Introduction
Download
Report
Transcript Introduction
Analyzing and Securing
Social Networks
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
Introduction to the Course
August 28 – December 4, 2015
Objective of the Unit
This unit provides an overview of the course. The course describes
concepts, developments, challenges, and directions in analyzing
social networks and securing social networks
Recommended Book for first part of the course:
Social Networks and the Semantic Web by Peter Mika,
Springer 2007
Focus for second part of the course
- Selected papers
on Analyzing and Securing Social Networks
from the ACM/IEEE ASONAM Conferences 2009-2015
Outline of the Unit
Outline of Course
Course Work
Course Rules
Contact
Appendix
Course Work
Two term papers; each worth 8 points
Due: Oct 2, Nov 20
Two exams each worth 24 points
- Oct 16, Dec 11
Programming project worth 16 points
- Due: Dec 4
Four homework assignments each worth 5 points
Due: Sept 25, Oct 9, Oct 30, Nov 13
Total 100 points
Tentative Schedule
August 28 – Introduction, Cyber Security Summary
September 4 – Semantic Web, Data and Applications Security
September 11 – Social Networks using Semantic Web, XML Security
September 18 – Secure Services and Cloud, Assured Information Sharing in
the Cloud
September 25 - Security and Privacy for Social Networks, Location aware
social networks
October 2 – Guest Lecture, Presentations on Projects
October 9 – Attacks on social networks, Review for Exam #1
October 16 – Exam #1
October 23 – November 20 – Paper presentations (ASONAM Conference
proceedings 2009-2015)
December 4 – Project Presentations, Review for Exam #2
Exam #2 – As scheduled in Course book.
Additional Topics
Chapters from the book by Peter Mika (semantic web for social media)
- Additional Topics: XML Security, Location mining in social networks.
-
Assignment #1: Given 9/11/2015; Due: 9/25/2015
Describe how Semantic Web Technologies may be used to
represent and reason about Social Networks.
Describe with examples how Data Mining techniques may be
used to analyze social networks.
Papers to Read for Exam #1
Satyen Abrol, Latifur Khan: Tweethood: Agglomerative Clustering on Fuzzy
k-Closest Friends with Variable Depth for Location Mining.
SocialCom/PASSAT 2010: 153-160
Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham,
Amar Gupta: Selective and Authentic Third-Party Distribution of XML
Documents. IEEE Trans. Knowl. Data Eng. 16(10): 1263-1278 (2004) (upto
section 6)
Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu,
Bhavani M. Thuraisingham: A semantic web based framework for social
network access control. SACMAT 2009: 177-186
Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham:
Preventing Private Information Inference Attacks on Social Networks. IEEE
Trans. Knowl. Data Eng. 25(8): 1849-1862 (2013)
Papers to Read for Exam #1
Following papers on Access Control
- RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein,
Charles E. Youman: Role-Based Access Control Models. IEEE
Computer 29(2): 38-47 (1996)
- UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage
control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004)
- Read the first 20 pages (sections 1, 2, 3)
- DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multidimensional Characterization of Dissemination Control. POLICY
2004: 197-200 (IEEE)
Privacy: Rakesh Agrawal, Ramakrishnan Srikant: Privacy-
Preserving Data Mining. SIGMOD Conference 2000: 439-450
Index to Lectures
Lecture 1: Intro to social networks
Lecture 2: Cyber Security
Lecture 3: Data and Applications Security
Lecture 4: Semantic Web
Lecture 5: XML Security
Lecture 6: Semantic Web and Social Networks
Lecture 7: Web Data and Semantics in Social Network Applications
Lecture 8: Secure Cloud Computing
Lecture 9: Security and Privacy in Social Networks
Lecture 10: Cloud-based Assured Information Sharing
Lecture 11: Introduction to SOA, Cloud Computing and Secure Cloud
Lecture 12: Privacy
Lecture 13: Location Mining
Lecture 14: Guest Lecture
Lecture 15: Attacks on Social Media
Course Rules
Course attendance is mandatory; unless permission is obtained
from instructor for missing a class with a valid reason
(documentation needed for medical emergency for student or a
close family member – e.g., spouse, parent, child). Attendance will
be collected every lecture. 3 points will be deducted out of 100 for
each lecture missed without approval.
Each student will work individually
Late assignments will not be accepted. All assignments have to be
turned in just after the lecture on the due date
No make up exams unless student can produce a medical certificate
or give evidence of close family emergency
Copying material from other sources will not be permitted unless the
source is properly referenced
Any student who plagiarizes from other sources and/or cheats will
be reported to the appropriate UTD authorities
Contact
For more information please contact
- Dr. Bhavani Thuraisingham
- Professor of Computer Science and
- Director of Cyber Security Research Center Erik Jonsson School
of Engineering and Computer Science EC31, The University of
Texas at Dallas Richardson, TX 75080
- Phone: 972-883-4738
- Fax: 972-883-2399
- Email: [email protected]
- URL:http://www.utdallas.edu/~bxt043000/
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2009
(ASONAM)
Papers to Read for presentations
Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian
Perrig, Hung-Min Sun:
A Trustable Reputation Scheme Based on Private
Relationships. 19-24
David Kinzel, Micah Klettke, Paul Uppal, Naheed Visram,
Keivan Kianmehr, Reda Alhajj, Jon G. Rokne:
The Economic Benefits of Web Mining. 25-32
Jiyang Chen, Osmar R. Zaïane, Randy Goebel:
Local Community Identification in Social Networks. 237-242
Frank Nagle, Lisa Singh:
Can Friends Be Trusted? Exploring Privacy in Online Social
Networks. 312-315
Papers to Read for presentations
Nico Schlitter, Tanja Falkowski:
Mining the Dynamics of Music Preferences from a Social
Networking Site. 243-248
Joseph Bonneau, Jonathan Anderson, George Danezis:
Prying Data out of a Social Network. 249-254
Petros Xanthopoulos, Ashwin Arulselvan, Vladimir Boginski,
Panos M. Pardalos:
A Retrospective Review of Social Networks. 300-305
Sampson Pun, Amir H. Chinaei, Ken Barker:
Twins (1): Extending SQL to Support Corporation Privacy
Policies in Social Networks. 306-311
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2010
(ASONAM)
Papers to Read for presentations
Lyta Penna, Andrew Clark, George M. Mohay:
A Framework for Improved Adolescent and Child Safety in
MMOs. 33-40
B. K. Tripathy, G. K. Panda:
A New Approach to Manage Security against Neighborhood
Attacks in Social Networks. 264-269
Pål Roe Sundsøy, Johannes Bjelland, Geoffrey Canright,
Kenth Engø-Monsen, Rich Ling:
Product Adoption Networks and Their Growth in a Large
Mobile Phone Network. 208-216
Papers to Read for presentations
M. Saravanan, Garigipati Prasad, Karishma Surana, D.
Suganthi:
Labeling Communities Using Structural Properties. 217-224
Uffe Kock Wiil, Jolanta Gniadek, Nasrullah Memon:
Measuring Link Importance in Terrorist Networks. 225-232
Thomas Couronné, Alina Stoica, Jean-Samuel Beuscart:
Online Social Network Popularity Evolution: An Additive
Mixture Model. 346-350
M. Omair Shafiq, Reda Alhajj, Jon G. Rokne:
Community Aware Personalized Web Search. 351-355
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2011
(ASONAM)
Papers to Read for presentations
Bruce M. Kapron, Gautam Srivastava, S. Venkatesh:
Social Network Anonymization via Edge Addition. 155-162
Guido Barbian:
Assessing Trust by Disclosure in Online Social Networks. 163-170
Mohammad A. Tayebi, Laurens Bakker, Uwe Glässer, Vahid
Dabbaghian:
Locating Central Actors in Co-offending Networks. 171-179
Hsin-Chang Yang, Chung-Hong Lee:
Post-Level Spam Detection for Social Bookmarking Web Sites. 180185
Sean Chester, Gautam Srivastava:
Social Network Privacy for Attribute Disclosure Attacks. 445-449
Papers to Read for presentations
Kyung Soo Cho, Jae Yoel Yoon, Iee Joon Kim, Ji Yeon Lim, Seung
Kwan Kim, Ung-Mo Kim:
Mining Information of Anonymous User on a Social Network Service.
450-453
Jenq-Haur Wang, Ming-Sheng Lin:
Using Inter-comment Similarity for Comment Spam Detection in
Chinese Blogs. 189-194
Ruaylong Lee, Roozbeh Nia, Jason Hsu, Karl N. Levitt, Jeff Rowe,
Shyhtsun Felix Wu, Shaozhi Ye:
Design and Implementation of FAITH, An Experimental System to
Intercept and Manipulate Online Social Informatics. 195-202
Koji Maruhashi, Fan Guo, Christos Faloutsos:
MultiAspectForensics: Pattern Mining on Large-Scale
Heterogeneous Networks with Tensor Analysis. 203-210
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2012
(ASONAM)
Papers to Read for presentations
Anna Leontjeva, Konstantin Tretyakov, Jaak Vilo, Taavi Tamkivi:
Fraud Detection: Methods of Analysis for Hypergraph Data. 10601064
Anshu Malhotra, Luam C. Totti, Wagner Meira Jr., Ponnurangam
Kumaraguru, Virgilio Almeida:
Studying User Footprints in Different Online Social Networks. 10651070
Mauro Conti, Radha Poovendran, Marco Secchiero:
FakeBook: Detecting Fake Profiles in On-Line Social Networks. 10711078
Ali Nazemian, Hoda Gholami, Fattaneh Taghiyareh:
An Improved Model of Trust-aware Recommender Systems Using
Distrust Metric. 1079-1084
Papers to Read for presentations
Yue Wang, Xintao Wu, Jun Zhu, Yang Xiang:
On Learning Cluster Coefficient of Private Networks. 395-402
Evangelos E. Papalexakis, Alex Beutel, Peter Steenkiste:
Network Anomaly Detection Using Co-clustering. 403-410
Christine Task, Chris Clifton:
A Guide to Differential Privacy Theory in Social Network Analysis. 411-417
Sean Chester, Jared Gaertner, Ulrike Stege, S. Venkatesh:
Anonymizing Subsets of Social Networks with Degree Constrained
Subgraphs. 418-422
Maria Eleni Skarkala, Manolis Maragoudakis, Stefanos Gritzalis, Lilian Mitrou,
Hannu Toivonen, Pirjo Moen:
Privacy Preservation by k-Anonymization of Weighted Social Networks. 423428
Özgür Kafali, Akin Günay, Pinar Yolum:
PROTOSS: A Run Time Tool for Detecting Privacy Violations in Online Social
Networks. 429-433
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2015
(ASONAM)
Papers to Read for presentations
Private Location Based Infiltration Attack Detection in Social
Networks Bogdan Carbunar, Rahul Potharaju, Mozhgan
Azimpourkivi and Debra Davis
Mining Streaming Tweets for Real-Time Event Credibility Prediction
in Twitter Jun Zou, Faramarz Fekri and Steven McLaughlin
Signed Social Networks: Link Prediction and Overlapping
Community Detection , Mohsen Shahriari and Ralf Klamma
Privacy Preservation in Social networks through alpha –
anonymization techniques Saptarshi Chakraborty and Bala Krushna
Tripathy
Mining Streaming Tweets for Real-Time Event Credibility Prediction
in Twitter Jun Zou, Faramarz Fekri and Steven McLaughlin
Opinion Mining in Twitter ~How to Make Use of Sarcasm to Enhance
Sentiment Analysis~ Mondher Bouazizi and Tomoaki Ohtsuki
Papers to Read for presentations
Mood Prediction in Social Media
Mahnaz Roshanaei, Richard Han and Shivakant Mishra
Multi-Level Anomaly Detection on Time-Varying Graph Data
Robert Bridges, John Collins, Erik Ferragut, Jason Laska and Blair
D. Sullivan
Trust Inference in Online Social Networks
Athanasios Papaoikonomou, Magdalini Kardara and Theodora
Varvarigou
Differentially Private Publication of Social Graphs at Linear Cost
Huu-Hiep Nguyen, Abdessamad Imine and Michael Rusinowitch
Social Network Analysis of Program Committees and Paper
Acceptance Fairness Chen Avin, Zvi Lotker, David Peleg and Itzik
Turkel
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2014
(ASONAM)
Papers to Read for presentations
A fuzzy clustering algorithm to detect criminals without prior
information (Regular) Changjun Fan, Kaiming Xiao, Baoxin Xiu, and
Guodong Lv
Towards Understanding Cyberbullying Behavior in a Semi-
Anonymous Social Network (Regular) Homa Hosseinmardi, Amir
Ghasemianlangroodi, Richard Han, Qin Lv, and Shivakant Mishra
Measuring UK Crime Gangs (Short) Giles Oatley and Tom Crick
MOSAIC: Criminal Network Analysis for Multi-Modal Surveillance
and Decision Support (Short) Patrick Seidler, Richard Adderley, Atta
Badii, and Matteo Raffaelli
Towards Online Anti-Opinion Spam: Spotting Fake Reviews from the
Review Sequence (Short) Yuming Lin, Tao Zhu, Hao Wu, Jinwei
Zhang, Xiaoling Wang, and Aoying Zhou
Papers to Read for presentations
SSRM: Structural Social Role Mining for Dynamic Social Networks
(Regular) Afra Abnar, Mansoureh Takaffoli, Reihaneh Rabbany, and
Osmar Zaiane
Bio-Inspired Models for Characterizing YouTube View-Count
(Regular) Cedric Richier, Eitan Altman, Rachid El-Azouzi, Tania
Jimenez, Georges Linares, and Yonathan Portilla
A Semantic Model for Academic Social Network Analysis (Short) Jie
Hu, Mengchi Liu, and Junchi Zhang
Data-Mining Twitter and the Autism Spectrum Disorder: A Pilot
Study (Regular) Adham Beykikhoshk, Ognjen Arandjelovic, Dinh
Phung, Svetha Venkatesh, and Terry Caelli
On the endogenesis of Twitters Spritzer and Gardenhose sample
streams (Regular) Dennis Kergl, Robert Roedler, and Sebastian
Seeber
Papers to Read for presentations
IEEE/ACM Joint
Conference
Advances in Social
Network Analysis
and Mining, 2013
(ASONAM)
Papers to Read for presentations
Tianqing Zhu, Gang Li, Yongli Ren, Wanlei Zhou and Ping Xiong.
Differential Privacy for Neighborhood-based Collaborative Filtering
Nam Nguyen, Md Abdul Alim, Yilin Shen and My Thai. Assessing
network vulnerability in a community structure point of view
Benjamin C. M. Fung, Yan'An Jin and Jiaming Li. Preserving Privacy
and Frequent Sharing Patterns for Social Network Data Publishing
Sajid Bhat and Muhammad Abulaish. Community-Based Features for
Identifying Spammers in Online Social Networks
Nagarajan Natarajan, Prithviraj Sen and Vineet Chaoji. Community
Detection in Content-Sharing Social Networks