Skip to main content

2019 | OriginalPaper | Buchkapitel

4. Restrain Malicious Attack Propagation

verfasst von : Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou

Erschienen in: Malicious Attack Propagation and Source Identification

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Restraining the propagation of malicious attacks in complex networks has long been an important but difficult problem to be addressed. In this chapter, we particularly use rumor propagation as an example to analyze the methods of restraining malicious attack propagation. There are mainly two types of methods: (1) blocking rumors at the most influential users or community bridges, and (2) spreading truths to clarify the rumors. We first compare all the measures of locating influential users. The results suggest that the degree and betweenness measures outperform all the others in real-world networks. Secondly, we analyze the method of the truth clarification method, and find that this method has a long-term performance while the degree measure performs well only in the early stage. Thirdly, in order to leverage these two methods, we further explore the strategy of different methods working together and their equivalence. Given a fixed budget in the real world, our analysis provides a potential solution to find out a better strategy by integrating both kinds of methods together.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
5.
Zurück zum Zitat R. Albert and A.-L. Barabási. Statistical mechanics of complex networks. Reviews of modern physics, 74(1):47, 2002.MathSciNetCrossRef R. Albert and A.-L. Barabási. Statistical mechanics of complex networks. Reviews of modern physics, 74(1):47, 2002.MathSciNetCrossRef
9.
Zurück zum Zitat C. Anagnostopoulos, S. Hadjiefthymiades, and E. Zervas. Information dissemination between mobile nodes for collaborative context awareness. Mobile Computing, IEEE Transactions on, 10(12):1710–1725, 2011.CrossRef C. Anagnostopoulos, S. Hadjiefthymiades, and E. Zervas. Information dissemination between mobile nodes for collaborative context awareness. Mobile Computing, IEEE Transactions on, 10(12):1710–1725, 2011.CrossRef
25.
Zurück zum Zitat C. Budak, D. Agrawal, and A. El Abbadi. Limiting the spread of misinformation in social networks. In Proceedings of the 20th international conference on World wide web, WWW ’11, pages 665–674. ACM, 2011. C. Budak, D. Agrawal, and A. El Abbadi. Limiting the spread of misinformation in social networks. In Proceedings of the 20th international conference on World wide web, WWW ’11, pages 665–674. ACM, 2011.
26.
Zurück zum Zitat S. Carmi, S. Havlin, S. Kirkpatrick, Y. Shavitt, and E. Shir. From the cover: A model of internet topology using k-shell decomposition. PNAS, Proceedings of the National Academy of Sciences, 104(27):11150–11154, 2007.CrossRef S. Carmi, S. Havlin, S. Kirkpatrick, Y. Shavitt, and E. Shir. From the cover: A model of internet topology using k-shell decomposition. PNAS, Proceedings of the National Academy of Sciences, 104(27):11150–11154, 2007.CrossRef
28.
Zurück zum Zitat CFinder. Clusters and communities, 2013. CFinder. Clusters and communities, 2013.
29.
Zurück zum Zitat D. Chakrabarti, J. Leskovec, C. Faloutsos, S. Madden, C. Guestrin, and M. Faloutsos. Information survival threshold in sensor and p2p networks. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pages 1316–1324, 2007. D. Chakrabarti, J. Leskovec, C. Faloutsos, S. Madden, C. Guestrin, and M. Faloutsos. Information survival threshold in sensor and p2p networks. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pages 1316–1324, 2007.
31.
Zurück zum Zitat Y. Chen, G. Paul, S. Havlin, F. Liljeros, and H. E. Stanley. Finding a better immunization strategy. Phys. Rev. Lett., 101:058701, Jul 2008. Y. Chen, G. Paul, S. Havlin, F. Liljeros, and H. E. Stanley. Finding a better immunization strategy. Phys. Rev. Lett., 101:058701, Jul 2008.
33.
Zurück zum Zitat A. Clauset, M. E. J. Newman, and C. Moore. Finding community structure in very large networks. Phys. Rev. E, 70:066111, Dec 2004. A. Clauset, M. E. J. Newman, and C. Moore. Finding community structure in very large networks. Phys. Rev. E, 70:066111, Dec 2004.
34.
Zurück zum Zitat C. H. Comin and L. da Fontoura Costa. Identifying the starting point of a spreading process in complex networks. Phys. Rev. E, 84:056105, Nov 2011. C. H. Comin and L. da Fontoura Costa. Identifying the starting point of a spreading process in complex networks. Phys. Rev. E, 84:056105, Nov 2011.
41.
Zurück zum Zitat Z. Dezső and A.-L. Barabási. Halting viruses in scale-free networks. Phys. Rev. E, 65:055103, May 2002. Z. Dezső and A.-L. Barabási. Halting viruses in scale-free networks. Phys. Rev. E, 65:055103, May 2002.
49.
Zurück zum Zitat H. Ebel, L.-I. Mielsch, and S. Bornholdt. Scale-free topology of e-mail networks. Phys. Rev. E, 66:035103, Sep 2002. H. Ebel, L.-I. Mielsch, and S. Bornholdt. Scale-free topology of e-mail networks. Phys. Rev. E, 66:035103, Sep 2002.
56.
Zurück zum Zitat M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. In Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, SIGCOMM ’99, pages 251–262. ACM, 1999. M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. In Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, SIGCOMM ’99, pages 251–262. ACM, 1999.
67.
Zurück zum Zitat L. C. Freeman, S. P. Borgatti, and D. R. White. Centrality in valued graphs: a measure of betweenness based on network flow. Social Networks, 13:141–154, 1991.MathSciNetCrossRef L. C. Freeman, S. P. Borgatti, and D. R. White. Centrality in valued graphs: a measure of betweenness based on network flow. Social Networks, 13:141–154, 1991.MathSciNetCrossRef
69.
Zurück zum Zitat C. Gao and J. Liu. Modeling and restraining mobile virus propagation. Mobile Computing, IEEE Transactions on, 12(3):529–541, 2013.CrossRef C. Gao and J. Liu. Modeling and restraining mobile virus propagation. Mobile Computing, IEEE Transactions on, 12(3):529–541, 2013.CrossRef
70.
Zurück zum Zitat C. Gao, J. Liu, and N. Zhong. Network immunization and virus propagation in email networks: experimental evaluation and analysis. Knowledge and Information Systems, 27:253–279, 2011.CrossRef C. Gao, J. Liu, and N. Zhong. Network immunization and virus propagation in email networks: experimental evaluation and analysis. Knowledge and Information Systems, 27:253–279, 2011.CrossRef
71.
Zurück zum Zitat C. Gao, J. Liu, and N. Zhong. Network immunization with distributed autonomy-oriented entities. Parallel and Distributed Systems, IEEE Transactions on, 22(7):1222–1229, 2011.CrossRef C. Gao, J. Liu, and N. Zhong. Network immunization with distributed autonomy-oriented entities. Parallel and Distributed Systems, IEEE Transactions on, 22(7):1222–1229, 2011.CrossRef
74.
Zurück zum Zitat N. Z. Gong, A. Talwalkar, L. Mackey, L. Huang, E. C. R. Shin, E. Stefanov, E. Shi, and D. Song. Joint link prediction and attribute inference using a social-attribute network. ACM Transactions on Intelligent Systems and Technology (ACM TIST), 2013. Accepted. N. Z. Gong, A. Talwalkar, L. Mackey, L. Huang, E. C. R. Shin, E. Stefanov, E. Shi, and D. Song. Joint link prediction and attribute inference using a social-attribute network. ACM Transactions on Intelligent Systems and Technology (ACM TIST), 2013. Accepted.
80.
Zurück zum Zitat P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han. Attack vulnerability of complex networks. Phys. Rev. E, 65:056109, May 2002. P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han. Attack vulnerability of complex networks. Phys. Rev. E, 65:056109, May 2002.
83.
Zurück zum Zitat H. Jeong, S. P. Mason, A.-L. Barabási, and Z. N. Oltvai. Lethality and centrality in protein networks. Nature, 411(6833):41–42, 2001.CrossRef H. Jeong, S. P. Mason, A.-L. Barabási, and Z. N. Oltvai. Lethality and centrality in protein networks. Nature, 411(6833):41–42, 2001.CrossRef
96.
Zurück zum Zitat M. Kitsak, L. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. Stanley, and H. Makse. Identification of influential spreaders in complex networks. Nature Physics, 6(11):888–893, Aug 2010.CrossRef M. Kitsak, L. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. Stanley, and H. Makse. Identification of influential spreaders in complex networks. Nature Physics, 6(11):888–893, Aug 2010.CrossRef
102.
Zurück zum Zitat H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In WWW ’10: Proceedings of the 19th international conference on World wide web, pages 591–600. ACM, 2010. H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In WWW ’10: Proceedings of the 19th international conference on World wide web, pages 591–600. ACM, 2010.
106.
Zurück zum Zitat F. Li, Y. Yang, and J. Wu. Cpmc: An efficient proximity malware coping scheme in smartphone-based mobile networks. In INFOCOM, 2010 Proceedings IEEE, pages 1–9, 2010. F. Li, Y. Yang, and J. Wu. Cpmc: An efficient proximity malware coping scheme in smartphone-based mobile networks. In INFOCOM, 2010 Proceedings IEEE, pages 1–9, 2010.
107.
Zurück zum Zitat Y. Li, W. Chen, Y. Wang, and Z.-L. Zhang. Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In Proceedings of the sixth ACM international conference on Web search and data mining, WSDM ’13, pages 657–666. ACM, 2013. Y. Li, W. Chen, Y. Wang, and Z.-L. Zhang. Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In Proceedings of the sixth ACM international conference on Web search and data mining, WSDM ’13, pages 657–666. ACM, 2013.
109.
Zurück zum Zitat Y. Li, B. Zhao, and J.-S. Lui. On modeling product advertisement in large-scale online social networks. Networking, IEEE/ACM Transactions on, 20(5):1412–1425, 2012.CrossRef Y. Li, B. Zhao, and J.-S. Lui. On modeling product advertisement in large-scale online social networks. Networking, IEEE/ACM Transactions on, 20(5):1412–1425, 2012.CrossRef
110.
Zurück zum Zitat Y. Y. Liu, J. J. Slotine, and A. laszlo Barabasi. Controllability of complex networks. Nature, 473:167–173, 2011.CrossRef Y. Y. Liu, J. J. Slotine, and A. laszlo Barabasi. Controllability of complex networks. Nature, 473:167–173, 2011.CrossRef
120.
Zurück zum Zitat H. E. Marano. Our brain’s negative bias. Technical report, Psychology Today, June 20, 2003. H. E. Marano. Our brain’s negative bias. Technical report, Psychology Today, June 20, 2003.
122.
Zurück zum Zitat R. M. May and A. L. Lloyd. Infection dynamics on scale-free networks. Phys. Rev. E, 64:066112, Nov 2001. R. M. May and A. L. Lloyd. Infection dynamics on scale-free networks. Phys. Rev. E, 64:066112, Nov 2001.
129.
Zurück zum Zitat T. Nepusz and T. Vicsek. Controlling edge dynamics in complex networks. Nature, 8:568–573, 2012. T. Nepusz and T. Vicsek. Controlling edge dynamics in complex networks. Nature, 8:568–573, 2012.
130.
Zurück zum Zitat NetMiner4. Premier software for network analysis, 2013. NetMiner4. Premier software for network analysis, 2013.
132.
Zurück zum Zitat M. E. Newman. A measure of betweenness centrality based on random walks. Social networks, 27(1):39–54, 2005.CrossRef M. E. Newman. A measure of betweenness centrality based on random walks. Social networks, 27(1):39–54, 2005.CrossRef
136.
Zurück zum Zitat M. E. J. Newman. Networks: An Introduction, chapter 17 Epidemics on networks, pages 700–750. Oxford University Press, 2010. M. E. J. Newman. Networks: An Introduction, chapter 17 Epidemics on networks, pages 700–750. Oxford University Press, 2010.
137.
Zurück zum Zitat M. E. J. Newman and M. Girvan. Finding and evaluating community structure in networks. Phys. Rev. E, 69:026113, Feb 2004. M. E. J. Newman and M. Girvan. Finding and evaluating community structure in networks. Phys. Rev. E, 69:026113, Feb 2004.
138.
Zurück zum Zitat N. P. Nguyen, T. N. Dinh, S. Tokala, and M. T. Thai. Overlapping communities in dynamic networks: their detection and mobile applications. In Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom ’11, pages 85–96. ACM, 2011. N. P. Nguyen, T. N. Dinh, S. Tokala, and M. T. Thai. Overlapping communities in dynamic networks: their detection and mobile applications. In Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom ’11, pages 85–96. ACM, 2011.
139.
Zurück zum Zitat G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435(7043):814–818, 2005.CrossRef G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435(7043):814–818, 2005.CrossRef
140.
Zurück zum Zitat G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435:814–818, 2005.CrossRef G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435:814–818, 2005.CrossRef
143.
Zurück zum Zitat F. Peter. ‘bogus’ ap tweet about explosion at the white house wipes billions off us markets, April 23 2013. Washington. F. Peter. ‘bogus’ ap tweet about explosion at the white house wipes billions off us markets, April 23 2013. Washington.
147.
Zurück zum Zitat B. A. Prakash, J. Vreeken, and C. Faloutsos. Spotting culprits in epidemics: How many and which ones? In Proceedings of the 2012 IEEE 12th International Conference on Data Mining, ICDM ’12, pages 11–20, Washington, DC, USA, 2012. IEEE Computer Society. B. A. Prakash, J. Vreeken, and C. Faloutsos. Spotting culprits in epidemics: How many and which ones? In Proceedings of the 2012 IEEE 12th International Conference on Data Mining, ICDM ’12, pages 11–20, Washington, DC, USA, 2012. IEEE Computer Society.
159.
Zurück zum Zitat M. A. Serrano and M. Boguñá. Clustering in complex networks. ii. percolation properties. Phys. Rev. E, 74:056115, Nov 2006. M. A. Serrano and M. Boguñá. Clustering in complex networks. ii. percolation properties. Phys. Rev. E, 74:056115, Nov 2006.
165.
Zurück zum Zitat S. Shirazipourazad, B. Bogard, H. Vachhani, A. Sen, and P. Horn. Influence propagation in adversarial setting: how to defeat competition with least amount of investment. In Proceedings of the 21st ACM international conference on Information and knowledge management, CIKM ’12, pages 585–594. ACM, 2012. S. Shirazipourazad, B. Bogard, H. Vachhani, A. Sen, and P. Horn. Influence propagation in adversarial setting: how to defeat competition with least amount of investment. In Proceedings of the 21st ACM international conference on Information and knowledge management, CIKM ’12, pages 585–594. ACM, 2012.
171.
Zurück zum Zitat B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on Online social networks, WOSN ’09, pages 37–42, 2009. B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on Online social networks, WOSN ’09, pages 37–42, 2009.
173.
Zurück zum Zitat M. Vojnovic, V. Gupta, T. Karagiannis, and C. Gkantsidis. Sampling strategies for epidemic-style information dissemination. Networking, IEEE/ACM Transactions on, 18(4):1013–1025, 2010.CrossRef M. Vojnovic, V. Gupta, T. Karagiannis, and C. Gkantsidis. Sampling strategies for epidemic-style information dissemination. Networking, IEEE/ACM Transactions on, 18(4):1013–1025, 2010.CrossRef
174.
Zurück zum Zitat K. Wakita and T. Tsurumi. Finding community structure in mega-scale social networks: [extended abstract]. In Proceedings of the 16th international conference on World Wide Web, WWW ’07, pages 1275–1276, 2007. K. Wakita and T. Tsurumi. Finding community structure in mega-scale social networks: [extended abstract]. In Proceedings of the 16th international conference on World Wide Web, WWW ’07, pages 1275–1276, 2007.
184.
Zurück zum Zitat S. Wen, J. Jiang, Y. Xiang, S. Yu, W. Zhou, and W. Jia. To shut them up or to clarify: restraining the spread of rumors in online social networks. Parallel and Distributed Systems, IEEE Transactions on, 25(12):3306–3316, 2014.CrossRef S. Wen, J. Jiang, Y. Xiang, S. Yu, W. Zhou, and W. Jia. To shut them up or to clarify: restraining the spread of rumors in online social networks. Parallel and Distributed Systems, IEEE Transactions on, 25(12):3306–3316, 2014.CrossRef
185.
Zurück zum Zitat S. Wen, W. Zhou, Y. Wang, W. Zhou, and Y. Xiang. Locating defense positions for thwarting the propagation of topological worms. Communications Letters, IEEE, 16(4):560–563, 2012.CrossRef S. Wen, W. Zhou, Y. Wang, W. Zhou, and Y. Xiang. Locating defense positions for thwarting the propagation of topological worms. Communications Letters, IEEE, 16(4):560–563, 2012.CrossRef
186.
Zurück zum Zitat S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, and W. Jia. Modeling propagation dynamics of social network worms. Parallel and Distributed Systems, IEEE Transactions on, 24(8):1633–1643, 2013.CrossRef S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, and W. Jia. Modeling propagation dynamics of social network worms. Parallel and Distributed Systems, IEEE Transactions on, 24(8):1633–1643, 2013.CrossRef
190.
Zurück zum Zitat Y. Xiang, X. Fan, and W. T. Zhu. Propagation of active worms: a survey. International journal of computer systems science & engineering, 24(3):157–172, 2009. Y. Xiang, X. Fan, and W. T. Zhu. Propagation of active worms: a survey. International journal of computer systems science & engineering, 24(3):157–172, 2009.
192.
Zurück zum Zitat G. Yan, G. Chen, S. Eidenbenz, and N. Li. Malware propagation in online social networks: nature, dynamics, and defense implications. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS’11, pages 196–206, 2011. G. Yan, G. Chen, S. Eidenbenz, and N. Li. Malware propagation in online social networks: nature, dynamics, and defense implications. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS’11, pages 196–206, 2011.
193.
Zurück zum Zitat G. Yan and S. Eidenbenz. Modeling propagation dynamics of bluetooth worms (extended version). Mobile Computing, IEEE Transactions on, 8(3):353–368, 2009.CrossRef G. Yan and S. Eidenbenz. Modeling propagation dynamics of bluetooth worms (extended version). Mobile Computing, IEEE Transactions on, 8(3):353–368, 2009.CrossRef
195.
Zurück zum Zitat K. Yang, A. H. Shekhar, D. Oliver, and S. Shekhar. Capacity-constrained network-voronoi diagram: a summary of results. In International Symposium on Spatial and Temporal Databases, pages 56–73. Springer, 2013. K. Yang, A. H. Shekhar, D. Oliver, and S. Shekhar. Capacity-constrained network-voronoi diagram: a summary of results. In International Symposium on Spatial and Temporal Databases, pages 56–73. Springer, 2013.
206.
Zurück zum Zitat C. C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pages 138–147, 2002. C. C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pages 138–147, 2002.
207.
Zurück zum Zitat C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on dependable and secure computing, 4(2):105–118, 2007.CrossRef C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on dependable and secure computing, 4(2):105–118, 2007.CrossRef
Metadaten
Titel
Restrain Malicious Attack Propagation
verfasst von
Jiaojiao Jiang
Sheng Wen
Shui Yu
Bo Liu
Yang Xiang
Wanlei Zhou
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-02179-5_4