Better Adaptive Malicious Users Detection Algorithm in Human Contact Networks

被引:5
作者
Lin, Limei [1 ]
Huang, Yanze [2 ]
Xu, Li [1 ]
Hsieh, Sun-Yuan [3 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Key Lab Network Secur & Cryptol, Fuzhou 350117, Fujian, Peoples R China
[2] Fujian Univ Technol, Sch Comp Sci & Math, Fuzhou 350118, Fujian, Peoples R China
[3] Natl Cheng Kung Univ, Inst Med Informat, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
基金
中国国家自然科学基金;
关键词
Feature extraction; Hypercubes; Topology; Adaptation models; Routing; Protocols; Network topology; Malicious users detection; comparison detection model; Hamiltonian cycle decomposition; human contact network; TRUST MANAGEMENT; WATCHDOG SYSTEM; TOLERANT; MECHANISM; ATTACK; NODES;
D O I
10.1109/TC.2022.3142626
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A human contact network (HCN) consists of individuals moving around and interacting with each other. In HCN, it is essential to detect malicious users who break the data delivery through terminating the data delivery or tampering with the data. Since malicious users will pay more but gain less when breaking the data delivery of opportunistic contacts, we focus on the non-opportunistic contacts that occur more frequently and stably. It is observed that people contact with each other more frequently if they have more social features in common. In this paper, we build up topology structure for HCN based on social features, and propose a graph theoretical comparison detection model to perform malicious users detection. Then we present an adaptive detection scheme based on Hamiltonian cycle decomposition. Also, we define comparison-0-string and comparison-1-string to improve the detection efficiency. Moreover, we perform scenario simulations on real data to realize the detected process of malicious users. Experiments show that, when the number of malicious users is bounded by the dimension of HCN, our scheme has a detection rate of 100% with both false positive rate and false negative rate being 0%, and the running cost is also very low when compared to baseline approaches. When the number of malicious users exceeds the bound, the detection rate of our scheme decreases slowly, while the false positive rate and false negative rate increase slowly, but they are still better than the baseline approaches.
引用
收藏
页码:2968 / 2981
页数:14
相关论文
共 34 条
[1]   BotChase: Graph-Based Bot Detection Using Machine Learning [J].
Abou Daya, Abbas ;
Salahuddin, Mohammad A. ;
Limam, Noura ;
Boutaba, Raouf .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01) :15-29
[2]   Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks [J].
Alajeely, Majeed ;
Doss, Robin ;
Ahmad, Asma'a ;
Mak-Hau, Vicky .
COMPUTER COMMUNICATIONS, 2015, 71 :111-118
[3]   Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media [J].
Alvari, Hamidreza ;
Shaabani, Elham ;
Sarkar, Soumajyoti ;
Beigi, Ghazaleh ;
Shakarian, Paulo .
COMPANION OF THE WORLD WIDE WEB CONFERENCE (WWW 2019 ), 2019, :154-161
[4]   An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks [J].
Ayday, Erman ;
Fekri, Faramarz .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (09) :1514-1531
[5]   Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing [J].
Chen, Ing-Ray ;
Bao, Fenye ;
Chang, MoonJeong ;
Cho, Jin-Hee .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (05) :1200-1210
[6]   Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case [J].
Chen, Xu ;
Proulx, Brian ;
Gong, Xiaowen ;
Zhang, Junshan .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2015, 23 (05) :1471-1484
[7]   SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks [J].
Ciobanu, Radu-Ioan ;
Dobre, Ciprian ;
Dascalu, Mihai ;
Trausan-Matu, Stefan ;
Cristea, Valentin .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 :240-249
[8]   Malicious Code Detection under 5G HetNets Based on a Multi-Objective RBM Model [J].
Cui, Zhihua ;
Zhao, Yaru ;
Cao, Yang ;
Cai, Xingjuan ;
Zhang, Wensheng ;
Chen, Jinjun .
IEEE NETWORK, 2021, 35 (02) :82-87
[9]   Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems [J].
Dhurandher, Sanjay K. ;
Kumar, Arun ;
Obaidat, Mohammad S. .
IEEE SYSTEMS JOURNAL, 2018, 12 (04) :3191-3202
[10]   A Cooperative Watchdog System to Detect Misbehavior Nodes in Vehicular Delay-Tolerant Networks [J].
Dias, Joao A. F. F. ;
Rodrigues, Joel J. P. C. ;
Xia, Feng ;
Mavromoustakis, Constandinos X. .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2015, 62 (12) :7929-7937