• DocumentCode
    568459
  • Title

    Effects of Social Characters in Viral Propagation Seeding Strategies in Online Social Networks

  • Author

    Bonti, Alessio ; Li, Ming ; Gao, Longxiang ; Shi, Wen

  • Author_Institution
    Sch. of Inf. Technol., Deakin Univ., Melbourne, VIC, Australia
  • fYear
    2012
  • fDate
    25-27 June 2012
  • Firstpage
    632
  • Lastpage
    639
  • Abstract
    Online social networks have not only become a point of aggregation and exchange of information, they have so radically rooted into our everyday behaviors that they have become the target of important network attacks. We have seen an increasing trend in Sybil based activity, such as in personification, fake profiling and attempts to maliciously subvert the community stability in order to illegally create benefits for some individuals, such as online voting, and also from more classic informatics assaults using specifically mutated worms. Not only these attacks, in the latest months, we have seen an increase in spam activities on social networks such as Facebook and RenRen, and most importantly, the first attempts at propagating worms within these communities. What differentiates these attacks from normal network attacks, is that compared to anonymous and stealthy activities, or by commonly untrusted emails, social networks regain the ability to propagate within consentient users, who willingly accept to partake. In this paper, we will demonstrate the effects of influential nodes against non-influential nodes through in simulated scenarios and provide an overview and analysis of the outcomes.
  • Keywords
    invasive software; social aspects of automation; social networking (online); unsolicited e-mail; Facebook; RenRen; Sybil based activity; anonymous activities; fake profiling; informatics assaults; information aggregation; information exchange; mutated worms propagation; network attacks; normal network attacks; online social networks; online voting; social characters; spam activities; stealthy activities; untrusted emails; viral propagation seeding strategies; Communities; Entropy; Facebook; Grippers; Peer to peer computing; Security; impersonifications; social networks; sybil; trust; trust transitivity;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
  • Conference_Location
    Liverpool
  • Print_ISBN
    978-1-4673-2172-3
  • Type

    conf

  • DOI
    10.1109/TrustCom.2012.5
  • Filename
    6296030