A network generator for covert network structures

被引:1
|
作者
Elsisy, Amr [1 ,2 ]
Mandviwalla, Aamir [1 ,2 ]
Szymanski, Boleslaw K. [1 ,2 ,3 ]
Sharkey, Thomas [2 ,4 ]
机构
[1] Rensselaer Polytech Inst, Dept Comp Sci, Troy, NY 12180 USA
[2] Rensselaer Polytech Inst, Network Sci & Technol Ctr, Troy, NY 12180 USA
[3] Spoleczna Akad Nauk, Lodz, Poland
[4] Clemson Univ, Dept Ind Engn, Clemson, SC 29631 USA
关键词
Social networks; Random weighted network generator; Network structure stability; Covert networks; Hierarchical networks; WEIGHTED NETWORK; MODEL; TOPOLOGY;
D O I
10.1016/j.ins.2021.10.066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on organizational structures in covert networks, such as criminal or terrorist networks. Their members engage in illegal activities and attempt to hide their association and interactions with these networks. Hence, data about such networks are incomplete. We introduce a novel method of rewiring covert networks parameterized by the edge connectivity standard deviation. The generated networks are statistically similar to themselves and to the original network. The higher-level organizational structures are modeled as a multi-layer network while the lowest level uses the Stochastic Block Model. Such synthetic networks provide alternative structures for data about the original network. Using them, analysts can find structures that are frequent, therefore stable under perturbations. Another application is to anonymize generated networks and use them for testing new software developed in open research facilities. The results indicate that modeling edge structure and the hierarchy together is essential for generating networks that are statistically similar but not identical to each other or the original network. In experiments, we generate many synthetic networks from two covert networks. Only a few structures of synthetics networks repeat, with the most stable ones shared by 18% of all synthetic networks making them strong candidates for the ground truth structure. (c) 2021 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:387 / 398
页数:12
相关论文
共 50 条
  • [1] Covert network.
    Rose, PI
    INTERNATIONAL MIGRATION REVIEW, 1998, 32 (03) : 789 - 790
  • [2] Scaffold network generator: a tool for mining molecular structures
    Matlock, Matt K.
    Zaretzki, Jed M.
    Swamidass, S. Joshua
    BIOINFORMATICS, 2013, 29 (20) : 2655 - 2656
  • [3] A core generator for arithmetic cores and testing structures with a network interface
    Bakalis, D
    Adaos, KD
    Lymperopoulos, D
    Bellos, M
    Vergos, HT
    Alexiou, GP
    Nikolos, D
    JOURNAL OF SYSTEMS ARCHITECTURE, 2006, 52 (01) : 1 - 12
  • [4] Image Generation Network for Covert Transmission in Online Social Network
    You, Zhengxin
    Ying, Qichao
    Li, Sheng
    Qian, Zhenxing
    Zhang, Xinpeng
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2022, 2022, : 2834 - 2842
  • [5] Research on the Influence of Network Condition to Network Covert Timing Channels
    Yang, Peng
    Zhao, Hui
    Bao, Zhonggui
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 338 - 341
  • [6] Covert Channels in Network Time Security
    Lamshoeft, Kevin
    Dittmann, Jana
    PROCEEDINGS OF THE 2022 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH-MMSEC 2022, 2022, : 69 - 79
  • [7] A modified measure of covert network performance
    Doty, L.L. (lynne.doty@marist.edu), 1600, World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece (12):
  • [8] Analysis of Reversible Network Covert Channels
    Szary, Przemyslaw
    Mazurczyk, Wojciech
    Wendzel, Steffen
    Caviglione, Luca
    IEEE ACCESS, 2022, 10 : 41226 - 41238
  • [9] Covert Channel For Local Area Network
    Ji, Liping
    Fan, Yu
    Ma, Chuan
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 316 - 319
  • [10] CWAN: Covert Watermarking Attack Network
    Wang, Chunpeng
    Liu, Yushuo
    Xia, Zhiqiu
    Li, Qi
    Li, Jian
    Wang, Xiaoyu
    Ma, Bin
    ELECTRONICS, 2023, 12 (02)