Skip to main content
Top

2022 | OriginalPaper | Chapter

CoVerD: Community-Based Vertex Defense Against Crawling Adversaries

Authors : Pegah Hozhabrierdi, Sucheta Soundarajan

Published in: Complex Networks & Their Applications X

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The problem of hiding a node inside of a network in the presence of an unauthorized crawler has been shown to be NP-complete. The available heuristics tackle this problem from mainly two perspectives: (1) the local immediate neighborhood of the target node (local perturbation models) and (2) the global structure of the graph (global perturbation models). While the objective of both is similar (i.e., decreasing the centrality of the target node), they vary substantially in their performance and efficiency; the global measures are computationally inefficient in the real-world scenarios, while the local perturbation methods deal with the problem of constrained performance. In this study, we propose a community-based heuristic, CoVerD, that retains both the computational efficiency of local methods and the superior performance of global methods in minimizing the target’s closeness centrality. Our experiments on five real-world networks show a significant increase in performance by using CoVerD against both BFS and DFS crawling attacks. In some instances, our algorithm successfully increased the crawler’s budget by 3 and 10 times compared to the next best-performing benchmark. The results of this study show the importance of the local community structure in preserving the privacy of the nodes in a network, and pave a promising path for designing scalable and effective network protection models.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
‘Community’ here refers to a topological community.
 
3
For our largest dataset, github, obtaining the results of the global measures was infeasible.
 
Literature
1.
go back to reference Abrahamsson, O.: Hide and seek in a social network. Master’s thesis, Linköping University, Sweden (2017) Abrahamsson, O.: Hide and seek in a social network. Master’s thesis, Linköping University, Sweden (2017)
2.
go back to reference Areekijseree, K., Laishram, R., Soundarajan, S.: Max-node sampling: an expansion-densification algorithm for data collection. In: IEEE International Conference on Big Data (2016) Areekijseree, K., Laishram, R., Soundarajan, S.: Max-node sampling: an expansion-densification algorithm for data collection. In: IEEE International Conference on Big Data (2016)
3.
go back to reference Areekijseree, K., Laishram, R., Soundarajan, S.: Guidelines for online network crawling: a study of data collection approaches and network properties. In: Proceedings of the 10th ACM Conference on Web Science (2018) Areekijseree, K., Laishram, R., Soundarajan, S.: Guidelines for online network crawling: a study of data collection approaches and network properties. In: Proceedings of the 10th ACM Conference on Web Science (2018)
4.
go back to reference Avram, M.V., Mishra, S., Parulian, N.N., Diesner, J.: Adversarial perturbations to manipulate the perception of power and influence in networks. In: 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE (2019) Avram, M.V., Mishra, S., Parulian, N.N., Diesner, J.: Adversarial perturbations to manipulate the perception of power and influence in networks. In: 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE (2019)
5.
go back to reference Bai, Q., Xiong, G., Zhao, Y., He, L.: Analysis and detection of bogus behavior in web crawler measurement. Proc. Comput. Sci. 31, 1084–1091 (2014)CrossRef Bai, Q., Xiong, G., Zhao, Y., He, L.: Analysis and detection of bogus behavior in web crawler measurement. Proc. Comput. Sci. 31, 1084–1091 (2014)CrossRef
6.
go back to reference Bisenius, P., Bergamin, E., Angriman, E., Meyerhenke, H.: Computing top-k closeness centrality in fully-dynamic graphs. In: 2018 Proceedings of the Twentieth Workshop on Algorithm Engineering and Experiments (ALENEX). SIAM (2018) Bisenius, P., Bergamin, E., Angriman, E., Meyerhenke, H.: Computing top-k closeness centrality in fully-dynamic graphs. In: 2018 Proceedings of the Twentieth Workshop on Algorithm Engineering and Experiments (ALENEX). SIAM (2018)
7.
go back to reference Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech: Theory Exp. 2008(10), P10008 (2008)CrossRefMATH Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech: Theory Exp. 2008(10), P10008 (2008)CrossRefMATH
8.
go back to reference Borassi, M., Crescenzi, P., Marino, A.: Fast and simple computation of top-k closeness centralities. arXiv preprint arXiv:1507.01490 (2015) Borassi, M., Crescenzi, P., Marino, A.: Fast and simple computation of top-k closeness centralities. arXiv preprint arXiv:​1507.​01490 (2015)
12.
go back to reference Gupta, N., Singh, A., Cherifi, H.: Community-based immunization strategies for epidemic control. In: 2015 7th International Conference on Communication Systems and Networks (COMSNETS). IEEE (2015) Gupta, N., Singh, A., Cherifi, H.: Community-based immunization strategies for epidemic control. In: 2015 7th International Conference on Communication Systems and Networks (COMSNETS). IEEE (2015)
13.
go back to reference Hozhabrierdi, P., Zhu, R., Onyewu, M., Soundarajan, S.: Network-based analysis of early pandemic mitigation strategies: solutions, and future directions. Northeast J. Complex Syst. (NEJCS) 3(1), 3 (2021) Hozhabrierdi, P., Zhu, R., Onyewu, M., Soundarajan, S.: Network-based analysis of early pandemic mitigation strategies: solutions, and future directions. Northeast J. Complex Syst. (NEJCS) 3(1), 3 (2021)
15.
go back to reference Kumar, M., Bhatia, R., Rattan, D.: A survey of web crawlers for information retrieval. Wiley Interdisc. Rev.: Data Min. Knowl. Discov. 7(6), e1218 (2017) Kumar, M., Bhatia, R., Rattan, D.: A survey of web crawlers for information retrieval. Wiley Interdisc. Rev.: Data Min. Knowl. Discov. 7(6), e1218 (2017)
16.
go back to reference Laishram, R., Hozhabrierdi, P., Wendt, J., Soundarajan, S.: NetProtect: network perturbations to protect nodes against entry-point attack. In: 13th ACM Web Science Conference 2021 (2021) Laishram, R., Hozhabrierdi, P., Wendt, J., Soundarajan, S.: NetProtect: network perturbations to protect nodes against entry-point attack. In: 13th ACM Web Science Conference 2021 (2021)
17.
go back to reference Mondal, M., et al.: Defending against large-scale crawls in online social networks. In: Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies (2012) Mondal, M., et al.: Defending against large-scale crawls in online social networks. In: Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies (2012)
18.
go back to reference Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: IEEE Symposium on Security and Privacy. IEEE (2009) Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: IEEE Symposium on Security and Privacy. IEEE (2009)
20.
go back to reference Olsen, P.W., Labouseur, A.G., Hwang, J.H.: Efficient top-k closeness centrality search. In: 2014 IEEE 30th International Conference on Data Engineering. IEEE (2014) Olsen, P.W., Labouseur, A.G., Hwang, J.H.: Efficient top-k closeness centrality search. In: 2014 IEEE 30th International Conference on Data Engineering. IEEE (2014)
21.
go back to reference Rüdian, S., Pinkwart, N., Liu, Z.: I know who you are: deanonymization using Facebook likes. In: Workshops der INFORMATIK 2018-Architekturen, Prozesse, Sicherheit und Nachhaltigkeit. Köllen Druck+ Verlag GmbH (2018) Rüdian, S., Pinkwart, N., Liu, Z.: I know who you are: deanonymization using Facebook likes. In: Workshops der INFORMATIK 2018-Architekturen, Prozesse, Sicherheit und Nachhaltigkeit. Köllen Druck+ Verlag GmbH (2018)
22.
go back to reference Schlicher, B.G., MacIntyre, L.P., Abercrombie, R.K.: Towards reducing the data exfiltration surface for the insider threat. In: 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE (2016) Schlicher, B.G., MacIntyre, L.P., Abercrombie, R.K.: Towards reducing the data exfiltration surface for the insider threat. In: 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE (2016)
24.
go back to reference Wang, M., Tan, Q., Wang, X., Shi, J.: De-anonymizing social networks user via profile similarity. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). IEEE (2018) Wang, M., Tan, Q., Wang, X., Shi, J.: De-anonymizing social networks user via profile similarity. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). IEEE (2018)
25.
go back to reference Waniek, M., Michalak, T.P., Wooldridge, M.J., Rahwan, T.: Hiding individuals and communities in a social network. Nat. Hum. Behav. 2(2), 139–147 (2018)CrossRef Waniek, M., Michalak, T.P., Wooldridge, M.J., Rahwan, T.: Hiding individuals and communities in a social network. Nat. Hum. Behav. 2(2), 139–147 (2018)CrossRef
Metadata
Title
CoVerD: Community-Based Vertex Defense Against Crawling Adversaries
Authors
Pegah Hozhabrierdi
Sucheta Soundarajan
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-93409-5_30

Premium Partner