Abstract
Social media networks have grown rapidly as a key platform for communicating and sharing information. Millions of users are actively accessing its features and making connections. Normally, the only point of analyzing user authentication is for scrutinizing online details and posted information; however, this is sometimes morphed by cyber criminals to support fraudulent activities. Cybercrimes in online platforms also are moving toward fraud by continuously monitoring for open profiles, making friends, offering opportunities, and asking for favors. Examples include cash deposits, lotteries, click baiting, fake job offers, fraudulent fundraising, post re-sharing, card details sharing, and software downloads. Vulnerable nodes must be located to identify criminals’ details and account information. Social network analysis (SNA) finds such links using concepts from network and graph theory. SNA is well suited for the identification of friends involved in cyber fraud, epidemic transmission analysis, radicalization posts, and similar crimes. SNA-based approaches are presented that many be useful for managing efforts aimed at identifying suspicious and criminal activities in social media platforms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Defining terrorism. (2008). Transnational Terrorism, Security and the Rule of law, European Commission Working Paper 3. Retrieved from http://www.transnationalterrorism.eu/tekst/publications/WP3%20Del%204.pdf
Ressler, S. (2006). Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs, 2(2), 1–10.
Griffin, N. (2016). Monsoon—Analysis of an apt campaign. Retrieved from https://www.forcepoint.com/zhhans/blog/security-labs/monsoonanalysis-apt-campaign
van der Hulst, R. C. (2011). Terrorist networks: The threat of connectivity. In The SAGE handbook of social network analysis (p. 256).
Regalado, D., Villeneuve, N., & Railton, J. S. (2015). Behind the Syrian conflict’s digital front lines. FireEye.
Krebs, V. E. (2002). Mapping networks of terrorist cells. Connections, 24(3), 43–52.
Basu, A. (2005). Social network analysis of terrorist organizations in India. In North American Association for Computational Social and Organizational Science (NAACSOS) Conference (pp. 26–28).
Scott, J. (1994). Social network analysis: A handbook. Sage.
Wasserman, S. (1994). Social network analysis: Methods and applications. Cambridge University Press.
Freeman, L. C. (2004). The development of social network analysis. Empirical Press Vancouver.
Harary, F. (1969). Graph theory. Addison-Wesley.
Milgram, S. (1967). The small world problem. Psychology Today, 2(1), 60–67.
S. weibo data center. (2017). Weibo user development report. Retrieved from http://data.weibo.com/report/reportDetail?id=404
Min, J. (2018). North Korean defectors and journalists targeted using social networks and kakaotalk. Retrieved from https://securingtomorrow.mcafee.com/mcafee-labs/north-koreandefectors-journalists-targetedusing-social-networks-kakaotalk/
Thakur, K., Hayajneh, T., & Tseng, J. (2019). Cyber security in social media: Challenges and the way forward. IT Professional, 21(2), 41–49.
Khan, U. U., Ali, M., Abbas, A., Khan, S., & Zomaya, A. (2018). Segregating spammers and unsolicited bloggers from genuine experts on Twitter. IEEE Transactions on Dependable and Secure Computing, 15(4), 551–560.
Cao, J., Li, Q., Ji, Y., He, Y., & Guo, D. (2016). Detection of forwarding-based malicious URLs in online social networks. International Journal of Parallel Programming, 44(1), 163–180.
Cao, Q., Sirivianos, M., Yang, X., & Pregueiro, T. (2012). Aiding the detection of fake accounts in large scale social online services. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (p. 15). USENIX Association.
Gong, N. Z., Frank, M., & Mittal, P. (2014). SybilBelief: A semi-supervised learning approach for structure-based sybil detection. IEEE Transactions on Information Forensics and Security, 9(6), 976–987.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Rawat, R., Mahor, V., Chirgaiya, S., Rathore, A.S. (2021). Applications of Social Network Analysis to Managing the Investigation of Suspicious Activities in Social Media Platforms. In: Daimi, K., Peoples, C. (eds) Advances in Cybersecurity Management. Springer, Cham. https://doi.org/10.1007/978-3-030-71381-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-71381-2_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71380-5
Online ISBN: 978-3-030-71381-2
eBook Packages: Computer ScienceComputer Science (R0)