Skip to main content

2015 | OriginalPaper | Buchkapitel

11. Active Discovery of Hidden Profiles in Social Networks Using Malware

verfasst von : Rami Puzis, Yuval Elovici

Erschienen in: Cyber Warfare

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this study we investigate the problem of diffusion in social networks, an issue which is relevant in areas such as cyber intelligence. Contrary to related work that focuses on the identification of invisible areas of a social network, our work focuses on finding the most effective nodes for placing seeds in order to effectively reveal hidden nodes in a focused manner. The seeds may consist of malware that propagates in social networks and is capable of revealing hidden invisible nodes. The malware has only limited time to function and operate in stealth mode so as not to alert the hidden node, thus there is a need to identify and utilize the visible nodes that are most effective at spreading the malware across the hidden nodes with minimal effect on the visible nodes. We empirically evaluate the ability of the Weighted Closeness metric (WC) among visible nodes to improve diffusion focus and reach invisible nodes in a social network. Experiments performed with a variety of social network topologies validated the effectiveness of the proposed method.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Aggarwal, C.: Social network data analytics. Springer-Verlag New York Inc (2011) Aggarwal, C.: Social network data analytics. Springer-Verlag New York Inc (2011)
Zurück zum Zitat Airoldi, E., Blei, D., Fienberg, S., Xing, E., Jaakkola, T.: Mixed membership stochastic block models for relational data with application to protein-protein interactions. In: Proceedings of the international biometrics society annual meeting (2006) Airoldi, E., Blei, D., Fienberg, S., Xing, E., Jaakkola, T.: Mixed membership stochastic block models for relational data with application to protein-protein interactions. In: Proceedings of the international biometrics society annual meeting (2006)
Zurück zum Zitat A. Almog, Goldberger, J., Y. Shavitt. Unifying unknown nodes in the internet graph using semisupervised spectral clustering. Data Mining Workshops, International Conference on 174–183, 2008 A. Almog, Goldberger, J., Y. Shavitt. Unifying unknown nodes in the internet graph using semisupervised spectral clustering. Data Mining Workshops, International Conference on 174–183, 2008
Zurück zum Zitat Arquilla, J., Ronfeldt, D.: Networks and netwars: The future of terror, crime, and militancy. 1382. Rand Corp (2001) Arquilla, J., Ronfeldt, D.: Networks and netwars: The future of terror, crime, and militancy. 1382. Rand Corp (2001)
Zurück zum Zitat Basu, A.: Social network analysis of terrorist organizations in india. In: North American Association for Computational Social and Organizational Science (NAACSOS) Conference, pp. 26–28 (2005) Basu, A.: Social network analysis of terrorist organizations in india. In: North American Association for Computational Social and Organizational Science (NAACSOS) Conference, pp. 26–28 (2005)
Zurück zum Zitat Dombroski, M., Fischbeck, P., Carley, K.: Estimating the shape of covert networks. In: Proceedings of the 8th International Command and Control Research and Technology Symposium (2003) Dombroski, M., Fischbeck, P., Carley, K.: Estimating the shape of covert networks. In: Proceedings of the 8th International Command and Control Research and Technology Symposium (2003)
Zurück zum Zitat R. Eyal, S. Kraus, and A. Rosenfeld. “Identifying Missing Node Information in Social Networks”, AAAI 2011, 2011 R. Eyal, S. Kraus, and A. Rosenfeld. “Identifying Missing Node Information in Social Networks”, AAAI 2011, 2011
Zurück zum Zitat M.R. Faghani, H. Saidi. “Malware propagation in online social networks”, In proceeding of the 4th IEEE International malicious and unwanted programs (Malware09), Montreal, Canada, 2009 M.R. Faghani, H. Saidi. “Malware propagation in online social networks”, In proceeding of the 4th IEEE International malicious and unwanted programs (Malware09), Montreal, Canada, 2009
Zurück zum Zitat Hasan, M.A., Chaoji, V., Salem, S., Zaki, M.: Link prediction using supervised learning. SDM Workshop of Link Analysis, Counterterrorism and Security (2006) Hasan, M.A., Chaoji, V., Salem, S., Zaki, M.: Link prediction using supervised learning. SDM Workshop of Link Analysis, Counterterrorism and Security (2006)
Zurück zum Zitat C. Kang, C. Molinaro, S. Kraus, Y. Shavitt, V. Subrahmanian. “Diffusion Centrality in Social Networks”. Proceedings “Advances in Social Network Analysis and Mining (ASONAM)”, Istanbul, Turkey, 2012. C. Kang, C. Molinaro, S. Kraus, Y. Shavitt, V. Subrahmanian. “Diffusion Centrality in Social Networks”. Proceedings “Advances in Social Network Analysis and Mining (ASONAM)”, Istanbul, Turkey, 2012.
Zurück zum Zitat M. Kim, J. Leskovec. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks. In SDM ’11, 2011. M. Kim, J. Leskovec. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks. In SDM ’11, 2011.
Zurück zum Zitat Krebs, V.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2001) Krebs, V.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2001)
Zurück zum Zitat Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks. Journal of the American society for information science and technology 58(7), 1019–1031 (2007)CrossRef Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks. Journal of the American society for information science and technology 58(7), 1019–1031 (2007)CrossRef
Zurück zum Zitat Ressler, S.: Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs 2(2), 1–10 (2006) Ressler, S.: Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs 2(2), 1–10 (2006)
Zurück zum Zitat Rodriquez, J.: The march 11th terrorist network: In its weakness lies its strength (2005) Rodriquez, J.: The march 11th terrorist network: In its weakness lies its strength (2005)
Zurück zum Zitat Rothenberg, R.: From whole cloth: Making up the terrorist network. Connections 24(3), 36–42 (2001) Rothenberg, R.: From whole cloth: Making up the terrorist network. Connections 24(3), 36–42 (2001)
Zurück zum Zitat Sageman, M.: Understanding terror networks. Univ of Pennsylvania Pr (2004) Sageman, M.: Understanding terror networks. Univ of Pennsylvania Pr (2004)
Zurück zum Zitat P. Shakarian, M., Broecheler, V.S. Subrahmanian, and C. Molinaro. “Using Generalized Annotated Programs to Solve Social Network Diffusion Optimization Problems,” ACM Transactions on Computational Logic, Accepted for publication, 2012. P. Shakarian, M., Broecheler, V.S. Subrahmanian, and C. Molinaro. “Using Generalized Annotated Programs to Solve Social Network Diffusion Optimization Problems,” ACM Transactions on Computational Logic, Accepted for publication, 2012.
Zurück zum Zitat Stern, R.T., Samama, L., Puzis, R., Beja, T., Bnaya, Z., & Felner, A. (2013, June). TONIC: Target Oriented Network Intelligence Collection for the Social Web. In AAAI.‏ Stern, R.T., Samama, L., Puzis, R., Beja, T., Bnaya, Z., & Felner, A. (2013, June). TONIC: Target Oriented Network Intelligence Collection for the Social Web. In AAAI.‏
Zurück zum Zitat Wiil, U., Memon, N., Karampelas, P.: Detecting new trends in terrorist networks. In: Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Conference on, pp. 435–440. IEEE (2010) Wiil, U., Memon, N., Karampelas, P.: Detecting new trends in terrorist networks. In: Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Conference on, pp. 435–440. IEEE (2010)
Zurück zum Zitat W. Xu, F. Zhang, and S. Zhu. Toward worm detection in online social networks. In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), 2010. W. Xu, F. Zhang, and S. Zhu. Toward worm detection in online social networks. In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), 2010.
Metadaten
Titel
Active Discovery of Hidden Profiles in Social Networks Using Malware
verfasst von
Rami Puzis
Yuval Elovici
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-14039-1_11