Abstract

This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented. Basic methods of graph theory and data mining, that deals with social networks analysis are described. Typical security tasks of social network analysis, such as community detection in network, detection of leaders in communities, detection experts in networks, clustering text information and others are considered.

Highlights

  • The use of the Internet social networks makes it possible to communicate with old friends, make new acquaintances, express their thoughts on a very wide audience, join groups of interest

  • The interest of researchers relates to the fact that it provides a new set of explanatory models and analytical tools that are outside the ordinary quantitative methods

  • This article presents a consist overview of main social network analysis (SNA) methods, which are used for information security

Read more

Summary

Introduction

The use of the Internet social networks makes it possible to communicate with old friends, make new acquaintances, express their thoughts on a very wide audience, join groups of interest. The sensitive geopolitical context, the rise of cyberattacks and major data breaches and hacks, as well as the global insurgency of violent extremism and radicalization have led many countries to the adoption of security measures and counterterrorism laws that have increased scrutiny and restrictions on the participation of societal actors [87]. In this case many countries in the world create the National Cyber Security Centres and Cyber Security Strategy Documents [68, 69, 89, 97]. The basic directions for studies in the field of social networks security are given; at the moment the most popular computer social networking are described; main methods and algorithms used in various network analysis models are briefly presented; primary approaches to network analysis are shown; some typical tasks of social network analysis are given

Social networking sites
Threats in social networks
Monitoring and analysis of social networks
Some possible approaches to social networks analysis
Graph analysis
Data mining
Social network analysis and communities interest
Community detection in network
Stability analysis of community
Detection of leaders in communities
Detection experts in networks
Evolution in dynamic social networks
Links prediction
Clustering text information based on the frequency analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call