DocumentCode :
2053280
Title :
Strategies to Disrupt Online Child Pornography Networks
Author :
Joffres, Kila ; Bouchard, Martin ; Frank, Richard ; Westlake, Bryce
Author_Institution :
Int. Cybercrime Res. Centre, Simon Fraser Univ., Burnaby, BC, Canada
fYear :
2011
fDate :
12-14 Sept. 2011
Firstpage :
163
Lastpage :
170
Abstract :
This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are most effective at disrupting two online child pornography networks in terms of outcome measures that include density, clustering, compactness, and average path length. For this purpose, two networks were extracted using a web-crawler that recursively follows child exploitation sites. It was found that different attack strategies were warranted depending on the outcome measure and the network structure. Overall, hub attacks were most effective at reducing network density and clustering, whereas fragmentation attacks were most effective at reducing the network´s distance-based cohesion and average path length. In certain cases, bridge attacks were almost as effective as some of these measures.
Keywords :
information retrieval; security of data; social aspects of automation; social networking (online); Web-crawler; attack strategies; average path length; bridge attacks; child exploitation sites; distance-based cohesion; fragmentation attacks; hub attacks; network density; network structure; online child pornography network disruption; online child pornography networks; Bridges; Density measurement; Internet; Law enforcement; Length measurement; Materials; Videos; Child exploitation; Internet; Network disruption; Social network analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics Conference (EISIC), 2011 European
Conference_Location :
Athens
Print_ISBN :
978-1-4577-1464-1
Electronic_ISBN :
978-0-7695-4406-9
Type :
conf
DOI :
10.1109/EISIC.2011.32
Filename :
6061173
Link To Document :
بازگشت