Method for identifying virtual malicious nodes and virtual malicious node network in social networks

A malicious node and social network technology, which is applied in the field of virtual malicious nodes and their network identification, can solve the problems of limited detection types of identification methods, difficulty in finding high camouflage, collaborative virtual malicious nodes, etc., to meet the recognition rate and real-time requirements Effect

Active Publication Date: 2015-05-27
INST OF INFORMATION ENG CAS
View PDF4 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the limited detection types of virtual malicious node identification methods in existing social networks, it is difficult to find high camouflage and cooperative virtual malicious nodes, the present invention discloses a social network-oriented virtual malicious node based on node trust model and behavior habit model. Node and its network identification method and system
The method of the present invention proposes a node trust degree model, and uses the attributes of social network accounts that are difficult to forge as identification features, and solves the detection problems of social network nodes such as cloning camouflage and infection control;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying virtual malicious nodes and virtual malicious node network in social networks
  • Method for identifying virtual malicious nodes and virtual malicious node network in social networks
  • Method for identifying virtual malicious nodes and virtual malicious node network in social networks

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0053] figure 1 A flowchart of step (1) is given, and the specific implementation is as follows:

[0054] a) According to the account data structure and form of the target social network system, realize the corresponding data interface and crawler tool to form the original data set. This method is suitable for mainstream social networks that focus on user interaction activities, such as Facebook, Twitter, Sina Weibo, Tencent WeChat, etc.; it is not suitable for social networks that focus on information publishing, such as forums and post bars.

[0055] b) Obtain the attribute data of the target account based on the accessible target social network original data set, including: user identification, user nickname, user associated account, real-name authentication, account creation time, and real identity information.

[0056] c) According to the set time window, extract the behavior data and communication data of the target account from the original data set. The behavior data has a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for identifying virtual malicious nodes and a virtual malicious node network in social networks. The method includes the following steps: (1) obtaining the attribute data, behavioral data and communication data of unidentified accounts from target social networks; (2) calculating the creditworthiness of each unidentified account according to the credibility model feature vector calculated using the extracted data; (3) making a comparison between the user behavioral habit statistic data of each unidentified account with the credibility being lower than a set threshold value and that of a normal user, and judging whether the unidentified account is a virtual malicious node or not; (4) sorting the virtual malicious node set and establishing association for the virtual malicious node in each sort result, so as to form a virtual malicious node network; then evaluating by using the Bayesian network algorithm to determine the final virtual malicious node network. The method provided by the invention can be used to effectively identify highly-disguised malicious nodes and a collaborative virtual malicious node network.

Description

Technical field [0001] The invention belongs to the technical field of network information security, relates to network security situation awareness and processing technology, and particularly relates to a social network-oriented virtual malicious node and a network identification method thereof. Background technique [0002] With the development of the Internet, social networks have become an important channel and platform for people to communicate in daily life and work. In a broad sense, "social network" refers to a network of relationships composed of human social activities, while the "social network" mentioned in the field of computer science and technology refers to a virtual human relationship network built on the Internet and related network service support platforms, in English The full name is "Social Network Site", and the "social network" involved in the present invention belongs to the latter. Social network users can communicate with friends by publishing informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441H04L63/1483
Inventor 李书豪云晓春张永铮
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products