• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

破坏推特上的驱动式下载网络。

Disrupting drive-by download networks on Twitter.

作者信息

Javed Amir, Ikwu Ruth, Burnap Pete, Giommoni Luca, Williams Matthew L

机构信息

School of Computer Science and Informatics, Cardiff University, Cardiff, UK.

School of Social Sciences, Cardiff University, Cardiff, UK.

出版信息

Soc Netw Anal Min. 2022;12(1):117. doi: 10.1007/s13278-022-00944-2. Epub 2022 Aug 20.

DOI:10.1007/s13278-022-00944-2
PMID:36035378
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9391206/
Abstract

This paper tests disruption strategies in Twitter networks containing malicious URLs used in drive-by download attacks. Cybercriminals use popular events that attract a large number of Twitter users to infect and propagate malware by using trending hashtags and creating misleading tweets to lure users to malicious webpages. Due to Twitter's 280 character restriction and automatic shortening of URLs, it is particularly susceptible to the propagation of malware involved in drive-by download attacks. Considering the number of online users and the network formed by retweeting a tweet, a cybercriminal can infect millions of users in a short period. Policymakers and researchers have struggled to develop an efficient network disruption strategy to stop malware propagation effectively. We define an efficient strategy as one that considers network topology and dependency on network resilience, where resilience is the ability of the network to continue to disseminate information even when users are removed from it. One of the challenges faced while curbing malware propagation on online social platforms is understanding the cybercriminal network spreading the malware. Combining computational modelling and social network analysis, we identify the most effective strategy for disrupting networks of malicious URLs. Our results emphasise the importance of specific network disruption parameters such as network and emotion features, which have proved to be more effective in disrupting malicious networks compared to random strategies. In conclusion, disruption strategies force cybercriminal networks to become more vulnerable by strategically removing malicious users, which causes successful network disruption to become a long-term effort.

摘要

本文测试了包含用于驱动下载攻击的恶意URL的推特网络中的破坏策略。网络犯罪分子利用吸引大量推特用户的热门事件,通过使用热门话题标签和创建误导性推文来诱使用户访问恶意网页,从而感染并传播恶意软件。由于推特280字符的限制以及URL的自动缩短,它特别容易受到驱动下载攻击中所涉及的恶意软件传播的影响。考虑到在线用户数量以及转发推文所形成的网络,网络犯罪分子能够在短时间内感染数百万用户。政策制定者和研究人员一直在努力制定一种有效的网络破坏策略,以有效阻止恶意软件的传播。我们将一种有效的策略定义为一种考虑网络拓扑结构以及对网络弹性的依赖性的策略,其中弹性是指即使从网络中移除用户,网络仍能继续传播信息的能力。在遏制在线社交平台上的恶意软件传播时所面临的挑战之一是了解传播恶意软件的网络犯罪分子网络。通过结合计算建模和社交网络分析,我们确定了破坏恶意URL网络的最有效策略。我们的结果强调了特定网络破坏参数(如网络和情感特征)的重要性,事实证明,与随机策略相比,这些参数在破坏恶意网络方面更有效。总之,破坏策略通过战略性地移除恶意用户,迫使网络犯罪分子网络变得更加脆弱,这使得成功的网络破坏成为一项长期努力。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/fefff04c9067/13278_2022_944_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/9ea35dc9f8e4/13278_2022_944_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/ec46911bbe04/13278_2022_944_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/e45b2206f52e/13278_2022_944_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/305ddbb6e55e/13278_2022_944_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/5ae3fae652cd/13278_2022_944_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/194e5d95babd/13278_2022_944_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/80898b5af943/13278_2022_944_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/2c61d72d9418/13278_2022_944_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/fefff04c9067/13278_2022_944_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/9ea35dc9f8e4/13278_2022_944_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/ec46911bbe04/13278_2022_944_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/e45b2206f52e/13278_2022_944_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/305ddbb6e55e/13278_2022_944_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/5ae3fae652cd/13278_2022_944_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/194e5d95babd/13278_2022_944_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/80898b5af943/13278_2022_944_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/2c61d72d9418/13278_2022_944_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15b8/9391206/fefff04c9067/13278_2022_944_Fig9_HTML.jpg

相似文献

1
Disrupting drive-by download networks on Twitter.破坏推特上的驱动式下载网络。
Soc Netw Anal Min. 2022;12(1):117. doi: 10.1007/s13278-022-00944-2. Epub 2022 Aug 20.
2
Is COVID-19 Being Used to Spread Malware.新冠病毒是否被用于传播恶意软件?
SN Comput Sci. 2023;4(4):398. doi: 10.1007/s42979-023-01838-6. Epub 2023 May 17.
3
An Assessment of Lexical, Network, and Content-Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models.基于机器学习和深度学习模型的词汇、网络和基于内容的特征评估在恶意 URL 检测中的应用。
Comput Intell Neurosci. 2022 Aug 25;2022:3241216. doi: 10.1155/2022/3241216. eCollection 2022.
4
An intelligent identification and classification system for malicious uniform resource locators (URLs).一种针对恶意统一资源定位符(URL)的智能识别与分类系统。
Neural Comput Appl. 2023 Apr 20:1-17. doi: 10.1007/s00521-023-08592-z.
5
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.基于网络威胁情报的集成学习恶意 URL 检测模型。
Sensors (Basel). 2022 Apr 28;22(9):3373. doi: 10.3390/s22093373.
6
Malicious URL Detection Based on Associative Classification.基于关联分类的恶意URL检测
Entropy (Basel). 2021 Jan 31;23(2):182. doi: 10.3390/e23020182.
7
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.用于验证网络威胁预防工具的恶意软件传播模拟器
Sensors (Basel). 2021 Oct 21;21(21):6983. doi: 10.3390/s21216983.
8
An ensemble classification method based on machine learning models for malicious Uniform Resource Locators (URL).基于机器学习模型的恶意统一资源定位器 (URL) 集成分类方法。
PLoS One. 2024 May 31;19(5):e0302196. doi: 10.1371/journal.pone.0302196. eCollection 2024.
9
User emotion for modeling retweeting behaviors.用户情感建模转发行为。
Neural Netw. 2017 Dec;96:11-21. doi: 10.1016/j.neunet.2017.08.006. Epub 2017 Sep 8.
10
Malware propagation model for cluster-based wireless sensor networks using epidemiological theory.基于流行病学理论的集群式无线传感器网络恶意软件传播模型
PeerJ Comput Sci. 2021 Sep 15;7:e728. doi: 10.7717/peerj-cs.728. eCollection 2021.

引用本文的文献

1
Empirical evaluation of link deletion methods for limiting information diffusion on social media.用于限制社交媒体上信息传播的链接删除方法的实证评估。
Soc Netw Anal Min. 2022;12(1):169. doi: 10.1007/s13278-022-00994-6. Epub 2022 Nov 18.

本文引用的文献

1
Characterising the structure of the largest online commercial sex network in the UK: observational study with implications for STI prevention.描述英国最大的在线商业性交易网络的结构:观察性研究及其对性传播感染预防的意义。
Cult Health Sex. 2021 Dec;23(12):1608-1625. doi: 10.1080/13691058.2020.1788725. Epub 2020 Sep 7.
2
Malicious Actors on Twitter: A Guide for Public Health Researchers.推特上的恶意行为者:公共卫生研究人员指南。
Am J Public Health. 2019 May;109(5):688-692. doi: 10.2105/AJPH.2019.304969. Epub 2019 Mar 21.
3
The spread of true and false news online.
网络上真实和虚假新闻的传播。
Science. 2018 Mar 9;359(6380):1146-1151. doi: 10.1126/science.aap9559.
4
How central are clients in sexual networks created by commercial sex?在商业性行为所形成的性网络中,客户处于怎样的核心地位?
Sci Rep. 2014 Dec 18;4:7540. doi: 10.1038/srep07540.
5
Information dynamics shape the sexual networks of Internet-mediated prostitution.信息动态塑造了互联网卖淫中介的性网络。
Proc Natl Acad Sci U S A. 2010 Mar 30;107(13):5706-11. doi: 10.1073/pnas.0914080107. Epub 2010 Mar 15.
6
Mixing patterns in networks.网络中的混合模式。
Phys Rev E Stat Nonlin Soft Matter Phys. 2003 Feb;67(2 Pt 2):026126. doi: 10.1103/PhysRevE.67.026126. Epub 2003 Feb 27.