Online social networks have not only become a point of aggregation and exchange of information, they have so radically rooted into our everyday behaviors that they have become the target of important network attacks. We have seen an increasing trend in Sybil based activity, such as in personification, fake profiling and attempts to maliciously subvert the community stability in order to illegally create benefits for some individuals, such as online voting, and also from more classic informatics assaults using specifically mutated worms. Not only these attacks, in the latest months, we have seen an increase in spam activities on social networks such as Facebook and RenRen, and most importantly, the first attempts at propagating worms within these communities. What differentiates these attacks from normal network attacks, is that compared to anonymous and stealthy activities, or by commonly untrusted emails, social networks regain the ability to propagate within consentient users, who willingly accept to partake. In this paper, we will demonstrate the effects of influential nodes against non-influential nodes through in simulated scenarios and provide an overview and analysis of the outcomes.
History
Event
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (11th : 2012 : Liverpool, England)
Pagination
632 - 639
Publisher
IEEE
Location
Liverpool, England
Place of publication
Piscataway, N. J.
Start date
2012-06-25
End date
2012-06-27
ISBN-13
9780769547459
ISBN-10
0769547451
Language
eng
Publication classification
E1 Full written paper - refereed
Editor/Contributor(s)
G Min, Y Wu, L Lei, X Jin, S Jarvis, A Al-Dubai
Title of proceedings
TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications