Abstract
The rise of the Internet accelerates the creation of various large-scale online social networks. The online social networks have brought considerable attention as an important medium for the information diffusion model, which can be described the relationships and activities among human beings. The online social networks' relationships in the real world are too big to present with useful information to identify the criminal or cyber attacks. The methodology for information security analysis was proposed with the complementary of Cluster Algorithm and Social Network Analysis, which presented anomaly and cyber attack patterns in online social networks and visualized the influencing nodes of such anomaly and cyber attacks. The closet vertices of influencing nodes could not avoid from the harmfulness in social networking. The new proposed information security analysis methodology and results were significance analysis and could be applied as a guide for further investigate of social network behavior to improve the security model and notify the risk, computer viruses or cyber attacks for online social networks in advance.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Computer Network and Information Security
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.