• DocumentCode
    517896
  • Title

    Social network anomaly and attack patterns analysis

  • Author

    Limsaiprom, Prajit ; Tantatsanawong, Panjai

  • Author_Institution
    Dept. of Comput., Silpakorn Univ., Nakorn Pathom, Thailand
  • fYear
    2010
  • fDate
    11-13 May 2010
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    The anomaly and attack patterns using data mining have attracted in recent years. The social network anomaly and attack patterns analysis is focused in this research. The data mining system is developed with a cluster algorithm by distance measure and K-Means clustering method to analyze a large amount of IDS log data of social network to discover unknown social network anomaly and attack patterns. The analysis is computed the model and evaluate with test set shows four attackers´ patterns (i) attackers from social network group 2 attempt to execute an arbitrary program on infected systems, (ii) an anomaly pattern came from social network group 1, 5, 6, and 7, (iii) remote attacker from social network group 1 can gain control of vulnerable systems, and (iv) Denial of Service came from social network group 3 and 4. The data mining tools reveal useful insights which are the anomaly and attack patterns. They are applied as a guide to further investigation of social network behaviors.
  • Keywords
    Algorithm design and analysis; Clustering algorithms; Clustering methods; Computer networks; Data mining; Gain control; Intrusion detection; Pattern analysis; Social network services; System testing; anomaly and attack; clustering; data mining; social network;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networked Computing (INC), 2010 6th International Conference on
  • Conference_Location
    Gyeongju, Korea (South)
  • Print_ISBN
    978-1-4244-6986-4
  • Electronic_ISBN
    978-89-88678-20-6
  • Type

    conf

  • Filename
    5484847