Tracking Social Networks Events

Online social media represent a fundamental shift of how information is being produced, transferred and consumed. User generated content in the form of blog posts, comments, and tweets establishes a connection between information producers and consumers. Tracking the pulse of the social media outlets enables companies to gain feedback and insight in how to improve and market products better. For consumers, the abundance of information and opinions from diverse sources helps them make more informed decisions. However, the huge level of online interactions leads to permissive usage behaviours, opening the door for viruses, worms, trojan horses and other threats to install and easily spread, without being noticed. Being able to track users activities, organize the retrieved information in a comprehensive way and analyze it can be very useful for several management, engineering and security tasks. This paper proposes a framework to collect social network events and store them in a relational database for posterior analysis. A graphical user interface was developed to allow flexible access to stored information, according to the type of event, thus facilitating the analysis of users behaviours. From a privacy perspective, the proposed framework is not intrusive because it only gathers the actions timestamps and not their complete contents. By computing statistical models over the obtained data, it is possible to define ”normal or typical” usage profiles and detect possible deviations that can be indicative of a compromised user account. Keywords–Monitoring Framework; User Behaviour Modelling; Social Network; Compromised User Account.

[1]  Haiying Shen,et al.  Leveraging Social Networks for Effective Spam Filtering , 2014, IEEE Transactions on Computers.

[2]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[3]  Marc Lemercier,et al.  A dynamic approach to detecting suspicious profiles on social platforms , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[4]  John Kelley,et al.  WhozThat? evolving an ecosystem for context-aware mobile social networks , 2008, IEEE Network.

[5]  Hassan Takabi,et al.  Towards active detection of identity clone attacks on online social networks , 2011, CODASPY '11.

[6]  Paulo Salvador,et al.  Detection of Illicit Network Activities Based on Multivariate Gaussian Fitting of Multi-Scale Traffic Characteristics , 2011, 2011 IEEE International Conference on Communications (ICC).

[7]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[8]  Rami Puzis,et al.  Deployment of DNIDS in Social Networks , 2007, 2007 IEEE Intelligence and Security Informatics.

[9]  Santiago Eibe,et al.  A social network activity recommender system for ubiquitous devices , 2011, 2011 11th International Conference on Intelligent Systems Design and Applications.

[10]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[11]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..

[12]  Shah Mahmood,et al.  New Privacy Threats for Facebook and Twitter Users , 2012, 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[13]  Krishna P. Gummadi,et al.  Growth of the flickr social network , 2008, WOSN '08.

[14]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[15]  Katarzyna Musial,et al.  Multidimensional Social Network in the Social Recommender System , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[16]  George Varghese,et al.  I seek you: searching and matching individuals in social networks , 2009, WIDM.

[17]  Xiaowei Ying,et al.  Spectrum based fraud detection in social networks , 2011, ICDE.

[18]  Chris Jermaine,et al.  The Latent Community Model for Detecting Sybils in Social Networks , 2012, NDSS.