Abstract
Nowadays, together with the development of internet, online social networks provide lots of benefits for human. People use social networks for different purposes, such as: communicating, information sharing, relations creating or for business purposes, and etc. However, accompanying with benefits of social networks, users also must face the security and privacy risks. These issues have recently paid much attention to. One of these issues is the user can penetrate and steal personal information. The assailants can penetrate through agreeing their friend requests. When confirming this friend request, the user unintentionally discloses personal information. Especially, if the user stolen information is an important person of a specific organization, losses are extremely considerable. Promoted by this phenomenon, in this paper, we propose a new solution to prevent and discover any penetration for a specific user in an organization. First of all, we propose a new model which is called as safety community model in order to protect everybody in the organization. We build a target function orienting to the safety for everybody in the organization. After that, we have designed an effective algorithm to discover the penetration of unsafe factors for specific users in the organization. Tests in social networks are actually implemented, and the result shows that our model can prevent the penetration of outside objects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
O’Cass, A., Fenech, T.: Webretailing adoption: exploring the nature of internet users Webretailing behaviour. Journal of Retailing and Consumer Services 10, 81–94 (2003)
social media and internet statistics. http://thesocialskinny.com/216-social-media-and-internet-statistics-september-2012
new social media stats for 2012. http://thesocialskinny.com/99-new-social-media-stats-for-2012/
Elyashar, A., Fire, M., Kagan, D., Elovici, Y.: Homing Socialbots: Intrusion on a specific organizations employee using Socialbots. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (2013)
Elyashar, A., Fire, M., Kagan, D., Elovici, Y.: Organizational intrusion: organization mining using socialbots. In: ASE International Conference On Cyber Security, Washington D.C., USA (2012)
Boshmaf, Y., Muslukhov, I., Beznosov, K., Ripeanu, M.: Design and Analysis of a Social Botnet, July 9 (2012)
Fire, M., Puzis, R., Elovici, Y.: Organization Mining Using Online Social Networks. ACM Transactions on Embedded Computing Systems 9(4), Article 39 (2012)
Fire, M., Tenenboim, L., Lesser, O., Puzis, R., Rokach, L., Elovici, Y.: Link prediction in social networks using computationally efficient topological features. In: SocialCom/PASSAT, pp. 73–80. IEEE (2011)
Fortunato, S.: Community detection in graphs. Physics Reports 486(3–5), 75–174 (2010)
Fortunato, S., Castellano, C.: Community structure in graphs. eprint arXiv 0712.2716 (2007)
Leskovec, J., Huttenlocher, D., Kleinberg, J.: Predicting positive and negative links in online social networks. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 641–650. ACM, New York (2010)
Viswanath, B., Mislove, A., Cha, M., Gummadi, K.P.: On the evolution of user interaction in facebook. In: 2nd ACM SIGCOMM Workshop on Social Networks (2009)
Leskovec, J., Lang, K., Dasgupta, A., Mahoney, M.: Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters. Internet Mathematics 6(1), 29–123 (2009)
Richardson, M., Agrawal, R., Domingos, P.: Trust Management for the Semantic Web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 351–368. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Pham, C.V., Hoang, H.X., Vu, M.M. (2015). Preventing and Detecting Infiltration on Online Social Networks. In: Thai, M., Nguyen, N., Shen, H. (eds) Computational Social Networks. CSoNet 2015. Lecture Notes in Computer Science(), vol 9197. Springer, Cham. https://doi.org/10.1007/978-3-319-21786-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-21786-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21785-7
Online ISBN: 978-3-319-21786-4
eBook Packages: Computer ScienceComputer Science (R0)