Abstract
Interactions are often viewed in the context of social and mental relations, but the reality cannot be captured accurately by measuring the stochastic of its dynamics. This paper demonstrates an operational framework to detect socio-technical attacks through contextual analysis of the social network. It emphasized on a correlation based on the centrality that can be measured through Karl Pearson, Jaccard and Katz, etc. Given this insight, hidden or suspicious nodes cannot be identified through above mentioned approaches. This framework provides guidelines for modeling a network into a layered set of interacting nodes with dense intra-connections and sparse inter-connections. We proposed a methodology to filter out a pool of hidden users operating covertly within the network. In this work, result has been validated by traversing the real time, most devastating 26/11 Mumbai attack terrorist network and recommends the malignant people against the ground truth of social network.










Similar content being viewed by others
References
Abomhara Mohamed, Køien Geir M (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Sec Mobil 65–88
Beck Martin, Hüser Simone (2012) Political change in the middle east: an attempt to analyze the’arab’ spring
Cha Meeyoung, Mislove Alan, Gummadi Krishna P (2009) A measurement-driven analysis of information propagation in the flickr social network. In: proceedings of the 18th international conference on world wide web pp 721–730
Chinchore Anand, Jiang Frank, Xu Guandong (2015) Intelligent sybil attack detection on abnormal connectivity behavior in mobile social networks. In international conference on knowledge management in organizations pp 602–617. Springer
Correa Carlos D, Ma Kwan-Liu (2011) Visualizing social networks. In social network data analytics, pp 307–326. Springer
Du Nan, Wang Hao, Faloutsos Christos (2010) Analysis of large multi-modal social networks: patterns and a generator. In joint european conference on machine learning and knowledge discovery in databases pp 393–408. Springer
D’Angelo Gianni, Palmieri Francesco, Rampone Salvatore (2019) Detecting unfair recommendations in trust-based pervasive environments. Inf Sci 486:31–51
Faghani Mohammad Reza, Saidi Hossein (2009) Malware propagation in online social networks. In 2009 4th international conference on malicious and unwanted software (MALWARE) pp 8–14
Ferreira Ana, Huynen Jean-Louis, Koenig Vincent, Lenzini Gabriele (2014) A conceptual framework to study socio-technical security. In: international conference on human aspects of information security, privacy, and trust. pp 318–329. Springer
Huber Markus, Mulazzani Martin, Schrittwieser Sebastian, Weippl Edgar (2010) Cheap and automated socio-technical attacks based on social networking sites. In proceedings of the 3rd ACM workshop on artificial intelligence and security pages 61–64
Jha Govind Kumar, Gaur Manish, Ranjan Preetish, Thakur Hardeo Kumar (2011) A survey on trustworthy model of recommender system. Int J Syst Assur Eng Manage pp 1–18
Kalman Dan (1996) A singularly valuable decomposition: the svd of a matrix. Coll Math J 27(1):2–23
Liben-Nowell David, Kleinberg Jon (2007) The link-prediction problem for social networks. J Am Soc Inform Sci Technol 58(7):1019–1031
Lika Blerina, Kolomvatsos Kostas, Hadjiefthymiades Stathes (2014) Facing the cold start problem in recommender systems. Expert Syst Appl 41(4):2065–2073
Lilian Weng, Filippo Menczer, Yeol Ahn Yong (2013) Virality prediction and community structure in social networks. Sci Reports 3(1):1–6
Nathan Eagle, Sandy Pentland Alex (2006) Reality mining: sensing complex social systems. Personal ubiquitous comput 10(4):255–268
Nebil Yaveroğlu Ömer, Noël Malod-Dognin, Darren Davis, Zoran Levnajic, Vuk Janjic, Rasa Karapandza, Aleksandar Stojmirovic, Nataša Pržulj (2014) Revealing the hidden language of complex networks. Sci Reports 4(1):1–9
Noel Steven, Jajodia Sushil (2005) Understanding complex network attack graphs through clustered adjacency matrices. In 21st annual computer security applications conference (ACSAC’05), pages 10 IEEE
Nohuddin Puteri NE, Christley Rob, Coenen Frans, Patel Yogesh, Setzkorn Christian, Williams Shane (2010) Frequent pattern trend analysis in social networks. In international conference on advanced data mining and applications pp 358–369. Springer
Norris Gareth, Brookes Alexandra, Dowell David (2019) The psychology of internet fraud victimisation: a systematic review. J Police Crim Psychol 34(3):231–245
Nurse Jason RC, Creese Sadie, Goldsmith Michael, Lamberts Koen (2011) Trustworthy and effective communication of cybersecurity risks: a review. In: 2011 1st workshop on socio-technical aspects in security and trust (STAST) pp 60–68. IEEE
Rajput Balsing (2020) Emerging trends and patterns of cyber economic crimes. In: cyber economic crime in India pp 97–142. Springer
Ranjan Preetish, Singh Vrijendra, Kumar Prabhat, Prakash Satya (2018) Models for the detection of malicious intent people in society. Int J Digital Crime Forensics (IJDCF) 10(3):15–26
Ranjan Preetish, Vaish Abhishek (2021) Socio-technical attack approximation based on structural virality of information in social networks. Int J Inform Sec Priv (IJISP) 15(1):153–172
Sarna Geetika, Bhatia MPS (2018) Identification of suspicious patterns in social network using zipf’s law. In 2018 international conference on advances in computing, communication control and networking (ICACCCN) pp 957–962. IEEE
Sharad Goel, Ashton Anderson, Jake Hofman, Watts Duncan J (2016) The structural virality of online diffusion. Manage Sci 62(1):180–196
Steven Laan, Maarten Marx, Mokken Robert J (2016) Close communities in social networks: boroughs and 2-clubs. Soc Net Analy Mining 6(1):20
Tan Li, Ponnam Suma, Gillham Patrick, Edwards Bob, Johnson Erik (2013) Analyzing the impact of social media on social movements: a computational study on twitter and the occupy wall street movement. In proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining pp 1259–1266
Tareaf Raad Bin, Berger Philipp, Hennig Patrick, Meinel Christoph. Malicious Behaviour Identification in Online Social Networks. In Silvia Bonomi and Etienne Rivière, editors, 18th IFIP International conference on distributed applications and interoperable systems (DAIS) volume LNCS-10853 of distributed applications and interoperable systems, pages 18–25, Springer International Publishing, Spain
Zhang Huiqi, Dantu Ram (2010) Predicting social ties in mobile phone networks. In 2010 IEEE international conference on intelligence and security informatics pp 25–30. IEEE
Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Zhao Ben Y, Yafei Dai (2014) Uncovering social network sybils in the wild. ACM Trans Knowledge Discov Data (TKDD) 8(1):1–29
Funding
The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflicts of interest related to the content of this article.
Human or animal rights
The research having no involvement of Human participation and/or animals, thus nothing to disclose.
Informed Consent
Informed consent was obtained from all authors included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jha, G.K., Thakur, H.K., Ranjan, P. et al. A trust based model for recommendations of malignant people in social network. Int J Syst Assur Eng Manag 14, 415–428 (2023). https://doi.org/10.1007/s13198-022-01812-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-022-01812-0