Skip to main content

2022 | OriginalPaper | Buchkapitel

CoVerD: Community-Based Vertex Defense Against Crawling Adversaries

verfasst von : Pegah Hozhabrierdi, Sucheta Soundarajan

Erschienen in: Complex Networks & Their Applications X

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The problem of hiding a node inside of a network in the presence of an unauthorized crawler has been shown to be NP-complete. The available heuristics tackle this problem from mainly two perspectives: (1) the local immediate neighborhood of the target node (local perturbation models) and (2) the global structure of the graph (global perturbation models). While the objective of both is similar (i.e., decreasing the centrality of the target node), they vary substantially in their performance and efficiency; the global measures are computationally inefficient in the real-world scenarios, while the local perturbation methods deal with the problem of constrained performance. In this study, we propose a community-based heuristic, CoVerD, that retains both the computational efficiency of local methods and the superior performance of global methods in minimizing the target’s closeness centrality. Our experiments on five real-world networks show a significant increase in performance by using CoVerD against both BFS and DFS crawling attacks. In some instances, our algorithm successfully increased the crawler’s budget by 3 and 10 times compared to the next best-performing benchmark. The results of this study show the importance of the local community structure in preserving the privacy of the nodes in a network, and pave a promising path for designing scalable and effective network protection models.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
‘Community’ here refers to a topological community.
 
3
For our largest dataset, github, obtaining the results of the global measures was infeasible.
 
Literatur
1.
Zurück zum Zitat Abrahamsson, O.: Hide and seek in a social network. Master’s thesis, Linköping University, Sweden (2017) Abrahamsson, O.: Hide and seek in a social network. Master’s thesis, Linköping University, Sweden (2017)
2.
Zurück zum Zitat Areekijseree, K., Laishram, R., Soundarajan, S.: Max-node sampling: an expansion-densification algorithm for data collection. In: IEEE International Conference on Big Data (2016) Areekijseree, K., Laishram, R., Soundarajan, S.: Max-node sampling: an expansion-densification algorithm for data collection. In: IEEE International Conference on Big Data (2016)
3.
Zurück zum Zitat Areekijseree, K., Laishram, R., Soundarajan, S.: Guidelines for online network crawling: a study of data collection approaches and network properties. In: Proceedings of the 10th ACM Conference on Web Science (2018) Areekijseree, K., Laishram, R., Soundarajan, S.: Guidelines for online network crawling: a study of data collection approaches and network properties. In: Proceedings of the 10th ACM Conference on Web Science (2018)
4.
Zurück zum Zitat Avram, M.V., Mishra, S., Parulian, N.N., Diesner, J.: Adversarial perturbations to manipulate the perception of power and influence in networks. In: 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE (2019) Avram, M.V., Mishra, S., Parulian, N.N., Diesner, J.: Adversarial perturbations to manipulate the perception of power and influence in networks. In: 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE (2019)
5.
Zurück zum Zitat Bai, Q., Xiong, G., Zhao, Y., He, L.: Analysis and detection of bogus behavior in web crawler measurement. Proc. Comput. Sci. 31, 1084–1091 (2014)CrossRef Bai, Q., Xiong, G., Zhao, Y., He, L.: Analysis and detection of bogus behavior in web crawler measurement. Proc. Comput. Sci. 31, 1084–1091 (2014)CrossRef
6.
Zurück zum Zitat Bisenius, P., Bergamin, E., Angriman, E., Meyerhenke, H.: Computing top-k closeness centrality in fully-dynamic graphs. In: 2018 Proceedings of the Twentieth Workshop on Algorithm Engineering and Experiments (ALENEX). SIAM (2018) Bisenius, P., Bergamin, E., Angriman, E., Meyerhenke, H.: Computing top-k closeness centrality in fully-dynamic graphs. In: 2018 Proceedings of the Twentieth Workshop on Algorithm Engineering and Experiments (ALENEX). SIAM (2018)
7.
Zurück zum Zitat Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech: Theory Exp. 2008(10), P10008 (2008)CrossRefMATH Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech: Theory Exp. 2008(10), P10008 (2008)CrossRefMATH
8.
Zurück zum Zitat Borassi, M., Crescenzi, P., Marino, A.: Fast and simple computation of top-k closeness centralities. arXiv preprint arXiv:1507.01490 (2015) Borassi, M., Crescenzi, P., Marino, A.: Fast and simple computation of top-k closeness centralities. arXiv preprint arXiv:​1507.​01490 (2015)
12.
Zurück zum Zitat Gupta, N., Singh, A., Cherifi, H.: Community-based immunization strategies for epidemic control. In: 2015 7th International Conference on Communication Systems and Networks (COMSNETS). IEEE (2015) Gupta, N., Singh, A., Cherifi, H.: Community-based immunization strategies for epidemic control. In: 2015 7th International Conference on Communication Systems and Networks (COMSNETS). IEEE (2015)
13.
Zurück zum Zitat Hozhabrierdi, P., Zhu, R., Onyewu, M., Soundarajan, S.: Network-based analysis of early pandemic mitigation strategies: solutions, and future directions. Northeast J. Complex Syst. (NEJCS) 3(1), 3 (2021) Hozhabrierdi, P., Zhu, R., Onyewu, M., Soundarajan, S.: Network-based analysis of early pandemic mitigation strategies: solutions, and future directions. Northeast J. Complex Syst. (NEJCS) 3(1), 3 (2021)
15.
Zurück zum Zitat Kumar, M., Bhatia, R., Rattan, D.: A survey of web crawlers for information retrieval. Wiley Interdisc. Rev.: Data Min. Knowl. Discov. 7(6), e1218 (2017) Kumar, M., Bhatia, R., Rattan, D.: A survey of web crawlers for information retrieval. Wiley Interdisc. Rev.: Data Min. Knowl. Discov. 7(6), e1218 (2017)
16.
Zurück zum Zitat Laishram, R., Hozhabrierdi, P., Wendt, J., Soundarajan, S.: NetProtect: network perturbations to protect nodes against entry-point attack. In: 13th ACM Web Science Conference 2021 (2021) Laishram, R., Hozhabrierdi, P., Wendt, J., Soundarajan, S.: NetProtect: network perturbations to protect nodes against entry-point attack. In: 13th ACM Web Science Conference 2021 (2021)
17.
Zurück zum Zitat Mondal, M., et al.: Defending against large-scale crawls in online social networks. In: Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies (2012) Mondal, M., et al.: Defending against large-scale crawls in online social networks. In: Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies (2012)
18.
Zurück zum Zitat Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: IEEE Symposium on Security and Privacy. IEEE (2009) Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: IEEE Symposium on Security and Privacy. IEEE (2009)
20.
Zurück zum Zitat Olsen, P.W., Labouseur, A.G., Hwang, J.H.: Efficient top-k closeness centrality search. In: 2014 IEEE 30th International Conference on Data Engineering. IEEE (2014) Olsen, P.W., Labouseur, A.G., Hwang, J.H.: Efficient top-k closeness centrality search. In: 2014 IEEE 30th International Conference on Data Engineering. IEEE (2014)
21.
Zurück zum Zitat Rüdian, S., Pinkwart, N., Liu, Z.: I know who you are: deanonymization using Facebook likes. In: Workshops der INFORMATIK 2018-Architekturen, Prozesse, Sicherheit und Nachhaltigkeit. Köllen Druck+ Verlag GmbH (2018) Rüdian, S., Pinkwart, N., Liu, Z.: I know who you are: deanonymization using Facebook likes. In: Workshops der INFORMATIK 2018-Architekturen, Prozesse, Sicherheit und Nachhaltigkeit. Köllen Druck+ Verlag GmbH (2018)
22.
Zurück zum Zitat Schlicher, B.G., MacIntyre, L.P., Abercrombie, R.K.: Towards reducing the data exfiltration surface for the insider threat. In: 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE (2016) Schlicher, B.G., MacIntyre, L.P., Abercrombie, R.K.: Towards reducing the data exfiltration surface for the insider threat. In: 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE (2016)
24.
Zurück zum Zitat Wang, M., Tan, Q., Wang, X., Shi, J.: De-anonymizing social networks user via profile similarity. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). IEEE (2018) Wang, M., Tan, Q., Wang, X., Shi, J.: De-anonymizing social networks user via profile similarity. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). IEEE (2018)
25.
Zurück zum Zitat Waniek, M., Michalak, T.P., Wooldridge, M.J., Rahwan, T.: Hiding individuals and communities in a social network. Nat. Hum. Behav. 2(2), 139–147 (2018)CrossRef Waniek, M., Michalak, T.P., Wooldridge, M.J., Rahwan, T.: Hiding individuals and communities in a social network. Nat. Hum. Behav. 2(2), 139–147 (2018)CrossRef
Metadaten
Titel
CoVerD: Community-Based Vertex Defense Against Crawling Adversaries
verfasst von
Pegah Hozhabrierdi
Sucheta Soundarajan
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-93409-5_30

Premium Partner