Applying Social Network Analysis to Security
In this paper, we set out to explore some of the many ways in which Social Network Analysis (SNA) can be applied to the field of security. In particular, we investigate what information someone (e.g., an attacker) could infer if they were able to gather data on a person's friend-groups or devic...
Main Authors: | , , , |
---|---|
Format: | Conference item |
Published: |
2015
|
_version_ | 1797106537966075904 |
---|---|
author | Phillips, E Nurse, J Goldsmith, M Creese, S |
author_facet | Phillips, E Nurse, J Goldsmith, M Creese, S |
author_sort | Phillips, E |
collection | OXFORD |
description | In this paper, we set out to explore some of the many ways in which Social Network Analysis (SNA) can be applied to the field of security. In particular, we investigate what information someone (e.g., an attacker) could infer if they were able to gather data on a person's friend-groups or device communications (e.g., email interactions) and whether this could be used to predict the \"hierarchical importance\" of the individual. This research could be applied to various social networks to help with criminal investigations by identifying the users with high influence within the criminal gangs on DarkWeb Forums, in order to help identify the ring-leaders of the gangs. For this study we conducted an initial investigation on the Enron email dataset, and investigated the effectiveness of existing SNA metrics in establishing hierarchy from the social network created from the email communications metadata. We then tested the metrics on a fresh dataset to assess the practicality of our results to a new network. |
first_indexed | 2024-03-07T07:01:48Z |
format | Conference item |
id | oxford-uuid:df38af53-9e86-4072-a7a8-cde4905afaf7 |
institution | University of Oxford |
last_indexed | 2024-03-07T07:01:48Z |
publishDate | 2015 |
record_format | dspace |
spelling | oxford-uuid:df38af53-9e86-4072-a7a8-cde4905afaf72022-03-29T17:19:47ZApplying Social Network Analysis to SecurityConference itemhttp://purl.org/coar/resource_type/c_5794uuid:df38af53-9e86-4072-a7a8-cde4905afaf7Department of Computer Science2015Phillips, ENurse, JGoldsmith, MCreese, SIn this paper, we set out to explore some of the many ways in which Social Network Analysis (SNA) can be applied to the field of security. In particular, we investigate what information someone (e.g., an attacker) could infer if they were able to gather data on a person's friend-groups or device communications (e.g., email interactions) and whether this could be used to predict the \"hierarchical importance\" of the individual. This research could be applied to various social networks to help with criminal investigations by identifying the users with high influence within the criminal gangs on DarkWeb Forums, in order to help identify the ring-leaders of the gangs. For this study we conducted an initial investigation on the Enron email dataset, and investigated the effectiveness of existing SNA metrics in establishing hierarchy from the social network created from the email communications metadata. We then tested the metrics on a fresh dataset to assess the practicality of our results to a new network. |
spellingShingle | Phillips, E Nurse, J Goldsmith, M Creese, S Applying Social Network Analysis to Security |
title | Applying Social Network Analysis to Security |
title_full | Applying Social Network Analysis to Security |
title_fullStr | Applying Social Network Analysis to Security |
title_full_unstemmed | Applying Social Network Analysis to Security |
title_short | Applying Social Network Analysis to Security |
title_sort | applying social network analysis to security |
work_keys_str_mv | AT phillipse applyingsocialnetworkanalysistosecurity AT nursej applyingsocialnetworkanalysistosecurity AT goldsmithm applyingsocialnetworkanalysistosecurity AT creeses applyingsocialnetworkanalysistosecurity |