Skip to main content

2010 | OriginalPaper | Buchkapitel

25. Optimizing Targeting of Intrusion Detection Systems in Social Networks

verfasst von : Rami Puzis, Meytal Tubi, Yuval Elovici

Erschienen in: Handbook of Social Network Technologies and Applications

Verlag: Springer US

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term “threats”, rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat N. Weaver, V. Paxson, S. Staniford, R. Cunningham, “A taxonomy of computer worms”, In The First ACM Workshop on Rapid Malcode (WORM), 2003. N. Weaver, V. Paxson, S. Staniford, R. Cunningham, “A taxonomy of computer worms”, In The First ACM Workshop on Rapid Malcode (WORM), 2003.
2.
Zurück zum Zitat S. Staniford, V. Paxson, N. Weaver, “How to own the internet in your spare time”, Proceedings of the 11th USENIX security symposium, 2002. S. Staniford, V. Paxson, N. Weaver, “How to own the internet in your spare time”, Proceedings of the 11th USENIX security symposium, 2002.
3.
Zurück zum Zitat J. Balthrop, S. Forrest, M. E. J. Newman, M. M. Williamson, “Technological networks and the spread of computer viruses”, Science 304, 527, 2004.CrossRef J. Balthrop, S. Forrest, M. E. J. Newman, M. M. Williamson, “Technological networks and the spread of computer viruses”, Science 304, 527, 2004.CrossRef
4.
Zurück zum Zitat Symantec Internet Security Threat Report, Jan–June 2004. Symantec Internet Security Threat Report, Jan–June 2004.
5.
Zurück zum Zitat X. Zhang, C. Li, W. Zheng, “Intrusion prevention system design”, Proceedings – The fourth international conference on computer and information technology, 386–390, 2004. X. Zhang, C. Li, W. Zheng, “Intrusion prevention system design”, Proceedings – The fourth international conference on computer and information technology, 386–390, 2004.
6.
Zurück zum Zitat Y. Tang, S. Chen, “Defending against internet worms. A signature based approach”, IEEE INFOCOM, 2005. Y. Tang, S. Chen, “Defending against internet worms. A signature based approach”, IEEE INFOCOM, 2005.
7.
Zurück zum Zitat A. Gupta, R. Sekar, “An approach for detecting self-propagating email using anomaly detection”, In Proceedings of the international symposium on recent advances in intrusion detection, Sep 2003.CrossRef A. Gupta, R. Sekar, “An approach for detecting self-propagating email using anomaly detection”, In Proceedings of the international symposium on recent advances in intrusion detection, Sep 2003.CrossRef
8.
Zurück zum Zitat V. Yegneswaran, P. Barford, S. Jha, “Global intrusion detection in the DOMINO overlay system”, In Proceedings of NDSS, San Diego, CA, 2004. V. Yegneswaran, P. Barford, S. Jha, “Global intrusion detection in the DOMINO overlay system”, In Proceedings of NDSS, San Diego, CA, 2004.
11.
Zurück zum Zitat M. Tubi, R. Puzis, Y. Elovici, “Deployment of DNIDS in social networks”, IEEE ISI, 2007. M. Tubi, R. Puzis, Y. Elovici, “Deployment of DNIDS in social networks”, IEEE ISI, 2007.
12.
Zurück zum Zitat R. Huerta, L. S. Tsimring, “Contact tracing and epidemics control in social networks”, Physical Review E, 66, 056115, 2002.CrossRef R. Huerta, L. S. Tsimring, “Contact tracing and epidemics control in social networks”, Physical Review E, 66, 056115, 2002.CrossRef
14.
Zurück zum Zitat C. C. Zou, D. Towsley, W. Gong, “Email virus propagation modeling and analysis”, Technical Report TR-CSE-03–04, University of Massachussets, Amherst, 2004. C. C. Zou, D. Towsley, W. Gong, “Email virus propagation modeling and analysis”, Technical Report TR-CSE-03–04, University of Massachussets, Amherst, 2004.
15.
Zurück zum Zitat A. L. Barabasi, R. Albert, H. Jeong, “Scale-free characteristics of random networks: the topology of the world-wide web”, Physica A 281, 69–77, 2000.CrossRef A. L. Barabasi, R. Albert, H. Jeong, “Scale-free characteristics of random networks: the topology of the world-wide web”, Physica A 281, 69–77, 2000.CrossRef
17.
18.
Zurück zum Zitat R. Pastor-Satorras, A. Vespignani, “Epidemic spreading in scale-free networks”, Physical Review Letters, 86(14), 3200–3203, 2001.CrossRef R. Pastor-Satorras, A. Vespignani, “Epidemic spreading in scale-free networks”, Physical Review Letters, 86(14), 3200–3203, 2001.CrossRef
19.
Zurück zum Zitat D. H. Zanette, M. Kuperman, “Effects of immunization in small-world epidemics”. Physica A, 309, 445–452, 2002.CrossRefMATH D. H. Zanette, M. Kuperman, “Effects of immunization in small-world epidemics”. Physica A, 309, 445–452, 2002.CrossRefMATH
20.
Zurück zum Zitat R. Pastor-Satorras, A. Vespignani, “Immunization of complex networks”, Physical Review E, 65, 036104, 2002.CrossRef R. Pastor-Satorras, A. Vespignani, “Immunization of complex networks”, Physical Review E, 65, 036104, 2002.CrossRef
21.
Zurück zum Zitat J. R. Tyler, D. M. Wilkinson, B. A. Huberman, “Email as spectroscopy: automated discovery of community structure within organizations. Communities and technologies”, M. Huysman, E. Wenger, V. Wulf (Eds), pp. 81–95, 2003. J. R. Tyler, D. M. Wilkinson, B. A. Huberman, “Email as spectroscopy: automated discovery of community structure within organizations. Communities and technologies”, M. Huysman, E. Wenger, V. Wulf (Eds), pp. 81–95, 2003.
22.
Zurück zum Zitat J. Scott, “Social network analysis: a handbook”, Sage Publications, London, 2000. J. Scott, “Social network analysis: a handbook”, Sage Publications, London, 2000.
23.
Zurück zum Zitat S. P. Borgatti, M. G. Everett, “A graph-theoretic perspective on centrality”, Social Networks, 28(4), 466–484, 2006.CrossRef S. P. Borgatti, M. G. Everett, “A graph-theoretic perspective on centrality”, Social Networks, 28(4), 466–484, 2006.CrossRef
24.
Zurück zum Zitat L. C. Freeman, “Centrality in social networks conceptual clarification”, Social Networks, 1, 215–239, 1979.CrossRef L. C. Freeman, “Centrality in social networks conceptual clarification”, Social Networks, 1, 215–239, 1979.CrossRef
25.
Zurück zum Zitat M. G. Everett, S. P. Borgatti, “The centrality of groups and classes”, Mathematical Sociology, 23(3), 181–201, 1999.CrossRefMATH M. G. Everett, S. P. Borgatti, “The centrality of groups and classes”, Mathematical Sociology, 23(3), 181–201, 1999.CrossRefMATH
26.
Zurück zum Zitat K. Park, “Scalable protection against ddos and worm attacks. DARPA ATO FTN project AFRL contract F30602–01–2–0530”, Purdue University, West LaFayette, 2004. K. Park, “Scalable protection against ddos and worm attacks. DARPA ATO FTN project AFRL contract F30602–01–2–0530”, Purdue University, West LaFayette, 2004.
27.
Zurück zum Zitat S.P. Borgatti, “Centrality and AIDS”, Connections, 18(1), 112–114, 1995. S.P. Borgatti, “Centrality and AIDS”, Connections, 18(1), 112–114, 1995.
28.
Zurück zum Zitat F. Harary, R. Z. Norman, D. Cartwright, “Structural models. An introduction to the theory of directed graphs”, John Wiley and Sons, New York, 1965. F. Harary, R. Z. Norman, D. Cartwright, “Structural models. An introduction to the theory of directed graphs”, John Wiley and Sons, New York, 1965.
29.
Zurück zum Zitat L.C. Freeman, “A set of measuring centrality based on betweenness”, Sociometry 40, 35–41, 1977.CrossRef L.C. Freeman, “A set of measuring centrality based on betweenness”, Sociometry 40, 35–41, 1977.CrossRef
30.
Zurück zum Zitat M. E. J. Newman, “Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality”, Physical Review E, 64, 016132, 2001.CrossRef M. E. J. Newman, “Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality”, Physical Review E, 64, 016132, 2001.CrossRef
31.
Zurück zum Zitat U. Brandes, “A faster algorithm for betweenness centrality”, Journal of Mathematical Sociology, 25(2), 163–177, 2001.CrossRefMATH U. Brandes, “A faster algorithm for betweenness centrality”, Journal of Mathematical Sociology, 25(2), 163–177, 2001.CrossRefMATH
32.
Zurück zum Zitat R. Puzis, Y. Elovici, S. Dolev. “Fast algorithm for successive computation of group betweenness centrality”, Physical Review E, 76(5), 056709, 2007.MathSciNetCrossRef R. Puzis, Y. Elovici, S. Dolev. “Fast algorithm for successive computation of group betweenness centrality”, Physical Review E, 76(5), 056709, 2007.MathSciNetCrossRef
34.
Zurück zum Zitat R. G. Downey, M. R. Fellows, “Parametrized computational feasibility”, Feasible Mathematics, 2, 219–244, 1995.CrossRefMATH R. G. Downey, M. R. Fellows, “Parametrized computational feasibility”, Feasible Mathematics, 2, 219–244, 1995.CrossRefMATH
35.
Zurück zum Zitat R. Puzis, M. D. Klippel, Y. Elovici, S. Dolev, “Optimization of NIDS placement for protection of intercommunicating critical infrastructures”, Springer LNCS, EuroISI, 2008.CrossRef R. Puzis, M. D. Klippel, Y. Elovici, S. Dolev, “Optimization of NIDS placement for protection of intercommunicating critical infrastructures”, Springer LNCS, EuroISI, 2008.CrossRef
Metadaten
Titel
Optimizing Targeting of Intrusion Detection Systems in Social Networks
verfasst von
Rami Puzis
Meytal Tubi
Yuval Elovici
Copyright-Jahr
2010
Verlag
Springer US
DOI
https://doi.org/10.1007/978-1-4419-7142-5_25

Premium Partner