Deakin University
Browse

File(s) under permanent embargo

Effects of social characters in viral propagation seeding strategies in online social networks

conference contribution
posted on 2012-01-01, 00:00 authored by Alessio Bonti, Ming Li, Longxiang GaoLongxiang Gao, W Shi
Online social networks have not only become a point of aggregation and exchange of information, they have so radically rooted into our everyday behaviors that they have become the target of important network attacks. We have seen an increasing trend in Sybil based activity, such as in personification, fake profiling and attempts to maliciously subvert the community stability in order to illegally create benefits for some individuals, such as online voting, and also from more classic informatics assaults using specifically mutated worms. Not only these attacks, in the latest months, we have seen an increase in spam activities on social networks such as Facebook and RenRen, and most importantly, the first attempts at propagating worms within these communities. What differentiates these attacks from normal network attacks, is that compared to anonymous and stealthy activities, or by commonly untrusted emails, social networks regain the ability to propagate within consentient users, who willingly accept to partake. In this paper, we will demonstrate the effects of influential nodes against non-influential nodes through in simulated scenarios and provide an overview and analysis of the outcomes.

History

Event

IEEE International Conference on Trust, Security and Privacy in Computing and Communications (11th : 2012 : Liverpool, England)

Pagination

632 - 639

Publisher

IEEE

Location

Liverpool, England

Place of publication

Piscataway, N. J.

Start date

2012-06-25

End date

2012-06-27

ISBN-13

9780769547459

ISBN-10

0769547451

Language

eng

Publication classification

E1 Full written paper - refereed

Editor/Contributor(s)

G Min, Y Wu, L Lei, X Jin, S Jarvis, A Al-Dubai

Title of proceedings

TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC