全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Security Threat and Data Consumption as Mojor Nuisance of Social Media on Wi-Fi Network

DOI: 10.4236/ijcns.2021.142002, PP. 15-29

Keywords: Data Consumption, Device Accounting, Mobile Devices, Social Media, WiFi Network, Rockus Outdoor AP

Full-Text   Cite this paper   Add to My Lib

Abstract:

This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.

References

[1]  Manca, M., Boratto, L., Morell Roman, V., Martori O., Gallissà, I and Kaltenbrunner, A. (2017) Using Social Media to Characterize Urban Mobility Patterns: State-of-the-Art Survey and Case-Study. Online Soc. Networks Media, 1, 56-69.
https://doi.org/10.1016/j.osnem.2017.04.002
[2]  Arnaboldi, V., Conti, M., Passarella, A. and Dunbar, R.I.M. (2017) Online Social Networks and Information Diffusion: The Role of Ego Networks. Online Social Networks and Media, 1, 44-55.
https://doi.org/10.1016/j.osnem.2017.04.001
[3]  Raptis, T.P. (2020) When Wireless Crowd Charging Meets Online Social Networks: A Vision for Socially Motivated Energy Sharing. Online Soc. Networks Media, 16, Article ID: 100069.
https://doi.org/10.1016/j.osnem.2020.100069
[4]  Osseiran, A., Braun, V. and Hidekazu, T. (2013) The Foundation of the Mobile and Wireless communications System for 2020 and Beyond: Challenges, Enablers and Technology Solutions. 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2-5 June 2013, 1-5.
https://doi.org/10.1109/VTCSpring.2013.6692781
[5]  7 Top Social Media Sites in 2020, Adobe Spark.
https://www.adobe.com/express/learn/blog/top-social-media-sites
[6]  Top 15 Most Popular Social Networking Sites and Apps (2020) @DreamGrow.
https://www.dreamgrow.com/top-15-most-popular-social-networking-sites/
[7]  21 Top Social Media Sites to Consider for Your Brand.
https://buffer.com/library/social-media-sites/
[8]  Barakabitze, A.A., Ahmad, A., Mijumbi, R. and Hines, A. (2020) 5G Network Slicing Using SDN and NFV: A Survey of Taxonomy, Architectures and Future Challenges. Computer Networks, 167, Article ID: 106984.
https://doi.org/10.1016/j.comnet.2019.106984
[9]  Venkatesh, T., Praveen, K., Sujatha, T.L. and Murthy, C.S.R. (2007) Performance Evaluation of High Speed TCP over Optical Burst Switching Networks. Optical Switching and Networking, 4, 44-57.
https://doi.org/10.1016/j.osn.2006.09.005
[10]  Charbonneau, N. and Vokkarane, V.M. (2011) Performance Modeling of HS-RR-TCP over Load-Balanced Optical Burst-Switched (OBS) Networks. Optical Switching and Networking, 8, 116-128.
https://doi.org/10.1016/j.osn.2010.10.002
[11]  Jang-Jaccard, J. and Nepal, S. (2014) A Survey of Emerging Threats in Cybersecurity. Journal of Computer and System Sciences, 80, 973-993.
https://doi.org/10.1016/j.jcss.2014.02.005
[12]  Evans, G., Asante, M. and Acheampong Amponsah, A. (2016) Dynamic Routing Implementation Decision between OSPFv3 and IS-IS in IPv6 Networks. Communications on Applied Electronics, 6, 25-34.
https://doi.org/10.5120/cae2016652446
[13]  Leira, R., Aracil, J., López de Vergara, J.E., Roquero, P. and González, I. (2018) High-Speed Optical Networks Latency Measurements in the Microsecond Timescale with Software-Based Traffic Injection. Optical Switching and Networking, 29, 39-45.
https://doi.org/10.1016/j.osn.2018.03.004
[14]  Goda, K. (2016) Storage Area Network. In: Liu L. and Özsu M., Eds., Encyclopedia of Database Systems, Springer, New York, NY.
https://doi.org/10.1007/978-1-4899-7993-3_1329-2
[15]  Shimonski, R. (2013) Deep Analysis. In: Shimonski, R., Ed., The Wireshark Field Guide, Elsevier, location, 101-118.
https://doi.org/10.1016/B978-0-12-410413-6.00009-7
[16]  Rostami-Shahrbabaki, M., Safavi, A.A., Papageorgiou, M., Setoodeh, P. and Papamichail, I. (2020) State Estimation in Urban Traffic Networks: A Two-Layer Approach. Transportation Research Part C: Emerging Technologies, 115, Article ID: 102616.
https://doi.org/10.1016/j.trc.2020.102616
[17]  Masud, F., Abdullah, A.H., Abdul-Salaam, G. and Ullah, F. (2017) Traffic Adaptive MAC Protocols in Wireless Body Area Networks. Wireless Communications and Mobile Computing, 2017, Article ID: 8267162.
https://doi.org/10.1155/2017/8267162
[18]  Tian, Z. (2020) Chaotic Characteristic Analysis of Network Traffic Time Series at Different Time Scales. Chaos, Solitons and Fractals, 130, Article ID: 109412.
https://doi.org/10.1016/j.chaos.2019.109412
[19]  Raggo, M.T. (2016) Developing Your Mobile Device Security Strategy. In: Raggo, M.T., Ed., Mobile Data Loss, Elsevier, 37-43.
https://doi.org/10.1016/B978-0-12-802864-3.00005-2
[20]  Raggo, M.T. (2016) Preparing for Generation Mobile. In: Raggo, M.T., Ed., Mobile Data Loss, Elsevier, 1-6.
https://doi.org/10.1016/B978-0-12-802864-3.00001-5
[21]  Cuadra-sánchez, A. (2016) Mobile Data Loss: Threats and Countermeasures. Network Security, 2016, 4.
https://doi.org/10.1016/S1353-4858(16)30054-X

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133