A trust based model for recommendations of malignant people in social network

被引:1
作者
Jha, Govind Kumar [1 ]
Thakur, Hardeo Kumar [2 ]
Ranjan, Preetish [3 ]
Gaur, Manish [4 ]
机构
[1] Govt Engn Coll, Munger, Bihar, India
[2] Bennett Univ, Greater Noida, India
[3] Amity Univ, Patna, Bihar, India
[4] Dr APJ Abdul Kalam Tech Univ, Inst Engn & Technol, Lucknow, India
关键词
Recommendations; Socio-technical attacks; Social network analysis; Trust; machine learning; Correlation coefficients; SVD;
D O I
10.1007/s13198-022-01812-0
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Interactions are often viewed in the context of social and mental relations, but the reality cannot be captured accurately by measuring the stochastic of its dynamics. This paper demonstrates an operational framework to detect socio-technical attacks through contextual analysis of the social network. It emphasized on a correlation based on the centrality that can be measured through Karl Pearson, Jaccard and Katz, etc. Given this insight, hidden or suspicious nodes cannot be identified through above mentioned approaches. This framework provides guidelines for modeling a network into a layered set of interacting nodes with dense intra-connections and sparse inter-connections. We proposed a methodology to filter out a pool of hidden users operating covertly within the network. In this work, result has been validated by traversing the real time, most devastating 26/11 Mumbai attack terrorist network and recommends the malignant people against the ground truth of social network.
引用
收藏
页码:415 / 428
页数:14
相关论文
共 31 条
  • [1] Abomhara M., 2015, Journal of Cyber Security and Mobility, P65, DOI [10.13052/jcsm2245-1439.414, DOI 10.13052/JCSM2245-1439.414]
  • [2] Balsing Rajput, 2020, CYBER EC CRIME INDIA, P97
  • [3] Malicious Behaviour Identification in Online Social Networks
    Bin Tareaf, Raad
    Berger, Philipp
    Hennig, Patrick
    Meinel, Christoph
    [J]. DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS (DAIS 2018), 2018, 10853 : 18 - 25
  • [4] Cha M., 2009, P 18 INT C WORLD WID, P721
  • [5] Chinchore A., 2015, INTELLIGENT SYBIL AT, V224
  • [6] Correa CD, 2011, SOCIAL NETWORK DATA ANALYTICS, P307
  • [7] Detecting unfair recommendations in trust-based pervasive environments
    D'Angelo, Gianni
    Palmieri, Francesco
    Rampone, Salvatore
    [J]. INFORMATION SCIENCES, 2019, 486 : 31 - 51
  • [8] Du N, 2010, LECT NOTES ARTIF INT, V6321, P393
  • [9] Reality mining: sensing complex social systems
    Eagle, Nathan
    Pentland, Alex
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2006, 10 (04) : 255 - 268
  • [10] Malware Propagation in Online Social Networks
    Faghani, Mohammad Reza
    Saidi, Hossein
    [J]. 2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 8 - +