Visible to the public Biblio

Filters: Keyword is Key nodes  [Clear All Filters]
2023-06-02
Nikoletos, Sotirios, Raftopoulou, Paraskevi.  2022.  Employing social network analysis to dark web communities. 2022 IEEE International Conference on Cyber Security and Resilience (CSR). :311—316.

Deep web refers to sites that cannot be found by search engines and makes up the 96% of the digital world. The dark web is the part of the deep web that can only be accessed through specialised tools and anonymity networks. To avoid monitoring and control, communities that seek for anonymization are moving to the dark web. In this work, we scrape five dark web forums and construct five graphs to model user connections. These networks are then studied and compared using data mining techniques and social network analysis tools; for each community we identify the key actors, we study the social connections and interactions, we observe the small world effect, and we highlight the type of discussions among the users. Our results indicate that only a small subset of users are influential, while the rapid dissemination of information and resources between users may affect behaviours and formulate ideas for future members.

2022-08-26
Yao, Jiaxin, Lin, Bihai, Huang, Ruiqi, Fan, Junyi, Chen, Biqiong, Liu, Yanhua.  2021.  Node Importance Evaluation Method for Cyberspace Security Risk Control. :127—131.
{With the rapid development of cyberspace, cyber security incidents are increasing, and the means and types of network attacks are becoming more and more complex and refined, which brings greater challenges to security risk control. First, the knowledge graph technology is used to construct a cyber security knowledge graph based on ontology to realize multi-source heterogeneous security big data fusion calculation, and accurately express the complex correlation between different security entities. Furthermore, for cyber security risk control, a key node assessment method for security risk diffusion is proposed. From the perspectives of node communication correlation and topological level, the calculation method of node communication importance based on improved PageRank Algorithm and based on the improved K-shell Algorithm calculates the importance of node topology are studied, and then organically combine the two calculation methods to calculate the importance of different nodes in security risk defense. Experiments show that this method can evaluate the importance of nodes more accurately than the PageRank algorithm and the K-shell algorithm.