Security Threat and Data Consumption as Mojor Nuisance of Social Media on Wi-Fi Network

This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.


Introduction
Security of networks as well as data consumption with reference to the traffic on the network, are serious issues experts consider in determining the efficiency of a network. The vulnerability of a network as well as the throughput of a network affects the use of the network. Kwame Nkrumah University of science and tech-Int. J. Communications, Network and System Sciences nology is one of the first class universities in West Africa for the technological sciences. The university is made up of colleges that handle students both in the traditional classroom and online. College networks are in place to assist in blended learning where traditional classroom learning and online learning can be used to achieve the goal of education to achieve the core mandate of the college. Whereas some colleges choose to run their own e-learning platforms and blend content for their learners, others allow their learners to search for content on different websites to gather their own information. The use of social media platforms is very common in the later. These platforms usually do not have restrictions on the content and protocol in use. Many of the social media platforms use TCP as a major protocol and also run services such as HTTP and HTTPs as major services. These services and protocols however do not guarantee security on a network. The services, protocol, and content used on these platforms lead to higher consumption of internet data and bandwidth which eventually introduces traffic and reduces the throughput of the network. This finally affects the college in terms of cost and maintenance of the network. Several research works are conducted on the security of wireless networks and how to protect the network. However, little attention is paid to the social media applications allowed to run on the networks. This poses a serious nuisance on the networks.
The research seeks to address the following: 1) Identify the security threats of social media applications on Wi-Fi networks in colleges.
2) Ascertain the nuisance of data consumptions and associated traffic on the Wi-Fi network using the Device Accounting recording from the users of the network.
Nmap Zenmap GUI application was used to scan the network to find out the vulnerabilities with reference to the social media platforms that are allowed on the network and the protocols or services used by the various social media platforms. The top ten (10) social media platforms identified on the network are; Facebook, YouTube, WhatsApp, Messenger, Instagram, Tik-Tok, Twitter, Lin-kedIn, telegram, and skype. These platforms were accessed based on Monthly Active Unique Users (MAUU) Monthly Data Usage (MDU) and Monthly Billing Cycle (MBC). The protocols, services, and the type of content used on these platforms were also considered. All these were done on the college Wi-Fi network. Device Accounting (DA) data recording was used.

Background
Kwame Nkrumah University of Science and Technology (KNUST) is the second largest university in Ghana in sub-Sahara Africa and is located in Kumasi the regional Capital of the second most developed region in the country. It has a student population of 55,590 comprising 21,285 Undergraduates and 2306 Postgraduates for the 2019/2020 academic year. The university blends online learning with traditional classroom learning at all levels. The use of the Internet is therefore a compulsion but not a choice. Ruckus outdoor AP Wi-Fi network is Int. J. Communications, Network and System Sciences available in the university campus to enable students and lecturers access the internet at all time. This has a throughput capacity of 800 Mbps (2.4 GHz) and 1733 Mbps (5 GHz). The free access to the internet gives many students the chance to access content on social media platforms with passion. This however does not enhance maximum efficiency on the network since it generates more traffic, introduces latency, poses security threats on the network and also increases the cost of internet data in the university.
According to [1], the geographical location of a person influences communication. Urban planners should therefore use social media platforms to identify the needs of urban areas in planning. The paper [2] reveals that the users of the network visit social media platforms with passion. They demonstrate their ego in sharing content and receiving content from other users. According to [3] whereas social gatherings are limited by resources, social media interactions are unlimited with more resources which makes users stay longer on it. A careful scan of the network using Nmap Zenmap GUI application revealed some social media platforms as the most visited and frequently accessed by students. A check on the data usage on the devices also revealed that these applications or platforms are ranked higher in data consumption. This calls for an investigation into the efficiency of the network with reference to the use of these social media platforms.
A mobile and communication technologist [4] categories cost, resources and energy under efficiency in talking about the important fields of future mobile and wireless communication technology. The research also indicated that, the projected traffic exponential increase, emergence of huge amounts of communicating devices and the consistently varied requirements and use cases have to be taken into consideration in the production of future mobile and wireless communication systems.
Checking on the protocols used by the social media platforms, it reveals TCP as the most used protocol by social media platform. HTTP, HTTPs, xmp-client and some unknown services. These pose serious security threats to the network.

Top Social Media Platforms
Adobe Spark's 2020 [5] ranking of social media sites places senven (7) top social media sites as Instagram, YouTube, Facebook, Twitter, Tik-Tok, Printerest and Snapchat. DreamGrow which is a source of marketing and social media information ranked fifteen (15) top social media sites as the most popular and good for businesses [6]. According to [7] there are top twenty-one (21) social medial platforms that can be seen on most websites and for that matter very useful for businesses to market their products. They are used to take full advantage of brand reach, identify and reach out to the right users and also reach social media goals. This makes it important for most of these social media content to be available on many networks thereby making it a nuisance in terms of enhancing the efficiency of the network. However, the social medial platforms mentioned in this research are not necessarily the top ten social media platforms used in the Int. J. Communications, Network and System Sciences college in terms of the way he ranked them. His ranking was global but this research is limited to only the college.

Protocols Used in Social Media Communications
Protocol refers to a standard set of rules that allows connections between and among devices to exchange information. It determines the type of data, commands and confirmation of data transfer within and across a network. [8] indicated that, the rise in consumption of multimedia content and the need for high quality content from content providers influences how networks are managed in terms of content segregation. Social media uses multimedia content such as text, graphics, animations, videos and sound. These media elements are often hyperlinked or hypermedia. This is done over the internet with multiple users with TCP as the most used protocol in transmitting the information across networks.
According to [9] research into TCP performance over Optical Burst Switching According to [10] TCP-over-OBS can be used as transport standard to support next-generation Internet. Load-balanced routing is known to be improving loss performance over OBS. However, implementing TCP over load-balanced OBS can result to increased out-of-order delivery of TCP packets, which may lead to frequent timeouts and quicker retransmissions. Reordering-Robust TCP (RR-TCP) over OBS networks was realized in performance. It was observed that, standard TCP experiences significant throughput degradation due to persistent packet reordering. It is however worthy to note that all the above interventions will increase the load on a network, increase the delay in packet transmission and also make the network overloaded in terms of software.

Secure versus Unsecure Protocols
According to [11] the unexpected growth in the Internet has increased cyber-attack incidents with more damaging effects. This calls for the use of protocols that can help enhance maximum security [4] predicted that in 2020, the traffic generated by mobile and wireless devices will increase a thousand times over 2010 figures and also rise in the number of wireless devices connected in tens of billions which will have a deep effect on society. This does not only call for security but the need to boast speed as traffic on networks will increase. Ac-F. Inusah et al. Int. J. Communications, Network and System Sciences cording to [12], the choice of a suitable routing protocol for implementation is an important part of every network design. Several decisions are considered in order to select the best protocol for deployment. These decisions include speed, accuracy, security, cost and management of the protocol with reference to the content. This decision in choosing a protocol is necessary in order to protect the network. There is however a challenge in achieving both security and speed at the same time. In [13], it is indicated clearly that controlling latency is a major concern in SAN. Packet engines such as DPDK, can be used to measure latencies in high-speed optical networks. In the book chapter [14] TCP as a widely used protocol is known for its unsecured ports. Except port 860 and 3260, all other ports on TCP are not secure. A software-based solution to measure latency is better among proposed solutions. An extension that serves to measure bandwidth will also be a good recommendation. However, it is clear that as security is enhanced by introducing software to manage the network, latency is introduced and traffic increased with low throughput.

Network Traffic
This is the amount of data moving across a network at a given point in time [15] opined that if communication device is receiving too much traffic, the device's ability to process the traffic may be jeopardized as it will be overwhelmed. This can cause dropped packets on the network. It is mostly used in Denial of Service (DoS) attacks on networks. The latency introduced by traffic in networks is a major nuisance that drastically reduces the efficiency of the network. This nuisance must be managed in networks. In the paper [16] traffic is seen as a nuisance on the road in urban areas. The conscious effort made to reduce the traffic in that research is assuming availability of connected vehicles data. Two layers i.e. link layer and network layer are used to estimate high resolution in seconds for the whole network. This nuisance and the solution applied to it is not completely different from the traffic generated on the Internet. In [17], a traffic adaption mechanism is used to manage a wireless body area network by adapting Medium Access Control Protocol (MAC) for patient healthcare. This is to enable efficiency by increasing speed, accuracy and easy to work in the health sector. The paper [18] did a network traffic prediction by using chaotic characteristics of network traffic time series collected at different time scales. This was compared to the autocorrelation of network traffic. It was revealed that, network traffic is chaotic. This clear indication of traffic as a nuisance is enough evidence to eliminate traffic on networks.

Carrier Data Accounting (CDA) vs Device Accounting (DA)
A researcher [19] suggested that in developing mobile applications, both security and users of the device should be taken into consideration. The ability of users to access and know the amount of data consumed by them with reference to the applications and the devices they are using is a convenience in the use of smart-phones and other mobile devices. According to [20] there is a shift from the first generation of mobile devices to more sophisticated and convenient mobile devices for user consumption. These devices are internet enabled devices that use internet data. Data consumption on a device may vary from one device to another. As opined in [21], devices on the network of an organization does consume data to enable in connection to the organization's network. The calculation of the user on how much data is spent on accessing the internet may differ from the recordings of the device. The former is the Carrier Data Accounting whiles the latter is the Device Accounting. The variance however should not be so huge. Carrier data accounting is necessary for the user to know the expenditure in using the internet.
The calculations of the device on how much data is spent on each application on the internet help in knowing the applications and the intensity of the application on data consumption. In this research, the device accounting was used to determine how much data the device consumes on the top ten social media network applications. This was necessary to help in knowing the cost involved in managing the network in the university. It was also to help in determining the bandwidth and the congestion as well as traffic on the network.

Methodology
The research employed experimentation and online questionnaire to collect data. The Nmap Zenmap GUI application was used to scan the various social media platform websites to identify the protocols, ports and services running. It was also to disclose the state of the ports as either close or open to determine level of security. A sample of one hundred (100) validated data from respondents was used for the analysis. An online questionnaire was also used to solicit the information on social media data usage from the users of the network. This questionnaire was sent to WhatsApp platforms for the students to provide information on their data consumption. In all, the ten most used social media platforms websites were scanned and well answered questionnaires were used in the analysis. Averages were used in the analysis of the data. The more data an application consumes online, the more traffic it introduces and the less efficient it is.

Procedure in Data Collection
Each of the top ten social media platforms was scanned using the Nmap Zenmap 7.80 application. It was an intense scan on all TCP ports. This was done to identify the protocol, port, state of the port (open or close) and services running. It was necessary to know the strengths and weaknesses of the websites visited in terms of security. Figure 1 shows the command line scan results of Facebook with reference to the protocol, ports, and services running. Figure 2 is   The questionnaire used to collect data from users of the network (students and lecturers) was organized in terms of the data consumption rate for each user. This was done by collecting information on mobile devices such as smartphone and laptops. The default billing cycle for the devices is monthly of 30 days. The step below was followed to record information on smart phones. 1) Go to Settings.

3) Wi-Fi data usage. 4) Tap on the date on top right Conner of graph. 5) Select each most previous duration consumption and record each application's data consumption.
This procedure was used just to know the device data accounting for the social medial applications looked at. It is worth noting that device accounting may be different from carrier data accounting. Figuer 3 shows the interface of the Wi-Fi data usage.

Nmap Scan Results
The results of the Nmap Zenmap application was analyzed and organized in a tabular form for easy understanding. It was seen that all the social media applications are running on TCP as a protocol, have http as service for the application and at least one open port. This poses a serious security threat on the network. Table 1 shows the results.
All the social media platforms use TCP which does not protect a segment against message change attacks. TCP does not protect networks against the illegal access attacks. It has a field used in order to recognize a change of a segment. However, since this field is not protected against the message modification attacks, it is possible to modify any TCP segments because it cannot keep segment data secure against the message eavesdropping attacks. TCP transports data in the application layer but since it does not provide any data encryption functions, anyone can gain access to any valuable information. TCP verifies a peer device by using the source IP address and a port number. However, it is possible to modify the source address and port number. Since all the social media platforms has one or more ports opened, it pose very serious security threats since an attacker can attack the network through this.

Data Consumption
The data consumption on the social media applications were recorded and analyzed. Three previous months data consumption was recorded to know the pattern of consumption. RapidMiner Studio Educational 9.6.00 was used to validate the data from users to eliminate incomplete data to enhance more accuracy in analysis. After validation, 100 participants accurately produced the data. The refined data was then copied to Microsoft excel to analyze. This was done in separate sheets in Microsoft excel for analysis. Each month's data consumption was analyzed in terms of the minimum consumption, maximum consumption, averages and the total data consumptions on all the ten social media platforms by a user. This was necessary to know the rate at which users of the network used the data on the social medial platforms and also determine the average, minimum, maximum and MAUU cost of data for the university. graph to know the true pattern of data consumption. This can be seen in Figure   7. Table 2 shows data on three months minimum, average and maximum consumption.

Summary
The top ten social media platforms i.e. Facebook, WhatsApp, Twitter, YouTube, Messenger, Instagram, Telegram, LinkedIn, Telegram and Tik-Tok are not running on secured protocols and services. This calls for serious attention on the security of networks that allows such application. A proper filtering mechanism is necessary to protect the network from attacks.     This is equivalent to 4 gigabytes, 300 megabytes. This rate at which youngsters especially students connect to social media platform with passion gives a clear indication that cost of data and traffic on networks will be a challenge if these social media applications are allowed to run. It is therefore necessary for network administrators to control these social media platforms and limit the activities on them to reduce the traffic generated on the network and allow more important content to gain priority. For maximum efficiency, educational institutions should adopt "zero data" for e-learning platforms and reduce data availability for free browsing on social media websites in other to make learners frequently access educational materials and reduce the cost of managing the networks. A URL Filtering on the Rockus Outdoor Ap will also be effective for solving the problem

Conclusions
Entertainment is relevant for education but not mandatory for learning. If social media platforms are posing security threats, increasing unnecessary traffic, and resulting in the high cost of maintaining networks, then it is necessary to filter the social media applications to pave way for more educational content in the university's network. The nuisance of social media is a result of the nature of the content or media that is allowed. Users of a network are often attracted to this content. The ability of the content to lure the users makes it necessary for traffic to be generated on the network through social media applications. As the users of the network are students at both undergraduate and post-graduate levels, the use of social media platforms cannot be minimized on the network if the media is allowed to run. The only reliable way of doing away with the nuisance is by filtering the social media applications to give educational content more priority on the network. This will reduce the time users of the network spend on social media applications and also increase the time used on educational content.
The security of the network will be boasted if the social media applications are not allowed to run on the network. It is clear that the protocols, as well as the ports and services running on the social media applications, are not secured.
This poses a lot of security threats on the network. This can result in serious attacks on the network and loss of vital information. Filtering these social media applications from the network is, therefore, a necessity.
On the issue of the traffic generated by the social media platforms, the nature of the users of the network makes it difficult to have the media running on the network and also achieving high bandwidth and throughput for the network.
The majority of the traffic generated on the network is social media content related and the passion in accessing the content is a result of the luring nature of the content. Filtering these platforms will therefore allow better content to be Int. J. Communications, Network and System Sciences available and used on the network.
The cost of maintenance on the network is higher as a result of the data consumed and the security updates and or patches needed in handling the vulnerabilities on the network. The college spends so much in providing data for the network due to the rate at which data is being consumed on the social media platforms at the expense of the educational content and other relevant content.
The most effective way of managing this expenditure is to minimize or eliminate the social media platform or content on the network. This can be done through filtering of the social media platforms to allow relevant academic content to gain priority on the network. A URL filtering of the social media websites will be more efficient in handling this problem.