Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper)
Cyberspace attack is a persistent problem since the existing of internet. Among many attack defense measures, collecting information about the network attacker and his organization is a promising means to keep the cyberspace security. The exposing of attackers halts their further operation. To profile them, we combine these retrieved attack related information pieces to form a trace network. In this attributional trace network, distinguishing the importance of different trace information pieces will help in mining more unknown information pieces about the organizational community we care about. In this paper, we propose to adopt relevant circle to locate these more important vertices in the trace network. The algorithm first uses Depth-first search to traverse all vertices in the trace network. Then it discovers and refines relevant circles derived from this network tree, the rank score is calculated based on these relevant circles. Finally, we use the classical 911 covert network dataset to validate our approach.
KeywordsImportance rank Network attribution Relevance
This work was supported by the National Natural Science Foundation of China (No. U1736218).
- 2.Chitrapura, K.P., Kashyap, S.R.: Node ranking in labeled directed graphs. In: Thirteenth ACM International Conference on Information and Knowledge Management, pp. 597–606 (2004)Google Scholar
- 3.Dasgupta, S., Prakash, C.: Intelligent detection of influential nodes in networks. In: International Conference on Electrical, Electronics, and Optimization Techniques (2016)Google Scholar
- 6.Halappanavar, M., Sathanur, A.V., Nandi, A.K.: Accelerating the mining of influential nodes in complex networks through community detection, pp. 64–71 (2016)Google Scholar
- 7.Krebs, V.E.: Mapping networks of terrorist cells, pp. 43–52 (2002)Google Scholar
- 9.Memon, B.R.: Identifying important nodes in weighted covert networks using generalized centrality measures. In: Intelligence and Security Informatics Conference, pp. 131–140 (2012)Google Scholar
- 11.Singer, P.W.: Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press, Oxford (2014)Google Scholar
- 12.Taha, K., Yoo, P.D.: SIIMCO: a forensic investigation tool for identifying the influential members of a criminal organization. IEEE Trans. Inf. Forensics Secur. 11(4), 811–822 (2016)Google Scholar
- 13.Taha, K., Yoo, P.D.: Using the spanning tree of a criminal network for identifying its leaders. IEEE Trans. Inf. Forensics Secur. PP(99), 1 (2017)Google Scholar
- 14.Wiil, U.K., Gniadek, J., Memon, N.: Measuring link importance in terrorist networks. In: International Conference on Advances in Social Networks Analysis and Mining, pp. 225–232 (2010)Google Scholar
- 15.Xu, J., Yun, X., Zhang, Y., Sang, Y., Cheng, Z.: NetworkTrace: probabilistic relevant pattern recognition approach to attribution trace analysis. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 691–698, August 2017. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.301