Introduction

Download Report

Transcript Introduction

Analyzing and Securing
Social Networks
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
Introduction to the Course
August 28 – December 4, 2015
Objective of the Unit
 This unit provides an overview of the course. The course describes
concepts, developments, challenges, and directions in analyzing
social networks and securing social networks
 Recommended Book for first part of the course:
 Social Networks and the Semantic Web by Peter Mika,
Springer 2007
 Focus for second part of the course
- Selected papers
on Analyzing and Securing Social Networks
from the ACM/IEEE ASONAM Conferences 2009-2015
Outline of the Unit
 Outline of Course
 Course Work
 Course Rules
 Contact
 Appendix
Course Work
 Two term papers; each worth 8 points
 Due: Oct 2, Nov 20
 Two exams each worth 24 points
- Oct 16, Dec 11
 Programming project worth 16 points
- Due: Dec 4
 Four homework assignments each worth 5 points
 Due: Sept 25, Oct 9, Oct 30, Nov 13
 Total 100 points
Tentative Schedule
 August 28 – Introduction, Cyber Security Summary
 September 4 – Semantic Web, Data and Applications Security
 September 11 – Social Networks using Semantic Web, XML Security
 September 18 – Secure Services and Cloud, Assured Information Sharing in








the Cloud
September 25 - Security and Privacy for Social Networks, Location aware
social networks
October 2 – Guest Lecture, Presentations on Projects
October 9 – Attacks on social networks, Review for Exam #1
October 16 – Exam #1
October 23 – November 20 – Paper presentations (ASONAM Conference
proceedings 2009-2015)
December 4 – Project Presentations, Review for Exam #2
Exam #2 – As scheduled in Course book.
Additional Topics
Chapters from the book by Peter Mika (semantic web for social media)
- Additional Topics: XML Security, Location mining in social networks.
-
Assignment #1: Given 9/11/2015; Due: 9/25/2015
 Describe how Semantic Web Technologies may be used to
represent and reason about Social Networks.
 Describe with examples how Data Mining techniques may be
used to analyze social networks.
Papers to Read for Exam #1
 Satyen Abrol, Latifur Khan: Tweethood: Agglomerative Clustering on Fuzzy
k-Closest Friends with Variable Depth for Location Mining.
SocialCom/PASSAT 2010: 153-160
 Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham,
Amar Gupta: Selective and Authentic Third-Party Distribution of XML
Documents. IEEE Trans. Knowl. Data Eng. 16(10): 1263-1278 (2004) (upto
section 6)
 Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu,
Bhavani M. Thuraisingham: A semantic web based framework for social
network access control. SACMAT 2009: 177-186
 Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham:
Preventing Private Information Inference Attacks on Social Networks. IEEE
Trans. Knowl. Data Eng. 25(8): 1849-1862 (2013)
Papers to Read for Exam #1
 Following papers on Access Control
- RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein,
Charles E. Youman: Role-Based Access Control Models. IEEE
Computer 29(2): 38-47 (1996)
- UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage
control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004)
- Read the first 20 pages (sections 1, 2, 3)
- DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multidimensional Characterization of Dissemination Control. POLICY
2004: 197-200 (IEEE)
 Privacy: Rakesh Agrawal, Ramakrishnan Srikant: Privacy-
Preserving Data Mining. SIGMOD Conference 2000: 439-450
Index to Lectures
 Lecture 1: Intro to social networks
 Lecture 2: Cyber Security
 Lecture 3: Data and Applications Security
 Lecture 4: Semantic Web
 Lecture 5: XML Security
 Lecture 6: Semantic Web and Social Networks
 Lecture 7: Web Data and Semantics in Social Network Applications
 Lecture 8: Secure Cloud Computing
 Lecture 9: Security and Privacy in Social Networks
 Lecture 10: Cloud-based Assured Information Sharing
 Lecture 11: Introduction to SOA, Cloud Computing and Secure Cloud
 Lecture 12: Privacy
 Lecture 13: Location Mining
 Lecture 14: Guest Lecture
 Lecture 15: Attacks on Social Media
Course Rules
 Course attendance is mandatory; unless permission is obtained
from instructor for missing a class with a valid reason
(documentation needed for medical emergency for student or a
close family member – e.g., spouse, parent, child). Attendance will
be collected every lecture. 3 points will be deducted out of 100 for
each lecture missed without approval.
 Each student will work individually
 Late assignments will not be accepted. All assignments have to be
turned in just after the lecture on the due date
 No make up exams unless student can produce a medical certificate
or give evidence of close family emergency
 Copying material from other sources will not be permitted unless the
source is properly referenced
 Any student who plagiarizes from other sources and/or cheats will
be reported to the appropriate UTD authorities
Contact
 For more information please contact
- Dr. Bhavani Thuraisingham
- Professor of Computer Science and
- Director of Cyber Security Research Center Erik Jonsson School
of Engineering and Computer Science EC31, The University of
Texas at Dallas Richardson, TX 75080
- Phone: 972-883-4738
- Fax: 972-883-2399
- Email: [email protected]
- URL:http://www.utdallas.edu/~bxt043000/
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2009
(ASONAM)
Papers to Read for presentations
 Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian
Perrig, Hung-Min Sun:
A Trustable Reputation Scheme Based on Private
Relationships. 19-24
 David Kinzel, Micah Klettke, Paul Uppal, Naheed Visram,
Keivan Kianmehr, Reda Alhajj, Jon G. Rokne:
The Economic Benefits of Web Mining. 25-32
 Jiyang Chen, Osmar R. Zaïane, Randy Goebel:
Local Community Identification in Social Networks. 237-242
 Frank Nagle, Lisa Singh:
Can Friends Be Trusted? Exploring Privacy in Online Social
Networks. 312-315
Papers to Read for presentations
 Nico Schlitter, Tanja Falkowski:
Mining the Dynamics of Music Preferences from a Social
Networking Site. 243-248
 Joseph Bonneau, Jonathan Anderson, George Danezis:
Prying Data out of a Social Network. 249-254
 Petros Xanthopoulos, Ashwin Arulselvan, Vladimir Boginski,
Panos M. Pardalos:
A Retrospective Review of Social Networks. 300-305
 Sampson Pun, Amir H. Chinaei, Ken Barker:
Twins (1): Extending SQL to Support Corporation Privacy
Policies in Social Networks. 306-311
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2010
(ASONAM)
Papers to Read for presentations
 Lyta Penna, Andrew Clark, George M. Mohay:
A Framework for Improved Adolescent and Child Safety in
MMOs. 33-40
 B. K. Tripathy, G. K. Panda:
A New Approach to Manage Security against Neighborhood
Attacks in Social Networks. 264-269
 Pål Roe Sundsøy, Johannes Bjelland, Geoffrey Canright,
Kenth Engø-Monsen, Rich Ling:
Product Adoption Networks and Their Growth in a Large
Mobile Phone Network. 208-216
Papers to Read for presentations
 M. Saravanan, Garigipati Prasad, Karishma Surana, D.
Suganthi:
Labeling Communities Using Structural Properties. 217-224
 Uffe Kock Wiil, Jolanta Gniadek, Nasrullah Memon:
Measuring Link Importance in Terrorist Networks. 225-232
 Thomas Couronné, Alina Stoica, Jean-Samuel Beuscart:
Online Social Network Popularity Evolution: An Additive
Mixture Model. 346-350
 M. Omair Shafiq, Reda Alhajj, Jon G. Rokne:
Community Aware Personalized Web Search. 351-355
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2011
(ASONAM)
Papers to Read for presentations
 Bruce M. Kapron, Gautam Srivastava, S. Venkatesh:
Social Network Anonymization via Edge Addition. 155-162
 Guido Barbian:
Assessing Trust by Disclosure in Online Social Networks. 163-170
 Mohammad A. Tayebi, Laurens Bakker, Uwe Glässer, Vahid
Dabbaghian:
Locating Central Actors in Co-offending Networks. 171-179
 Hsin-Chang Yang, Chung-Hong Lee:
Post-Level Spam Detection for Social Bookmarking Web Sites. 180185
 Sean Chester, Gautam Srivastava:
Social Network Privacy for Attribute Disclosure Attacks. 445-449
Papers to Read for presentations
 Kyung Soo Cho, Jae Yoel Yoon, Iee Joon Kim, Ji Yeon Lim, Seung
Kwan Kim, Ung-Mo Kim:
Mining Information of Anonymous User on a Social Network Service.
450-453
 Jenq-Haur Wang, Ming-Sheng Lin:
Using Inter-comment Similarity for Comment Spam Detection in
Chinese Blogs. 189-194
 Ruaylong Lee, Roozbeh Nia, Jason Hsu, Karl N. Levitt, Jeff Rowe,
Shyhtsun Felix Wu, Shaozhi Ye:
Design and Implementation of FAITH, An Experimental System to
Intercept and Manipulate Online Social Informatics. 195-202
 Koji Maruhashi, Fan Guo, Christos Faloutsos:
MultiAspectForensics: Pattern Mining on Large-Scale
Heterogeneous Networks with Tensor Analysis. 203-210
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2012
(ASONAM)
Papers to Read for presentations
 Anna Leontjeva, Konstantin Tretyakov, Jaak Vilo, Taavi Tamkivi:
Fraud Detection: Methods of Analysis for Hypergraph Data. 10601064
 Anshu Malhotra, Luam C. Totti, Wagner Meira Jr., Ponnurangam
Kumaraguru, Virgilio Almeida:
Studying User Footprints in Different Online Social Networks. 10651070
 Mauro Conti, Radha Poovendran, Marco Secchiero:
FakeBook: Detecting Fake Profiles in On-Line Social Networks. 10711078
 Ali Nazemian, Hoda Gholami, Fattaneh Taghiyareh:
An Improved Model of Trust-aware Recommender Systems Using
Distrust Metric. 1079-1084
Papers to Read for presentations
 Yue Wang, Xintao Wu, Jun Zhu, Yang Xiang:
On Learning Cluster Coefficient of Private Networks. 395-402
 Evangelos E. Papalexakis, Alex Beutel, Peter Steenkiste:
Network Anomaly Detection Using Co-clustering. 403-410
 Christine Task, Chris Clifton:
A Guide to Differential Privacy Theory in Social Network Analysis. 411-417
 Sean Chester, Jared Gaertner, Ulrike Stege, S. Venkatesh:
Anonymizing Subsets of Social Networks with Degree Constrained
Subgraphs. 418-422
 Maria Eleni Skarkala, Manolis Maragoudakis, Stefanos Gritzalis, Lilian Mitrou,
Hannu Toivonen, Pirjo Moen:
Privacy Preservation by k-Anonymization of Weighted Social Networks. 423428
 Özgür Kafali, Akin Günay, Pinar Yolum:
PROTOSS: A Run Time Tool for Detecting Privacy Violations in Online Social
Networks. 429-433
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2015
(ASONAM)
Papers to Read for presentations
 Private Location Based Infiltration Attack Detection in Social
Networks Bogdan Carbunar, Rahul Potharaju, Mozhgan
Azimpourkivi and Debra Davis
 Mining Streaming Tweets for Real-Time Event Credibility Prediction
in Twitter Jun Zou, Faramarz Fekri and Steven McLaughlin
 Signed Social Networks: Link Prediction and Overlapping
Community Detection , Mohsen Shahriari and Ralf Klamma
 Privacy Preservation in Social networks through alpha –
anonymization techniques Saptarshi Chakraborty and Bala Krushna
Tripathy
 Mining Streaming Tweets for Real-Time Event Credibility Prediction
in Twitter Jun Zou, Faramarz Fekri and Steven McLaughlin
 Opinion Mining in Twitter ~How to Make Use of Sarcasm to Enhance
Sentiment Analysis~ Mondher Bouazizi and Tomoaki Ohtsuki
Papers to Read for presentations
 Mood Prediction in Social Media
Mahnaz Roshanaei, Richard Han and Shivakant Mishra
 Multi-Level Anomaly Detection on Time-Varying Graph Data
Robert Bridges, John Collins, Erik Ferragut, Jason Laska and Blair
D. Sullivan
 Trust Inference in Online Social Networks
Athanasios Papaoikonomou, Magdalini Kardara and Theodora
Varvarigou
 Differentially Private Publication of Social Graphs at Linear Cost
Huu-Hiep Nguyen, Abdessamad Imine and Michael Rusinowitch
 Social Network Analysis of Program Committees and Paper
Acceptance Fairness Chen Avin, Zvi Lotker, David Peleg and Itzik
Turkel
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2014
(ASONAM)
Papers to Read for presentations
 A fuzzy clustering algorithm to detect criminals without prior
information (Regular) Changjun Fan, Kaiming Xiao, Baoxin Xiu, and
Guodong Lv
 Towards Understanding Cyberbullying Behavior in a Semi-
Anonymous Social Network (Regular) Homa Hosseinmardi, Amir
Ghasemianlangroodi, Richard Han, Qin Lv, and Shivakant Mishra
 Measuring UK Crime Gangs (Short) Giles Oatley and Tom Crick
 MOSAIC: Criminal Network Analysis for Multi-Modal Surveillance
and Decision Support (Short) Patrick Seidler, Richard Adderley, Atta
Badii, and Matteo Raffaelli
 Towards Online Anti-Opinion Spam: Spotting Fake Reviews from the
Review Sequence (Short) Yuming Lin, Tao Zhu, Hao Wu, Jinwei
Zhang, Xiaoling Wang, and Aoying Zhou
Papers to Read for presentations
 SSRM: Structural Social Role Mining for Dynamic Social Networks
(Regular) Afra Abnar, Mansoureh Takaffoli, Reihaneh Rabbany, and
Osmar Zaiane
 Bio-Inspired Models for Characterizing YouTube View-Count
(Regular) Cedric Richier, Eitan Altman, Rachid El-Azouzi, Tania
Jimenez, Georges Linares, and Yonathan Portilla
 A Semantic Model for Academic Social Network Analysis (Short) Jie
Hu, Mengchi Liu, and Junchi Zhang
 Data-Mining Twitter and the Autism Spectrum Disorder: A Pilot
Study (Regular) Adham Beykikhoshk, Ognjen Arandjelovic, Dinh
Phung, Svetha Venkatesh, and Terry Caelli
 On the endogenesis of Twitters Spritzer and Gardenhose sample
streams (Regular) Dennis Kergl, Robert Roedler, and Sebastian
Seeber
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2013
(ASONAM)
Papers to Read for presentations
 Tianqing Zhu, Gang Li, Yongli Ren, Wanlei Zhou and Ping Xiong.
Differential Privacy for Neighborhood-based Collaborative Filtering
 Nam Nguyen, Md Abdul Alim, Yilin Shen and My Thai. Assessing
network vulnerability in a community structure point of view
 Benjamin C. M. Fung, Yan'An Jin and Jiaming Li. Preserving Privacy
and Frequent Sharing Patterns for Social Network Data Publishing
 Sajid Bhat and Muhammad Abulaish. Community-Based Features for
Identifying Spammers in Online Social Networks
 Nagarajan Natarajan, Prithviraj Sen and Vineet Chaoji. Community
Detection in Content-Sharing Social Networks