecurity Research Journal, 37(2), 95-112.
Singh, T., Gupta, A., & Li, Y. (2023). The role of deepfake technology in cybercrime and misinformation. Digital Forensics & Security, 25(3), 130-146.