Prediction of Malware Propagation and Links within Communities in Social Media Based Events

This paper is aimed at studying malware propagation on social media and community link prediction. Twitter is taken as the social media platform and data is collected using Twitter4j and MongoDB. A high interaction client honeypot is used to classify benign and malicious URL's. The retweet volume and links between the users are then analyzed. Further to this, the work aims to detect communities that arise from these links between users with the help of BIGClam algorithm.

[1]  Ewa Niewiadomska-Szynkiewicz,et al.  Support Vector Machine for Malware Analysis and Classification , 2014, 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT).

[2]  Philip Tavel,et al.  Modeling and Simulation Design , 2011 .

[3]  Dino Pedreschi,et al.  A classification for community discovery methods in complex networks , 2011, Stat. Anal. Data Min..

[4]  Jure Leskovec,et al.  Overlapping community detection at scale: a nonnegative matrix factorization approach , 2013, WSDM.

[5]  Renato Miranda,et al.  Uncovering the Location of Twitter Users , 2013, 2013 Brazilian Conference on Intelligent Systems.

[6]  Matthew Michelson,et al.  Tweet Disambiguate Entities Retrieve Folksonomy SubTree Step 1 : Discover Categories Generate Topic Profile from SubTrees Step 2 : Discover Profile Topic Profile : “ English Football ” “ World Cup ” , 2011 .

[7]  Christopher Francis Simoes Catweetegories : machine learning to organize your Twitter stream , 2013 .

[8]  Dongwon Lee,et al.  @Phillies Tweeting from Philly? Predicting Twitter User Locations with Spatial Word Usage , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[9]  Ian Welch,et al.  Capture - A behavioral analysis tool for applications and documents , 2007 .

[10]  Krishna P. Gummadi,et al.  Geographic Dissection of the Twitter Network , 2012, ICWSM.

[11]  Danah Boyd,et al.  Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[12]  Carsten Willems,et al.  Learning and Classification of Malware Behavior , 2008, DIMVA.

[13]  Mathieu Bastian,et al.  Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.

[14]  Peter Komisarczuk,et al.  Challenges in developing Capture-HPC exclusion lists , 2014, SIN.