A network generator for covert network structures

被引:1
|
作者
Elsisy, Amr [1 ,2 ]
Mandviwalla, Aamir [1 ,2 ]
Szymanski, Boleslaw K. [1 ,2 ,3 ]
Sharkey, Thomas [2 ,4 ]
机构
[1] Rensselaer Polytech Inst, Dept Comp Sci, Troy, NY 12180 USA
[2] Rensselaer Polytech Inst, Network Sci & Technol Ctr, Troy, NY 12180 USA
[3] Spoleczna Akad Nauk, Lodz, Poland
[4] Clemson Univ, Dept Ind Engn, Clemson, SC 29631 USA
关键词
Social networks; Random weighted network generator; Network structure stability; Covert networks; Hierarchical networks; WEIGHTED NETWORK; MODEL; TOPOLOGY;
D O I
10.1016/j.ins.2021.10.066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on organizational structures in covert networks, such as criminal or terrorist networks. Their members engage in illegal activities and attempt to hide their association and interactions with these networks. Hence, data about such networks are incomplete. We introduce a novel method of rewiring covert networks parameterized by the edge connectivity standard deviation. The generated networks are statistically similar to themselves and to the original network. The higher-level organizational structures are modeled as a multi-layer network while the lowest level uses the Stochastic Block Model. Such synthetic networks provide alternative structures for data about the original network. Using them, analysts can find structures that are frequent, therefore stable under perturbations. Another application is to anonymize generated networks and use them for testing new software developed in open research facilities. The results indicate that modeling edge structure and the hierarchy together is essential for generating networks that are statistically similar but not identical to each other or the original network. In experiments, we generate many synthetic networks from two covert networks. Only a few structures of synthetics networks repeat, with the most stable ones shared by 18% of all synthetic networks making them strong candidates for the ground truth structure. (c) 2021 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:387 / 398
页数:12
相关论文
共 50 条
  • [41] A Protocol Independent Approach in Network Covert Channel Detection
    Ayub, Md. Ahsan
    Smith, Steven
    Siraj, Ambareen
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 171 - 176
  • [42] A Review on Network Covert Channel Construction and Attack Detection
    Khadse, Mrinal Ashish
    Dakhane, Dhananjay Manohar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2025, 37 (01):
  • [43] A high throughput covert overlay network within a MANET
    Salmanian, Mazda
    Li, Ming
    2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 586 - 592
  • [44] Securing the controller area network with covert voltage channels
    Pal-Stefan Murvay
    Lucian Popa
    Bogdan Groza
    International Journal of Information Security, 2021, 20 : 817 - 831
  • [45] Analysis and detection of covert information transfers in MLS network
    Cai, Zhi-Yong
    Zhang, Xing
    Shen, Chang-Xiang
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2011, 37 (08): : 1226 - 1230
  • [46] Evaluating the transmission rate of covert timing channels in a network
    Zi, Xiaochao
    Yao, Lihong
    Jiang, Xinghao
    Pan, Li
    Li, Jianhua
    COMPUTER NETWORKS, 2011, 55 (12) : 2760 - 2771
  • [47] Countering adaptive network covert communication with dynamic wardens
    Mazurczyk, Wojciech
    Wendzel, Steffen
    Chourib, Mehdi
    Keller, Joerg
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 94 : 712 - 725
  • [48] A Covert Network Attack Detection Method Based on LSTM
    Nie, Junke
    Ma, Peng
    Wang, B. O.
    Su, Yang
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1690 - 1693
  • [49] Achieving a Covert Channel over an Open Blockchain Network
    Gao, Feng
    Zhu, Liehuang
    Gai, Keke
    Zhang, Can
    Liu, Sheng
    IEEE NETWORK, 2020, 34 (02): : 6 - 13
  • [50] The Covert Impact of Chiari Network and Eustachian Valves on Stroke
    Al-Sabbagh, Mohammed Q.
    Eswaradass, Prasanna
    NEUROLOGIST, 2024, 29 (03) : 188 - 193