Review Article

Intrusion Detection Techniques in Social Media Cloud: Review and Future Directions

Table 1

Type of attacks.

Attack typeDefinitionPurposeTarget networkReferences

(A) Phishing attackPhishing is a type of social engineering attack where attackers convince users to give their credential information through fake emails, fake messages, and phone callsSteal users’ personal information, such as username, password, and financial informationWhatsApp, Facebook, and Instagram[15]
(B) Fake profile attackFalse identities are used in sophisticated threats and are also used to launch other malicious operationsTo establish trust with the victim and launch other malicious activitiesWhatsApp, Facebook, Instagram, Twitter[16]
(C) Account compromise attackBy attacking users’ accounts, cybercriminals can spread their destructive messages or fake information to a big user base by taking control of the victim’s accountAttackers exploit the trust by compromising accounts and spreading malicious information from accounts that the victim trustsWhatsApp, Facebook, Instagram, Twitter[17]
(D) Cyberbullying attackCyberbullying is the use of the internet, phone, or any other technology to send text or upload photos that embarrass or hurt a personIntended to frighten, enrage, or shame individuals who are being targetedWhatsApp, Facebook, Instagram, Twitter[18]