Skip to main content
Top

2019 | OriginalPaper | Chapter

Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper)

Authors : Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng

Published in: Collaborative Computing: Networking, Applications and Worksharing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cyberspace attack is a persistent problem since the existing of internet. Among many attack defense measures, collecting information about the network attacker and his organization is a promising means to keep the cyberspace security. The exposing of attackers halts their further operation. To profile them, we combine these retrieved attack related information pieces to form a trace network. In this attributional trace network, distinguishing the importance of different trace information pieces will help in mining more unknown information pieces about the organizational community we care about. In this paper, we propose to adopt relevant circle to locate these more important vertices in the trace network. The algorithm first uses Depth-first search to traverse all vertices in the trace network. Then it discovers and refines relevant circles derived from this network tree, the rank score is calculated based on these relevant circles. Finally, we use the classical 911 covert network dataset to validate our approach.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Butt, W.H., Akram, M.U., Khan, S.A., Javed, M.Y.: Covert network analysis for key player detection and event prediction using a hybrid classifier. Sci. World J. 2014, 13 (2014). 615431CrossRef Butt, W.H., Akram, M.U., Khan, S.A., Javed, M.Y.: Covert network analysis for key player detection and event prediction using a hybrid classifier. Sci. World J. 2014, 13 (2014). 615431CrossRef
2.
go back to reference Chitrapura, K.P., Kashyap, S.R.: Node ranking in labeled directed graphs. In: Thirteenth ACM International Conference on Information and Knowledge Management, pp. 597–606 (2004) Chitrapura, K.P., Kashyap, S.R.: Node ranking in labeled directed graphs. In: Thirteenth ACM International Conference on Information and Knowledge Management, pp. 597–606 (2004)
3.
go back to reference Dasgupta, S., Prakash, C.: Intelligent detection of influential nodes in networks. In: International Conference on Electrical, Electronics, and Optimization Techniques (2016) Dasgupta, S., Prakash, C.: Intelligent detection of influential nodes in networks. In: International Conference on Electrical, Electronics, and Optimization Techniques (2016)
4.
go back to reference Farley, J.D.: Breaking Al Qaeda cells: a mathematical analysis of counterterrorism operations (a guide for risk assessment and decision making). Stud. Conflict Terrorism 26(6), 399–411 (2003)CrossRef Farley, J.D.: Breaking Al Qaeda cells: a mathematical analysis of counterterrorism operations (a guide for risk assessment and decision making). Stud. Conflict Terrorism 26(6), 399–411 (2003)CrossRef
5.
go back to reference Ferrara, E., Meo, P.D., Catanese, S., Fiumara, G.: Detecting criminal organizations in mobile phone networks. Expert Syst. Appl. 41(13), 5733–5750 (2014)CrossRef Ferrara, E., Meo, P.D., Catanese, S., Fiumara, G.: Detecting criminal organizations in mobile phone networks. Expert Syst. Appl. 41(13), 5733–5750 (2014)CrossRef
6.
go back to reference Halappanavar, M., Sathanur, A.V., Nandi, A.K.: Accelerating the mining of influential nodes in complex networks through community detection, pp. 64–71 (2016) Halappanavar, M., Sathanur, A.V., Nandi, A.K.: Accelerating the mining of influential nodes in complex networks through community detection, pp. 64–71 (2016)
7.
go back to reference Krebs, V.E.: Mapping networks of terrorist cells, pp. 43–52 (2002) Krebs, V.E.: Mapping networks of terrorist cells, pp. 43–52 (2002)
9.
go back to reference Memon, B.R.: Identifying important nodes in weighted covert networks using generalized centrality measures. In: Intelligence and Security Informatics Conference, pp. 131–140 (2012) Memon, B.R.: Identifying important nodes in weighted covert networks using generalized centrality measures. In: Intelligence and Security Informatics Conference, pp. 131–140 (2012)
10.
go back to reference Sheikhahmadi, A., Nematbakhsh, M.A., Shokrollahi, A.: Improving detection of influential nodes in complex networks. Physica A Stat. Mech. Appl. 436, 833–845 (2015)CrossRef Sheikhahmadi, A., Nematbakhsh, M.A., Shokrollahi, A.: Improving detection of influential nodes in complex networks. Physica A Stat. Mech. Appl. 436, 833–845 (2015)CrossRef
11.
go back to reference Singer, P.W.: Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press, Oxford (2014) Singer, P.W.: Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press, Oxford (2014)
12.
go back to reference Taha, K., Yoo, P.D.: SIIMCO: a forensic investigation tool for identifying the influential members of a criminal organization. IEEE Trans. Inf. Forensics Secur. 11(4), 811–822 (2016) Taha, K., Yoo, P.D.: SIIMCO: a forensic investigation tool for identifying the influential members of a criminal organization. IEEE Trans. Inf. Forensics Secur. 11(4), 811–822 (2016)
13.
go back to reference Taha, K., Yoo, P.D.: Using the spanning tree of a criminal network for identifying its leaders. IEEE Trans. Inf. Forensics Secur. PP(99), 1 (2017) Taha, K., Yoo, P.D.: Using the spanning tree of a criminal network for identifying its leaders. IEEE Trans. Inf. Forensics Secur. PP(99), 1 (2017)
14.
go back to reference Wiil, U.K., Gniadek, J., Memon, N.: Measuring link importance in terrorist networks. In: International Conference on Advances in Social Networks Analysis and Mining, pp. 225–232 (2010) Wiil, U.K., Gniadek, J., Memon, N.: Measuring link importance in terrorist networks. In: International Conference on Advances in Social Networks Analysis and Mining, pp. 225–232 (2010)
16.
go back to reference Xu, J.J., Chen, H.: Crimenet explorer: a framework for criminal network knowledge discovery. ACM Trans. Inf. Syst. 23(2), 201–226 (2005)MathSciNetCrossRef Xu, J.J., Chen, H.: Crimenet explorer: a framework for criminal network knowledge discovery. ACM Trans. Inf. Syst. 23(2), 201–226 (2005)MathSciNetCrossRef
Metadata
Title
Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper)
Authors
Jian Xu
Xiaochun Yun
Yongzheng Zhang
Zhenyu Cheng
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-12981-1_16