A network generator for covert network structures

被引:1
|
作者
Elsisy, Amr [1 ,2 ]
Mandviwalla, Aamir [1 ,2 ]
Szymanski, Boleslaw K. [1 ,2 ,3 ]
Sharkey, Thomas [2 ,4 ]
机构
[1] Rensselaer Polytech Inst, Dept Comp Sci, Troy, NY 12180 USA
[2] Rensselaer Polytech Inst, Network Sci & Technol Ctr, Troy, NY 12180 USA
[3] Spoleczna Akad Nauk, Lodz, Poland
[4] Clemson Univ, Dept Ind Engn, Clemson, SC 29631 USA
关键词
Social networks; Random weighted network generator; Network structure stability; Covert networks; Hierarchical networks; WEIGHTED NETWORK; MODEL; TOPOLOGY;
D O I
10.1016/j.ins.2021.10.066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on organizational structures in covert networks, such as criminal or terrorist networks. Their members engage in illegal activities and attempt to hide their association and interactions with these networks. Hence, data about such networks are incomplete. We introduce a novel method of rewiring covert networks parameterized by the edge connectivity standard deviation. The generated networks are statistically similar to themselves and to the original network. The higher-level organizational structures are modeled as a multi-layer network while the lowest level uses the Stochastic Block Model. Such synthetic networks provide alternative structures for data about the original network. Using them, analysts can find structures that are frequent, therefore stable under perturbations. Another application is to anonymize generated networks and use them for testing new software developed in open research facilities. The results indicate that modeling edge structure and the hierarchy together is essential for generating networks that are statistically similar but not identical to each other or the original network. In experiments, we generate many synthetic networks from two covert networks. Only a few structures of synthetics networks repeat, with the most stable ones shared by 18% of all synthetic networks making them strong candidates for the ground truth structure. (c) 2021 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:387 / 398
页数:12
相关论文
共 50 条
  • [21] Towards Reversible Storage Network Covert Channels
    Mazurczyk, Wojciech
    Szary, Przemyslaw
    Wendzel, Steffen
    Caviglione, Luca
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [22] bccstego: A Framework for Investigating Network Covert Channels
    Repetto, Matteo
    Caviglione, Luca
    Zuppelli, Marco
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [23] Network covert timing channel with distribution matching
    Guangjie Liu
    Jiangtao Zhai
    Yuewei Dai
    Telecommunication Systems, 2012, 49 : 199 - 205
  • [24] PSCAN: A Port Scanning Network Covert Channel
    Mohamed, Emad Eldin
    Ben Mnaouer, Adel
    Barka, Ezedin
    2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, : 631 - 634
  • [25] Embedding a Covert Channel in Active Network Connections
    Khan, Hassan
    Javed, Yousra
    Mirza, Fauzan
    Khayam, Syed Ali
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 4933 - 4938
  • [26] Are Network Covert Timing Channels Statistical Anomalies?
    Iglesias, Felix
    Zseby, Tanja
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [27] Covert communications through network configuration messages
    Rios, Ruben
    Onieva, Jose A.
    Lopez, Javier
    COMPUTERS & SECURITY, 2013, 39 : 34 - 46
  • [28] CCgen: Injecting Covert Channels into Network Traffic
    Iglesias, Felix
    Meghdouri, Fares
    Annessi, Robert
    Zseby, Tanja
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [29] Trends and Challenges in Network Covert Channels Countermeasures
    Caviglione, Luca
    APPLIED SCIENCES-BASEL, 2021, 11 (04): : 1 - 16
  • [30] Network covert timing channel with distribution matching
    Liu, Guangjie
    Zhai, Jiangtao
    Dai, Yuewei
    TELECOMMUNICATION SYSTEMS, 2012, 49 (02) : 199 - 205