Skip to main content

Preventing and Detecting Infiltration on Online Social Networks

  • Conference paper
  • First Online:
Computational Social Networks (CSoNet 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9197))

Included in the following conference series:

Abstract

Nowadays, together with the development of internet, online social networks provide lots of benefits for human. People use social networks for different purposes, such as: communicating, information sharing, relations creating or for business purposes, and etc. However, accompanying with benefits of social networks, users also must face the security and privacy risks. These issues have recently paid much attention to. One of these issues is the user can penetrate and steal personal information. The assailants can penetrate through agreeing their friend requests. When confirming this friend request, the user unintentionally discloses personal information. Especially, if the user stolen information is an important person of a specific organization, losses are extremely considerable. Promoted by this phenomenon, in this paper, we propose a new solution to prevent and discover any penetration for a specific user in an organization. First of all, we propose a new model which is called as safety community model in order to protect everybody in the organization. We build a target function orienting to the safety for everybody in the organization. After that, we have designed an effective algorithm to discover the penetration of unsafe factors for specific users in the organization. Tests in social networks are actually implemented, and the result shows that our model can prevent the penetration of outside objects.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. O’Cass, A., Fenech, T.: Webretailing adoption: exploring the nature of internet users Webretailing behaviour. Journal of Retailing and Consumer Services 10, 81–94 (2003)

    Google Scholar 

  2. social media and internet statistics. http://thesocialskinny.com/216-social-media-and-internet-statistics-september-2012

  3. new social media stats for 2012. http://thesocialskinny.com/99-new-social-media-stats-for-2012/

  4. Elyashar, A., Fire, M., Kagan, D., Elovici, Y.: Homing Socialbots: Intrusion on a specific organizations employee using Socialbots. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (2013)

    Google Scholar 

  5. Elyashar, A., Fire, M., Kagan, D., Elovici, Y.: Organizational intrusion: organization mining using socialbots. In: ASE International Conference On Cyber Security, Washington D.C., USA (2012)

    Google Scholar 

  6. Boshmaf, Y., Muslukhov, I., Beznosov, K., Ripeanu, M.: Design and Analysis of a Social Botnet, July 9 (2012)

    Google Scholar 

  7. Fire, M., Puzis, R., Elovici, Y.: Organization Mining Using Online Social Networks. ACM Transactions on Embedded Computing Systems 9(4), Article 39 (2012)

    Google Scholar 

  8. Fire, M., Tenenboim, L., Lesser, O., Puzis, R., Rokach, L., Elovici, Y.: Link prediction in social networks using computationally efficient topological features. In: SocialCom/PASSAT, pp. 73–80. IEEE (2011)

    Google Scholar 

  9. Fortunato, S.: Community detection in graphs. Physics Reports 486(3–5), 75–174 (2010)

    Google Scholar 

  10. Fortunato, S., Castellano, C.: Community structure in graphs. eprint arXiv 0712.2716 (2007)

    Google Scholar 

  11. Leskovec, J., Huttenlocher, D., Kleinberg, J.: Predicting positive and negative links in online social networks. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 641–650. ACM, New York (2010)

    Google Scholar 

  12. Viswanath, B., Mislove, A., Cha, M., Gummadi, K.P.: On the evolution of user interaction in facebook. In: 2nd ACM SIGCOMM Workshop on Social Networks (2009)

    Google Scholar 

  13. Leskovec, J., Lang, K., Dasgupta, A., Mahoney, M.: Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters. Internet Mathematics 6(1), 29–123 (2009)

    Google Scholar 

  14. Richardson, M., Agrawal, R., Domingos, P.: Trust Management for the Semantic Web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 351–368. Springer, Heidelberg (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Canh V. Pham .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Pham, C.V., Hoang, H.X., Vu, M.M. (2015). Preventing and Detecting Infiltration on Online Social Networks. In: Thai, M., Nguyen, N., Shen, H. (eds) Computational Social Networks. CSoNet 2015. Lecture Notes in Computer Science(), vol 9197. Springer, Cham. https://doi.org/10.1007/978-3-319-21786-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21786-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21785-7

  • Online ISBN: 978-3-319-21786-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics