Computational Social Networks: Security and Privacy

The continuous self-growing nature of social networks makes it hard to define a line of safety around these networks. Users in social networks are not interacting with the Web only but also with trusted groups that may also contain enemies. There are different kinds of attacks on these networks including causing damage to the computer systems and stealing information about users. These attacks are not only affecting individuals but also the organizations they are belonging to. Protection from these attacks should be performed by the users and security experts of the network. Advices should be provided to users of these social networks. Also security experts should be sure that the contents transmitted through the network do not contain malicious or harmful data. This chapter presents an overview of the social networks security and privacy issues and illustrates the various security risks and the tasks applied to minimize those risks. In addition, this chapter explains some of the common strategies that attackers often use and some possible counter measures against such issues.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Zeynep Tufekci GROOMING, GOSSIP, FACEBOOK AND MYSPACE , 2008 .

[3]  Stephanie Tom Tong,et al.  The Role of Friends’ Appearance and Behavior on Evaluations of Individuals on Facebook: Are We Known by the Company We Keep? , 2008 .

[4]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[5]  Andrew Schrock,et al.  Examining Social Media Usage: Technology Clusters and Social Network Site Membership , 2008, First Monday.

[6]  Bruno S. Frey How can business cope with terrorism , 2009 .

[7]  Saeed Jalili,et al.  An Ant Colony Optimization Algorithm for Network Vulnerability Analysis , 2006 .

[8]  A. Paraskevas,et al.  A strategic framework for terrorism prevention and mitigation in tourism destinations , 2007 .

[9]  Charles Kadushin,et al.  Who benefits from network analysis: ethics of social network research , 2005, Soc. Networks.

[10]  Bethany S. Dohleman Exploratory social network analysis with Pajek , 2006 .

[11]  Valdis E. Krebs,et al.  Uncloaking Terrorist Networks , 2002, First Monday.

[12]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[13]  Florence Appel Revisiting Moor's Towards a Theory of Privacy in the Information Age , 2010, CSOC.

[14]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[15]  Agusti Solanas,et al.  Privacy Protection with Genetic Algorithms , 2008 .

[16]  Hsinchun Chen,et al.  Mapping the contemporary terrorism research domain , 2007, Int. J. Hum. Comput. Stud..

[17]  Josep Maria Mateo-Sanz,et al.  Exploiting social networks to provide privacy in personalized web search , 2011, J. Syst. Softw..

[18]  Kôiti Hasida,et al.  POLYPHONET: an advanced social network extraction system from the web , 2006, WWW '06.

[19]  Tanya Y. Berger-Wolf,et al.  A framework for community identification in dynamic social networks , 2007, KDD '07.

[20]  Danah Boyd,et al.  Social network sites: definition, history, and scholarship , 2007, IEEE Engineering Management Review.

[21]  Pavica Sheldon,et al.  The Relationship Between Unwillingness-to-Communicate and Students' Facebook Use , 2008, J. Media Psychol. Theor. Methods Appl..

[22]  Peter W. Liesch,et al.  Positioning terrorism in management and marketing: Research propositions , 2005 .

[23]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[24]  Christos Kollias,et al.  Terrorism and the effectiveness of security spending in Greece: Policy implications of some empirical findings , 2009 .

[25]  Lise Getoor,et al.  Declarative analysis of noisy information networks , 2011, 2011 IEEE 27th International Conference on Data Engineering Workshops.

[26]  Linton C. Freeman Social Network Visualization, Methods of , 2009 .

[27]  Yuval Wolf,et al.  Terrorism: Toward an Overarched Account and Prevention With a Special Reference to Pendulum Interplay Between Both Parties , 2007 .

[28]  Alberto Abadie,et al.  Terrorism and the world economy , 2005, Transnational Terrorism.

[29]  Winston T. H. Koh Terrorism and its impact on economic growth and technological innovation , 2007 .

[30]  Linton C. Freeman,et al.  Carnegie Mellon: Journal of Social Structure: Visualizing Social Networks Visualizing Social Networks , 2022 .

[31]  Kathleen M. Carley,et al.  Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers , 2004 .

[32]  Linton C. Freeman,et al.  Social Network Visualization, Methods of , 2009, Encyclopedia of Complexity and Systems Science.

[33]  Patti M. Valkenburg,et al.  Getting acquainted through social network sites: Testing a model of online uncertainty reduction and social attraction , 2010, Comput. Hum. Behav..

[34]  Kathleen M. Carley Dynamic Network Analysis , 2003 .

[35]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[36]  D. Gruhl,et al.  Artist Ranking Through Analysis of On-line Community Comments , 2008 .

[37]  M. Thelwall Social networks, gender, and friending: An analysis of MySpace member profiles , 2008 .

[38]  L. da F. Costa,et al.  Characterization of complex networks: A survey of measurements , 2005, cond-mat/0505185.

[39]  Hillol Kargupta,et al.  A local asynchronous distributed privacy preserving feature selection algorithm for large peer-to-peer networks , 2009, Knowledge and Information Systems.

[40]  Patrick Seemann,et al.  Matrix Factorization Techniques for Recommender Systems , 2014 .

[41]  Václav Snásel,et al.  Link suggestions in terrorists networks using Semi Discrete Decomposition , 2010, 2010 Sixth International Conference on Information Assurance and Security.

[42]  V. Latora,et al.  Complex networks: Structure and dynamics , 2006 .

[43]  David Liben-Nowell,et al.  The link-prediction problem for social networks , 2007 .

[44]  Guy Shani,et al.  Mining recommendations from the web , 2008, RecSys '08.

[45]  H. Sebastian Seung,et al.  Learning the parts of objects by non-negative matrix factorization , 1999, Nature.

[46]  A. Felt Privacy Protection for Social Networking APIs , 2008 .

[47]  Sarah Granger,et al.  Social Engineering Fundamentals, Part I: Hacker Tactics , 2003 .