A traffic analysis attack to compute social network measures

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Different Network Performance Measures in a Multi-Objective Traffic Assignment Problem

Traffic assignment algorithms are used to determine possible use of paths between origin-destination pairs and predict traffic flow in network links. One of the main deficiencies of ordinary traffic assignment methods is that in most of them one measure (mostly travel time) is usually included in objective function and other effective performance measures in traffic assignment are not considere...

متن کامل

A Fast Algorithm to Compute Maximum k-Plexes in Social Network Analysis

A clique model is one of the most important techniques on the cohesive subgraph detection; however, its applications are rather limited due to restrictive conditions of the model. Hence much research resorts to k-plex a graph in which any vertex is adjacent to all but at most k vertices which is a relaxation model of the clique. In this paper, we study the maximum k-plex problem and propose a f...

متن کامل

Camouflage of Network Traffic to Resist Attack (CONTRA)

By monitoring Internet traffic in the vicinity of a given host—which can be a single computer or a gateway device with multiple computers behind it—an attacker can observe communications originating from and destined to this host. Even if the message contents are encrypted, the IP addresses must remain visible for the packets to be properly routed throughout the open Internet. So the attacker c...

متن کامل

Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Multimedia Tools and Applications

سال: 2018

ISSN: 1380-7501,1573-7721

DOI: 10.1007/s11042-018-6217-9