DocumentCode
568459
Title
Effects of Social Characters in Viral Propagation Seeding Strategies in Online Social Networks
Author
Bonti, Alessio ; Li, Ming ; Gao, Longxiang ; Shi, Wen
Author_Institution
Sch. of Inf. Technol., Deakin Univ., Melbourne, VIC, Australia
fYear
2012
fDate
25-27 June 2012
Firstpage
632
Lastpage
639
Abstract
Online social networks have not only become a point of aggregation and exchange of information, they have so radically rooted into our everyday behaviors that they have become the target of important network attacks. We have seen an increasing trend in Sybil based activity, such as in personification, fake profiling and attempts to maliciously subvert the community stability in order to illegally create benefits for some individuals, such as online voting, and also from more classic informatics assaults using specifically mutated worms. Not only these attacks, in the latest months, we have seen an increase in spam activities on social networks such as Facebook and RenRen, and most importantly, the first attempts at propagating worms within these communities. What differentiates these attacks from normal network attacks, is that compared to anonymous and stealthy activities, or by commonly untrusted emails, social networks regain the ability to propagate within consentient users, who willingly accept to partake. In this paper, we will demonstrate the effects of influential nodes against non-influential nodes through in simulated scenarios and provide an overview and analysis of the outcomes.
Keywords
invasive software; social aspects of automation; social networking (online); unsolicited e-mail; Facebook; RenRen; Sybil based activity; anonymous activities; fake profiling; informatics assaults; information aggregation; information exchange; mutated worms propagation; network attacks; normal network attacks; online social networks; online voting; social characters; spam activities; stealthy activities; untrusted emails; viral propagation seeding strategies; Communities; Entropy; Facebook; Grippers; Peer to peer computing; Security; impersonifications; social networks; sybil; trust; trust transitivity;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location
Liverpool
Print_ISBN
978-1-4673-2172-3
Type
conf
DOI
10.1109/TrustCom.2012.5
Filename
6296030
Link To Document