Applying Social Network Analysis to Security

In this paper, we set out to explore some of the many ways in which Social Network Analysis (SNA) can be applied to the field of security. In particular, we investigate what information someone (e.g., an attacker) could infer if they were able to gather data on a person's friend-groups or devic...

Full description

Bibliographic Details
Main Authors: Phillips, E, Nurse, J, Goldsmith, M, Creese, S
Format: Conference item
Published: 2015
_version_ 1797106537966075904
author Phillips, E
Nurse, J
Goldsmith, M
Creese, S
author_facet Phillips, E
Nurse, J
Goldsmith, M
Creese, S
author_sort Phillips, E
collection OXFORD
description In this paper, we set out to explore some of the many ways in which Social Network Analysis (SNA) can be applied to the field of security. In particular, we investigate what information someone (e.g., an attacker) could infer if they were able to gather data on a person's friend-groups or device communications (e.g., email interactions) and whether this could be used to predict the \"hierarchical importance\" of the individual. This research could be applied to various social networks to help with criminal investigations by identifying the users with high influence within the criminal gangs on DarkWeb Forums, in order to help identify the ring-leaders of the gangs. For this study we conducted an initial investigation on the Enron email dataset, and investigated the effectiveness of existing SNA metrics in establishing hierarchy from the social network created from the email communications metadata. We then tested the metrics on a fresh dataset to assess the practicality of our results to a new network.
first_indexed 2024-03-07T07:01:48Z
format Conference item
id oxford-uuid:df38af53-9e86-4072-a7a8-cde4905afaf7
institution University of Oxford
last_indexed 2024-03-07T07:01:48Z
publishDate 2015
record_format dspace
spelling oxford-uuid:df38af53-9e86-4072-a7a8-cde4905afaf72022-03-29T17:19:47ZApplying Social Network Analysis to SecurityConference itemhttp://purl.org/coar/resource_type/c_5794uuid:df38af53-9e86-4072-a7a8-cde4905afaf7Department of Computer Science2015Phillips, ENurse, JGoldsmith, MCreese, SIn this paper, we set out to explore some of the many ways in which Social Network Analysis (SNA) can be applied to the field of security. In particular, we investigate what information someone (e.g., an attacker) could infer if they were able to gather data on a person's friend-groups or device communications (e.g., email interactions) and whether this could be used to predict the \"hierarchical importance\" of the individual. This research could be applied to various social networks to help with criminal investigations by identifying the users with high influence within the criminal gangs on DarkWeb Forums, in order to help identify the ring-leaders of the gangs. For this study we conducted an initial investigation on the Enron email dataset, and investigated the effectiveness of existing SNA metrics in establishing hierarchy from the social network created from the email communications metadata. We then tested the metrics on a fresh dataset to assess the practicality of our results to a new network.
spellingShingle Phillips, E
Nurse, J
Goldsmith, M
Creese, S
Applying Social Network Analysis to Security
title Applying Social Network Analysis to Security
title_full Applying Social Network Analysis to Security
title_fullStr Applying Social Network Analysis to Security
title_full_unstemmed Applying Social Network Analysis to Security
title_short Applying Social Network Analysis to Security
title_sort applying social network analysis to security
work_keys_str_mv AT phillipse applyingsocialnetworkanalysistosecurity
AT nursej applyingsocialnetworkanalysistosecurity
AT goldsmithm applyingsocialnetworkanalysistosecurity
AT creeses applyingsocialnetworkanalysistosecurity