Skip to main content

Advertisement

Log in

A trust based model for recommendations of malignant people in social network

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Interactions are often viewed in the context of social and mental relations, but the reality cannot be captured accurately by measuring the stochastic of its dynamics. This paper demonstrates an operational framework to detect socio-technical attacks through contextual analysis of the social network. It emphasized on a correlation based on the centrality that can be measured through Karl Pearson, Jaccard and Katz, etc. Given this insight, hidden or suspicious nodes cannot be identified through above mentioned approaches. This framework provides guidelines for modeling a network into a layered set of interacting nodes with dense intra-connections and sparse inter-connections. We proposed a methodology to filter out a pool of hidden users operating covertly within the network. In this work, result has been validated by traversing the real time, most devastating 26/11 Mumbai attack terrorist network and recommends the malignant people against the ground truth of social network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Abomhara Mohamed, Køien Geir M (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Sec Mobil 65–88

  • Beck Martin, Hüser Simone (2012) Political change in the middle east: an attempt to analyze the’arab’ spring

  • Cha Meeyoung, Mislove Alan, Gummadi Krishna P (2009) A measurement-driven analysis of information propagation in the flickr social network. In: proceedings of the 18th international conference on world wide web pp 721–730

  • Chinchore Anand, Jiang Frank, Xu Guandong (2015) Intelligent sybil attack detection on abnormal connectivity behavior in mobile social networks. In international conference on knowledge management in organizations pp 602–617. Springer

  • Correa Carlos D, Ma Kwan-Liu (2011) Visualizing social networks. In social network data analytics, pp 307–326. Springer

  • Du Nan, Wang Hao, Faloutsos Christos (2010) Analysis of large multi-modal social networks: patterns and a generator. In joint european conference on machine learning and knowledge discovery in databases pp 393–408. Springer

  • D’Angelo Gianni, Palmieri Francesco, Rampone Salvatore (2019) Detecting unfair recommendations in trust-based pervasive environments. Inf Sci 486:31–51

    Article  Google Scholar 

  • Faghani Mohammad Reza, Saidi Hossein (2009) Malware propagation in online social networks. In 2009 4th international conference on malicious and unwanted software (MALWARE) pp 8–14

  • Ferreira Ana, Huynen Jean-Louis, Koenig Vincent, Lenzini Gabriele (2014) A conceptual framework to study socio-technical security. In: international conference on human aspects of information security, privacy, and trust. pp 318–329. Springer

  • Huber Markus, Mulazzani Martin, Schrittwieser Sebastian, Weippl Edgar (2010) Cheap and automated socio-technical attacks based on social networking sites. In proceedings of the 3rd ACM workshop on artificial intelligence and security pages 61–64

  • Jha Govind Kumar, Gaur Manish, Ranjan Preetish, Thakur Hardeo Kumar (2011) A survey on trustworthy model of recommender system. Int J Syst Assur Eng Manage pp 1–18

  • Kalman Dan (1996) A singularly valuable decomposition: the svd of a matrix. Coll Math J 27(1):2–23

    Article  Google Scholar 

  • Liben-Nowell David, Kleinberg Jon (2007) The link-prediction problem for social networks. J Am Soc Inform Sci Technol 58(7):1019–1031

    Article  Google Scholar 

  • Lika Blerina, Kolomvatsos Kostas, Hadjiefthymiades Stathes (2014) Facing the cold start problem in recommender systems. Expert Syst Appl 41(4):2065–2073

    Article  Google Scholar 

  • Lilian Weng, Filippo Menczer, Yeol Ahn Yong (2013) Virality prediction and community structure in social networks. Sci Reports 3(1):1–6

    Google Scholar 

  • Nathan Eagle, Sandy Pentland Alex (2006) Reality mining: sensing complex social systems. Personal ubiquitous comput 10(4):255–268

    Article  Google Scholar 

  • Nebil Yaveroğlu Ömer, Noël Malod-Dognin, Darren Davis, Zoran Levnajic, Vuk Janjic, Rasa Karapandza, Aleksandar Stojmirovic, Nataša Pržulj (2014) Revealing the hidden language of complex networks. Sci Reports 4(1):1–9

    Google Scholar 

  • Noel Steven, Jajodia Sushil (2005) Understanding complex network attack graphs through clustered adjacency matrices. In 21st annual computer security applications conference (ACSAC’05), pages 10 IEEE

  • Nohuddin Puteri NE, Christley Rob, Coenen Frans, Patel Yogesh, Setzkorn Christian, Williams Shane (2010) Frequent pattern trend analysis in social networks. In international conference on advanced data mining and applications pp 358–369. Springer

  • Norris Gareth, Brookes Alexandra, Dowell David (2019) The psychology of internet fraud victimisation: a systematic review. J Police Crim Psychol 34(3):231–245

    Article  Google Scholar 

  • Nurse Jason RC, Creese Sadie, Goldsmith Michael, Lamberts Koen (2011) Trustworthy and effective communication of cybersecurity risks: a review. In: 2011 1st workshop on socio-technical aspects in security and trust (STAST) pp 60–68. IEEE

  • Rajput Balsing (2020) Emerging trends and patterns of cyber economic crimes. In: cyber economic crime in India pp 97–142. Springer

  • Ranjan Preetish, Singh Vrijendra, Kumar Prabhat, Prakash Satya (2018) Models for the detection of malicious intent people in society. Int J Digital Crime Forensics (IJDCF) 10(3):15–26

    Article  Google Scholar 

  • Ranjan Preetish, Vaish Abhishek (2021) Socio-technical attack approximation based on structural virality of information in social networks. Int J Inform Sec Priv (IJISP) 15(1):153–172

    Article  Google Scholar 

  • Sarna Geetika, Bhatia MPS (2018) Identification of suspicious patterns in social network using zipf’s law. In 2018 international conference on advances in computing, communication control and networking (ICACCCN) pp 957–962. IEEE

  • Sharad Goel, Ashton Anderson, Jake Hofman, Watts Duncan J (2016) The structural virality of online diffusion. Manage Sci 62(1):180–196

    Google Scholar 

  • Steven Laan, Maarten Marx, Mokken Robert J (2016) Close communities in social networks: boroughs and 2-clubs. Soc Net Analy Mining 6(1):20

    Article  Google Scholar 

  • Tan Li, Ponnam Suma, Gillham Patrick, Edwards Bob, Johnson Erik (2013) Analyzing the impact of social media on social movements: a computational study on twitter and the occupy wall street movement. In proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining pp 1259–1266

  • Tareaf Raad Bin, Berger Philipp, Hennig Patrick, Meinel Christoph. Malicious Behaviour Identification in Online Social Networks. In Silvia Bonomi and Etienne Rivière, editors, 18th IFIP International conference on distributed applications and interoperable systems (DAIS) volume LNCS-10853 of distributed applications and interoperable systems, pages 18–25, Springer International Publishing, Spain

  • Zhang Huiqi, Dantu Ram (2010) Predicting social ties in mobile phone networks. In 2010 IEEE international conference on intelligence and security informatics pp 25–30. IEEE

  • Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Zhao Ben Y, Yafei Dai (2014) Uncovering social network sybils in the wild. ACM Trans Knowledge Discov Data (TKDD) 8(1):1–29

    Article  Google Scholar 

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Govind Kumar Jha.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflicts of interest related to the content of this article.

Human or animal rights

The research having no involvement of Human participation and/or animals, thus nothing to disclose.

Informed Consent

Informed consent was obtained from all authors included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jha, G.K., Thakur, H.K., Ranjan, P. et al. A trust based model for recommendations of malignant people in social network. Int J Syst Assur Eng Manag 14, 415–428 (2023). https://doi.org/10.1007/s13198-022-01812-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-022-01812-0

Keywords