Abstract

Online social networks have become an essential part of our daily life. While we are enjoying the benefits from the social networks, we are inevitably exposed to the security threats, especially the serious Advanced Persistent Threat (APT) attack. The attackers can launch targeted cyberattacks on a user by analyzing its personal information and social behaviors. Due to the wide variety of social engineering techniques and undetectable zero-day exploits being used by attackers, the detection techniques of intrusion are increasingly difficult. Motivated by the fact that the attackers usually penetrate the social network to either propagate malwares or collect sensitive information, we propose a method to assess the security risk of the user being attacked so that we can take defensive measures such as security education, training, and awareness before users are attacked. In this paper, we propose a novel user analysis model to find potential victims by analyzing a large number of users’ personal information and social behaviors in social networks. For each user, we extract three kinds of features, i.e., statistical features, social-graph features, and semantic features. These features will become the input of our user analysis model, and the security risk score will be calculated. The users with high security risk score will be alarmed so that the risk of being attacked can be reduced. We have implemented an effective user analysis model and evaluated it on a real-world dataset collected from a social network, namely, Sina Weibo (Weibo). The results show that our model can effectively assess the risk of users’ activities in social networks with a high area under the ROC curve of 0.9607.

Highlights

  • With the development of smart terminals, social networks have become part of people’s private and business communication

  • This paper makes the following contributions: (1) We propose a novel user analysis model to identify potential victims by analyzing the users’ personal information and social behaviors

  • While enjoying the convenience of social networks, users leave a large amount of personal information on social networks

Read more

Summary

Introduction

With the development of smart terminals, social networks have become part of people’s private and business communication. Researchers extract features from social network data such as users’ personal information, social behavior, relationship with friends, and message content and use machine learning algorithms to train classifiers to identify malicious messages or users. For the feature complexity of social circle, we get it by establishing a user follow graph and using hierarchical clustering method and for the feature obviousness of preference, we build a microblog topic classification system based on Google’s word2vec tool and TensorFlow framework. (1) We propose a novel user analysis model to identify potential victims by analyzing the users’ personal information and social behaviors. (2) We extract five features and classify these features into three kinds To extract these features, we design an algorithm to obtain the complexity of users’ social circle and build a microblog topic classification system to get the obviousness of users’ preference.

Related Work
Overview
Statistical Features
Social-Graph Features
The Semantic Feature
Classification Results
F5: Obvious degree of preference
Evaluation
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call