SocialImpact: Systematic Analysis of Underground Social Dynamics
نویسندگان
چکیده
Existing research on net-centric attacks has focused on the detection of attack events on network side and the removal of rogue programs from client side. However, such approaches largely overlook the way on how attack tools and unwanted programs are developed and distributed. Recent studies in underground economy reveal that suspicious attackers heavily utilize online social networks to form special interest groups and distribute malicious code. Consequently, examining social dynamics, as a novel way to complement existing research efforts, is imperative to systematically identify attackers and tactically cope with net-centric threats. In this paper, we seek a way to understand and analyze social dynamics relevant to net-centric attacks and propose a suite of measures called SocialImpact for systematically discovering and mining adversarial evidence. We also demonstrate the feasibility and applicability of our approach by implementing a proof-of-concept prototype Cassandra with a case study on real-world data archived from the Internet.
منابع مشابه
Structural analysis of impacting factors of sustainable development in underground coal mining using DEMATEL method
Mining can become more sustainable by developing and integrating economic, environmental, and social components. Among the mining industries, coal mining requires paying a serious attention to the aspects of sustainable development. Therefore, in this work, we investigate the impacting factors involved in the sustainable development of underground coal mining from the structural viewpoint. For ...
متن کاملPsychological Aspects of Human Dynamics in Underground Evacuation: Field Experiments
The relevance of individual and social human factors in evacuation generally has been accepted, but only few studies aim at determining their specific influence on evacuation behavior. Data come from accident analysis, laboratory experiments, and field studies. A series of studies including passenger counts, passenger interviews and field experiments is reported. Data show that many passengers ...
متن کاملPredicting target selection by terrorists: a network analysis of the 2005 London underground attacks
A vulnerability analysis of possible use in security studies is presented. The analysis of the London underground network suggests that the stations bombed on 7 July, 2005 may not have been chosen randomly. From the viewpoint of effectively disturbing the transport system, nearly the best choice was made out of roughly 3 million possible combinations for attacking three stations. By comparing t...
متن کاملOperational dynamics of “Galamsey” within eleven selected districts of western region of Ghana
The uncontrolled spread of illegal artisanal small-scale gold mining (ASM), popularly termed “galamsey” in Ghana, has, for decades, impacted adversely upon water bodies, soils, wildlife, human health, and safety. A lack of understanding, however, of the types of galamsey, their operational attributes, and their relative impacts has unfortunately hindered an effective policy response despite num...
متن کاملExamining the Social Networks of Malware Writers and Hackers
A substantive body of research has emerged exploring the social dynamics and subculture of computer hacking. Few, however, have considered the structure of social networks in the hacker community due in part to the lack of visible information about active hackers or malware writers. Our research focuses on the rarely studied subject of underground networks of computer hackers. Thus, this study ...
متن کامل