Effects of social characters in viral propagation seeding strategies in online social networks

Bonti, Alessio, Li, Ming, Gao, Lonxiang and Shi, Wen 2012, Effects of social characters in viral propagation seeding strategies in online social networks, in TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, Piscataway, N. J., pp. 632-639.

Attached Files
Name Description MIMEType Size Downloads

Title Effects of social characters in viral propagation seeding strategies in online social networks
Author(s) Bonti, Alessio
Li, Ming
Gao, Lonxiang
Shi, Wen
Conference name IEEE International Conference on Trust, Security and Privacy in Computing and Communications (11th : 2012 : Liverpool, England)
Conference location Liverpool, England
Conference dates 25-27 Jun. 2012
Title of proceedings TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Editor(s) Min, Geyong
Wu, Yulei
Lei, Liu (Chris)
Jin, Xiaolong
Jarvis, Stephen
Al-Dubai, Ahmed Y.
Publication date 2012
Conference series IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Start page 632
End page 639
Total pages 8
Publisher IEEE
Place of publication Piscataway, N. J.
Keyword(s) trust
social networks
sybil
impersonifications
trust transitivity
Summary Online social networks have not only become a point of aggregation and exchange of information, they have so radically rooted into our everyday behaviors that they have become the target of important network attacks. We have seen an increasing trend in Sybil based activity, such as in personification, fake profiling and attempts to maliciously subvert the community stability in order to illegally create benefits for some individuals, such as online voting, and also from more classic informatics assaults using specifically mutated worms. Not only these attacks, in the latest months, we have seen an increase in spam activities on social networks such as Facebook and RenRen, and most importantly, the first attempts at propagating worms within these communities. What differentiates these attacks from normal network attacks, is that compared to anonymous and stealthy activities, or by commonly untrusted emails, social networks regain the ability to propagate within consentient users, who willingly accept to partake. In this paper, we will demonstrate the effects of influential nodes against non-influential nodes through in simulated scenarios and provide an overview and analysis of the outcomes.
ISBN 0769547451
9780769547459
Language eng
Field of Research 109999 Technology not elsewhere classified
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category E1 Full written paper - refereed
Persistent URL http://hdl.handle.net/10536/DRO/DU:30049568

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 28 Abstract Views, 5 File Downloads  -  Detailed Statistics
Created: Thu, 29 Nov 2012, 07:59:50 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.