A traffic analysis attack to compute social network measures

The development of digital media, the increasing use of social networks, the easier access to modern technological devices, is perturbing thousands of people in their public and private lives. People love posting their personal news without consider the risks involved. Privacy has never been more important. Privacy enhancing technologies research have attracted considerable international attention after the recent news against users personal data protection in social media websites like Facebook. It has been demonstrated that even when using an anonymous communication system, it is possible to reveal user’s identities through intersection attacks or traffic analysis attacks. Combining a traffic analysis attack with Analysis Social Networks (SNA) techniques, an adversary can be able to obtain important data from the whole network, topological network structure, subset of social data, revealing communities and its interactions. The aim of this work is to demonstrate how intersection attacks can disclose structural properties and significant details from an anonymous social network composed of a university community.

[1]  Bülent Yener,et al.  Graph Theoretic and Spectral Analysis of Enron Email Data , 2005, Comput. Math. Organ. Theory.

[2]  Tom A. B. Snijders,et al.  Social Network Analysis , 2011, International Encyclopedia of Statistical Science.

[3]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[4]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[5]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[6]  Bernardo A. Huberman,et al.  Email as spectroscopy: automated discovery of community structure within organizations , 2003 .

[7]  L. Javier García-Villalba,et al.  Disclosing user relationships in email networks , 2015, The Journal of Supercomputing.

[8]  L. Javier García-Villalba,et al.  Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks , 2016, Sensors.

[9]  Jure Leskovec,et al.  Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..

[10]  Salvatore Marano,et al.  Link Prediction in Human Contact Networks Using Online Social Ties , 2013, 2013 International Conference on Cloud and Green Computing.

[11]  L. Jean Camp,et al.  Cars, Condoms, and Facebook , 2013, ISC.

[12]  Nicholas Hopper,et al.  On the effectiveness of k;-anonymity against traffic analysis and surveillance , 2006, WPES '06.

[13]  Ronaldo Menezes,et al.  Identification of Social Tension in Organizational Networks - Relating Clan/Clique Formation to Social Tension , 2009, CompleNet.

[14]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[15]  Ajith Abraham,et al.  Models of Influence in Online Social Networks , 2014, Int. J. Intell. Syst..

[16]  Andrew McCallum,et al.  Topic and Role Discovery in Social Networks , 2005, IJCAI.

[17]  Yan Liu,et al.  Predicting who rated what in large-scale datasets , 2007, SKDD.

[18]  Tina W. Wey,et al.  Social network analysis of animal behaviour: a promising tool for the study of sociality , 2008, Animal Behaviour.

[19]  George Danezis,et al.  Statistical Disclosure or Intersection Attacks on Anonymity Systems , 2004, Information Hiding.

[20]  L. Javier García-Villalba,et al.  Extracting Association Patterns in Network Communications , 2015, Sensors.

[21]  Bernardo A. Huberman,et al.  E-Mail as Spectroscopy: Automated Discovery of Community Structure within Organizations , 2005, Inf. Soc..

[22]  Christos Faloutsos,et al.  Graph evolution: Densification and shrinking diameters , 2006, TKDD.

[23]  Hilary Risser Social Networks Analysis , 2013 .

[24]  Marit Hansen,et al.  Protection Goals for Privacy Engineering , 2015, 2015 IEEE Security and Privacy Workshops.

[25]  S. Bornholdt,et al.  Scale-free topology of e-mail networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[26]  Marianne Winslett,et al.  Proceedings of the 5th ACM workshop on Privacy in electronic society , 2006, CCS 2006.

[27]  Mohammed Shahadat Uddin,et al.  Towards A Scale Free Network Approach to Study Organizational Communication Network , 2010, PACIS.

[28]  Tomas Olovsson,et al.  Towards modeling legitimate and unsolicited email traffic using social network properties , 2012, SNS '12.

[29]  Andrew McCallum,et al.  Extracting social networks and contact information from email and the Web , 2004, CEAS.

[30]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[31]  Mohammad Al Hasan,et al.  A Survey of Link Prediction in Social Networks , 2011, Social Network Data Analytics.

[32]  Sarah Spiekermann,et al.  Towards a value theory for personal data , 2017, J. Inf. Technol..

[33]  Frank Stajano,et al.  Privacy-enabling social networking over untrusted networks , 2009, WOSN '09.

[34]  Jean Caelen,et al.  Detection and classification of the behavior of people in an intelligent building by camera , 2013 .

[35]  Marco De Martino Social Networks Analysis , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[36]  Carmela Troncoso,et al.  Two-Sided Statistical Disclosure Attack , 2007, Privacy Enhancing Technologies.

[37]  Carmela Troncoso,et al.  Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications , 2009, Privacy Enhancing Technologies.

[38]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[39]  Aristides Gionis,et al.  Social Network Analysis and Mining for Business Applications , 2011, TIST.

[40]  Lei Chen,et al.  A Survey of Privacy-Preservation of Graphs and Social Networks , 2010, Managing and Mining Graph Data.

[41]  George M. Mohay,et al.  Identifying the authors of suspect email , 2001 .

[42]  S Kavitha,et al.  A Survey on k-Anonymity Generalization Algorithms , 2014 .

[43]  Lian Liu,et al.  Privacy Preservation of Affinities in Social Networks , 2009 .

[44]  J. Beúnza Actores sociales y redes de relaciones: reflexiones para una historia global , 2001 .

[45]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[46]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[47]  George Danezis,et al.  Systems for Anonymous Communication , 2010, FC 2010.

[48]  Andrew McCallum,et al.  Topic and Role Discovery in Social Networks with Experiments on Enron and Academic Email , 2007, J. Artif. Intell. Res..

[49]  Ming Gu,et al.  De-Anonymization of Dynamic Social Networks , 2013 .