Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Prateek Dewan is active.

Publication


Featured researches published by Prateek Dewan.


conference on privacy security and trust | 2015

Towards automatic real time identification of malicious posts on Facebook

Prateek Dewan; Ponnurangam Kumaraguru

Online Social Networks (OSNs) witness a rise in user activity whenever a news-making event takes place. Cyber criminals exploit this spur in user-engagement levels to spread malicious content that compromises system reputation, causes financial losses and degrades user experience. In this paper, we characterized a dataset of 4.4 million public posts generated on Facebook during 17 news-making events (natural calamities, terror attacks, etc.) and identified 11,217 malicious posts containing URLs. We found that most of the malicious content which is currently evading Facebooks detection techniques originated from third party and web applications, while more than half of all legitimate content originated from mobile applications. We also observed greater participation of Facebook pages in generating malicious content as compared to legitimate content. We proposed an extensive feature set based on entity profile, textual content, metadata, and URL features to automatically identify malicious content on Facebook in real time. This feature set was used to train multiple machine learning models and achieved an accuracy of 86.9%. We performed experiments to show that past techniques for spam campaign detection identified less than half the number of malicious posts as compared to our model. This model was used to create a REST API and a browser plug-in to identify malicious Facebook posts in real time.


Proceedings of the 5th IBM Collaborative Academia Research Exchange Workshop on | 2013

MultiOSN: realtime monitoring of real world events on multiple online social media

Prateek Dewan; Mayank Gupta; Kanika Goyal; Ponnurangam Kumaraguru

The flow of information in online social media during events has been widely studied in the computer science community. It has also been shown how information picked from online social media can help to eventually aid eventful, especially, crisis situations in real life. However, most of the work has focused on utilizing a single social network for monitoring such events, mostly Twitter. Given the immense popularity and diversity of various online social networks across the globe, studying multiple online social networks during an event can reveal much more information about the event, than a single online social network. In this work, we present MultiOSN, a framework which collects data from five different online social networks viz. Facebook, Twitter, Google+, YouTube, and Flickr, and presents real-time analytics and visualizations. MultiOSN can be particularly helpful to users and organizations which are directly or indirectly connected to law and order. Organizations can utilize MultiOSN to uncover the general sentiment of social media users about an event, and trace public gatherings for example, which are usually discussed and planned publicly on social networking platforms.


arXiv: Computers and Society | 2014

Analyzing social and stylometric features to identify spear phishing emails

Prateek Dewan; Anand Kashyap; Ponnurangam Kumaraguru

Targeted social engineering attacks in the form of spear phishing emails, are often the main gimmick used by attackers to infiltrate organizational networks and implant state-of-the-art Advanced Persistent Threats (APTs). Spear phishing is a complex targeted attack in which, an attacker harvests information about the victim prior to the attack. This information is then used to create sophisticated, genuine-looking attack vectors, drawing the victim to compromise confidential information. What makes spear phishing different, and more powerful than normal phishing, is this contextual information about the victim. Online social media services can be one such source for gathering vital information about an individual. In this paper, we characterize and examine a true positive dataset of spear phishing, spam, and normal phishing emails from Symantecs enterprise email scanning service. We then present a model to detect spear phishing emails sent to employees of 14 international organizations, by using social features extracted from LinkedIn. Our dataset consists of 4,742 targeted attack emails sent to 2,434 victims, and 9,353 non targeted attack emails sent to 5,912 non victims; and publicly available information from their LinkedIn profiles. We applied various machine learning algorithms to this labeled data, and achieved an overall maximum accuracy of 97.76% in identifying spear phishing emails. We used a combination of social features from LinkedIn profiles, and stylometric features extracted from email subjects, bodies, and attachments. However, we achieved a slightly better accuracy of 98.28% without the social features. Our analysis revealed that social features extracted from LinkedIn do not help in identifying spear phishing emails. To the best of our knowledge, this is one of the first attempts to make use of a combination of stylometric features extracted from emails, and social features extracted from an online social network to detect targeted spear phishing emails.


advances in social networks analysis and mining | 2017

Towards Understanding Crisis Events On Online Social Networks Through Pictures

Prateek Dewan; Anshuman Suri; Varun Bharadhwaj; Aditi Mithal; Ponnurangam Kumaraguru

Extensive research has been conducted to identify, analyze and measure popular topics and public sentiment on Online Social Networks (OSNs) through text, especially during crisis events. However, little work has been done to understand such events through pictures posted on these networks. Given the potential of visual content for influencing users’ thoughts and emotions, we perform a large-scale analysis to study and compare popular themes and sentiment across images and textual content posted on Facebook during the terror attacks that took place in Paris in 2015. We propose a generalizable and highly automated 3-tier pipeline which utilizes state-of-the-art computer vision techniques to extract high-level human understandable image descriptors. We used these descriptors to associate themes and sentiment with images, and analyzed over 57,000 images related to the Paris Attacks. We discovered multiple visual themes which were popular in images, but were not identifiable through text. We also uncovered instances of misinformation and false flag (conspiracy) theories among popular image themes, which were not prominent in user-generated textual content. Further, our analysis revealed that while textual content posted after the attacks reflected negative sentiment, images inspired positive sentiment. These findings suggest that large-scale mining of images posted on OSNs during crisis, and other news-making events can significantly augment textual content to understand such events.


advances in social networks analysis and mining | 2016

Hiding in plain sight: characterizing and detecting malicious Facebook pages

Prateek Dewan; Shrey Bagroy; Ponnurangam Kumaraguru

Facebook is the worlds largest Online Social Network, having more than 1 billion users. Like most other social networks, Facebook is home to various categories of hostile entities who abuse the platform by posting malicious content. In this paper, we identify and characterize Facebook pages that engage in spreading URLs pointing to malicious domains. We revisit the scope and definition of what is deemed as “malicious” in the modern day Internet, and identify 627 pages publishing untrustworthy information, misleading content, adult and child unsafe content, scams, etc. Our findings revealed that at least 8% of all malicious pages were dedicated to promote a single malicious domain. Studying the temporal posting activity of pages revealed that malicious pages were 1.4 times more active daily than benign pages. We further identified collusive behavior within a set of malicious pages spreading adult and pornographic content. Finally, we attempted to automate the process of detecting malicious Facebook pages by training multiple supervised learning algorithms on our dataset. Artificial neural networks trained on a fixed sized bag-of-words performed the best and achieved an accuracy of 84.13%.


Knowledge and Information Systems | 2015

The Mask of ZoRRo: preventing information leakage from documents

Prasad M. Deshpande; Salil Joshi; Prateek Dewan; Karin Murthy; Mukesh K. Mohania; Sheshnarayan Agrawal

In today’s enterprise world, information about business entities such as a customer’s or patient’s name, address, and social security number is often present in both relational databases as well as content repositories. Information about such business entities is generally well protected in databases by well-defined and fine-grained access control. However, current document retrieval systems do not provide user-specific, fine-grained redaction of documents to prevent leakage of information about business entities from documents. Leaving companies with only two choices: either providing complete access to a document, risking potential information leakage, or prohibiting access to the document altogether, accepting potentially negative impact on business processes. In this paper, we present ZoRRo, an add-on for document retrieval systems to dynamically redact sensitive information of business entities referenced in a document based on access control defined for the entities. ZoRRo exploits database systems’ fine-grained, label-based access-control mechanism to identify and redact sensitive information from unstructured text, based on the access privileges of the user viewing it. To make on-the-fly redaction feasible, ZoRRo exploits the concept of


international world wide web conferences | 2013

uTrack: track yourself! monitoring information on online social media

Tiago Rodrigues; Prateek Dewan; Ponnurangam Kumaraguru; Raquel Cardoso de Melo Minardi; Virgílio A. F. Almeida


Social Network Based Big Data Analysis and Applications | 2018

Hiding in Plain Sight: The Anatomy of Malicious Pages on Facebook

Prateek Dewan; Shrey Bagroy; Ponnurangam Kumaraguru

k


social informatics | 2017

Nudging Nemo: Helping Users Control Linkability Across Social Networks

Rishabh Kaushal; Srishti Chandok; Paridhi Jain; Prateek Dewan; Nalin Gupta; Ponnurangam Kumaraguru


arXiv: Social and Information Networks | 2013

The Pin-Bang Theory: Discovering The Pinterest World.

Sudip Mittal; Neha Gupta; Prateek Dewan; Ponnurangam Kumaraguru

k-safety in combination with Lucene-based indexing and scoring. We demonstrate the efficiency and effectiveness of ZoRRo through a detailed experimental study.

Collaboration


Dive into the Prateek Dewan's collaboration.

Top Co-Authors

Avatar

Ponnurangam Kumaraguru

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Mayank Gupta

Delhi Technological University

View shared research outputs
Top Co-Authors

Avatar

Aditi Mithal

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Anshuman Suri

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Neha Gupta

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Shrey Bagroy

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Sudip Mittal

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Varun Bharadhwaj

National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kanika Goyal

Delhi Technological University

View shared research outputs
Top Co-Authors

Avatar

Nalin Gupta

Indraprastha Institute of Information Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge