| Literature DB >> 36035378 |
Amir Javed1, Ruth Ikwu2, Pete Burnap1, Luca Giommoni2, Matthew L Williams1,2.
Abstract
This paper tests disruption strategies in Twitter networks containing malicious URLs used in drive-by download attacks. Cybercriminals use popular events that attract a large number of Twitter users to infect and propagate malware by using trending hashtags and creating misleading tweets to lure users to malicious webpages. Due to Twitter's 280 character restriction and automatic shortening of URLs, it is particularly susceptible to the propagation of malware involved in drive-by download attacks. Considering the number of online users and the network formed by retweeting a tweet, a cybercriminal can infect millions of users in a short period. Policymakers and researchers have struggled to develop an efficient network disruption strategy to stop malware propagation effectively. We define an efficient strategy as one that considers network topology and dependency on network resilience, where resilience is the ability of the network to continue to disseminate information even when users are removed from it. One of the challenges faced while curbing malware propagation on online social platforms is understanding the cybercriminal network spreading the malware. Combining computational modelling and social network analysis, we identify the most effective strategy for disrupting networks of malicious URLs. Our results emphasise the importance of specific network disruption parameters such as network and emotion features, which have proved to be more effective in disrupting malicious networks compared to random strategies. In conclusion, disruption strategies force cybercriminal networks to become more vulnerable by strategically removing malicious users, which causes successful network disruption to become a long-term effort.Entities:
Keywords: Cybercrime; Cybersecurity; Drive-by download; Machine learning; Malware
Year: 2022 PMID: 36035378 PMCID: PMC9391206 DOI: 10.1007/s13278-022-00944-2
Source DB: PubMed Journal: Soc Netw Anal Min
Number of Tweet’s containing malicious link captured for each sporting event
| Sporting event | Year | Hashtag used | Malicious tweet identified |
|---|---|---|---|
| Cricket world cup | 2015 | #CWC15 | 4,238 |
| European football championship | 2016 | #Euro2016 | 21,559 |
| Superbowl | 2015 | #SB50 #SuperBowlSunday #superbowlXLIX | 2,293 |
Fig. 1File exclusion list
Fig. 2Flow chart for processing tweets and creating Tweet–retweet network
Fig. 3Tweet–retweet network
Structural Characteristics of the Tweet–Retweet Network
| Dataset | Nodes | Edge count | Density | Mean Degree | DC | Assort. | GCV | GCE | AGD | DGC) | MDC |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Cricket 2015 | 2183 | 2270 | 0.00095 | 1.03985 | 0.137 | -0.030 | 2059 | 1890 | 4.7 | 11 | 302 |
| Euro 2015 | 12942 | 13478 | 0.00016 | 1.04142 | 0.216 | -0.061 | 11685 | 12508 | 4.2 | 15 | 2796 |
| SuperBowl | 794 | 664 | 0.00211 | 0.83627 | 0.157 | 0.017 | 126 | 127 | 1.9 | 2 | 126 |
GCV Giant component vertices, GCE Giant component edges, AGD Average geodesic distance (in GC), DGC Diameter in GC, MDC Max degree Centrality, DC Degree centratization, Assort Assortativity
Fig. 4Nodes removed based on five strategies
Fig. 5Node Removal Strategies on Cricket World Cup 2015 malicious network
Fig. 6Node Removal Strategies on the European Football Championships 2016 network
Fig. 7Node Removal Strategies on the Superbowl 2015 network
Fig. 8Impact of Node removal based on degree centrality on the European Football Championships 2016 malicious network to model malware propagation response
Fig. 9Experimental setup to deploy network disruption strategy