Visualization of Influencing Nodes in Online Social Networks

Full Text (PDF, 789KB), PP.9-20

Views: 0 Downloads: 0


Prajit Limsaiprom 1,* Prasong Praneetpolgrang 1 Pilastpongs Subsermsri 1

1. School of Information Technology, Sripatum University, Bangkok 10900, Thailand

* Corresponding author.


Received: 11 Jul. 2013 / Revised: 6 Oct. 2013 / Accepted: 21 Dec. 2013 / Published: 8 Apr. 2014

Index Terms

visualization, influencing nodes, anomaly and cyber attacks, online social networks, clustering, social network analysis


The rise of the Internet accelerates the creation of various large-scale online social networks. The online social networks have brought considerable attention as an important medium for the information diffusion model, which can be described the relationships and activities among human beings. The online social networks’ relationships in the real world are too big to present with useful information to identify the criminal or cyber attacks. The methodology for information security analysis was proposed with the complementary of Cluster Algorithm and Social Network Analysis, which presented anomaly and cyber attack patterns in online social networks and visualized the influencing nodes of such anomaly and cyber attacks. The closet vertices of influencing nodes could not avoid from the harmfulness in social networking. The new proposed information security analysis methodology and results were significance analysis and could be applied as a guide for further investigate of social network behavior to improve the security model and notify the risk, computer viruses or cyber attacks for online social networks in advance.

Cite This Paper

Prajit Limsaiprom, Prasong Praneetpolgrang, Pilastpongs Subsermsri, "Visualization of Influencing Nodes in Online Social Networks", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.5, pp.9-20, 2014. DOI:10.5815/ijcnis.2014.05.02


[1]U. Flegel and J. Biskup, “Requirements of Intrusion Reductions for Cooperating Intrusion Detection Agents, in Emerging Trends in Information and Communication Security,” vol. 3995, G. Muller, Eds. Berlin, Germany: Springer-Verlag, pp. 466-480, 2006.
[2]A. R. Kumar, P. and S. Selvakumar, “M2KMIX: Identifying the Type of High Rate Flooding Attacks using a Mixture of Expert Systems,” Journal of IJCNIS, vol. 4, no. 1, pp. 1-16, February 2012.
[3]C. Sheth, R. Thakker, “Performance Evaluation and Comparison of Network Firewalls under DDoS Attack,” Journal of IJCNIS, vol. 5, no. 12, pp. 60-67, October 2013.
[4]H. Yang, F. Xie, and Y. Lu, “Clustering and Classification Based Anomaly Detection, in Fuzzy Systems and Knowledge Discovery,” vol. 4223, L. Wang et al., Eds. Berlin, Germany: Springer-Verlag, September 2006, pp.1082-1091.
[5]I. S. I. Abuhaiba, H. B. Hubboub, “Reinforcement Swap Attacks against Directed Diffusion in Wireless Sensor Networks,” Journal of IJCNIS, vol. 5, no. 3, pp. 13-24, March 2013.
[6]V. BiBhu, K. Roshan, K. Balwant Singh, D. Kumar Singh, “Performance Analysis of Black Hole Attack in Vanet,” Journal of IJCNIS, vol.4, no.11, pp.47-54, October 2012.
[7]C. Haythornthwaite, “Social Network Analysis: An Approach and Technique for the Study of Information Exchange,” Proc. The ALISE conference, San Antonio, Texas, Autumn 1996, pp. 323-342.
[8]P. Limsaiprom and P. Tantatsanawong, “Study of Computer Virus Distribution in Social Network: A case Study of National Blood Centre, Thai Red Cross Society,” Proc. The National Conference on Computer Information Technologies, Thailand, March 2010, pp. 115-120.
[9]C. Azad and V. K. Jha, “Data Mining in Intrusion Detection: A Comparative Study of Methods, Type and Data Sets,” Journal of IJITCS, vol. 5, no. 8, pp. 75-90, July 2013.
[10]R. Smith, N. Japkowicz, M. Dondo, and P. Mason, “Using Unsupervised Learning for Network Alert Correlation, Advances in Artificial Intelligence,” vol. 5032, S. Bergler, Eds. Berlin, Germany: Springer-Verlag, Canada, May 2008, pp. 308-318.
[11]D. Fu, S. Zhou, and P. Guo, “The Design and Implementation of a distributed Network Intrusion Detection System based on Data Mining, World Congress on Software Engineering 2009,” Proc. IEEE Xplore, Xiamen, May 2009, pp.446-450.
[12]J. Song, H. Ohba, H. Takakura, Y. Okabe, K. Ohira, and Y. Kwon, “A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts,” Proc. ASIAN 2007, Qatar, December 2007, pp. 247-253.
[13]M. Bordie, M. Mei, D. George, and S. Ma, “Next Generation of Data-mining Applications,” edited by Kantardzic and Zurada, The institute of Electrical and electronics Engineerings, Inc., 2005, pp. 545-567.
[14]Z. Qi and M. Ying-Hong, “An Algorithm to Detect Community by Geodesic Line in Social Networks,” Journal of AISS, vol. 3, no. 6, pp. 328-333, July 2011.
[15]Z. Jiliu, G. Wang, S. Qiao, C. Wang, Y.Lei, “A Crime Group Identification Model Based on Mobile Communication Vestige Records,” Journal of JCIT, vol. 6, no. 5, pp. 69-77, July 2011.
[16]A. Apolloni, K. Channakeshava, L. Durbeck, “A Study of Information Diffusion over a Realistic Social Network Model,” Proc. International Conference on Computational Science and Engineering, Vancouver, BC, August 2009, pp. 675-682.
[17]H. Xia, R. Wang and S. Hu, “Social Network Analysis of the knowledge Diffusion among University Students,” Proc. The Second International Symposium on Knowledge Acquisition and Modeling, Wuhan, December 2009, pp. 343-346.
[18]S.H. Sharif, S. Mahmazi, N. J. Navimipour, and B. F. Aghdam, “A Review on Search and Discovery Mechanisms in Social Networks,” Journal of IJIEEB, vol. 5, no. 6, pp. 64-72, December 2013.
[19]S. Sharma and G. N. Purohit, “A New Centrality Measure for Tracking Online Community in Social Netowrks,” Journal of IJITCS, vol. 4, no. 4, pp. 47-53, April 2012.
[20]T. Fushimi, T. Kawazoe, K. Saito, M. Kimura, and H. Motoda, “What does an Information Diffusion Model Tell about Social Network Structure,” Proc. PKAW, D. Richards, and B-H. Kang, Eds. Berlin, Germany: Springer-Verlag, 2009, pp. 122-136.
[21]C.T. Butts, “The complexity of social networks: theoretical and empirical findings, In Social Networks,” vol. 23, pp. 31-71, 2001.
[22]C. Lo Storto, “Investigating information flows across complex product development stages by using social network analysis,” Proc. The Complexity in Engineering, Rome, February 2010, pp. 118-120.
[23]M. Kimura, K. Yamakawa, K. Saito, and H. Motoda, “Community Analysis of Influential Nodes for Information Diffusion on a Social Network,” Proc. IEEE Xplore, Hong Kong, June 2008, pp. 1358-1363.
[24]A. Plabo, V. Pablo, and K. Saito, “Selecting the Most Influential Nodes on Social Networks,” Proc. International Joint Conference on Neural Networks, Orlando, FL, August 2007, pp. 2397-2402.