作者
Amir Javed, Ruth Ikwu, Pete Burnap, Luca Giommoni, Matthew L Williams
发表日期
2022/12
来源
Social Network Analysis and Mining
卷号
12
期号
1
页码范围
117
出版商
Springer Vienna
简介
This paper tests disruption strategies in Twitter networks containing malicious URLs used in drive-by download attacks. Cybercriminals use popular events that attract a large number of Twitter users to infect and propagate malware by using trending hashtags and creating misleading tweets to lure users to malicious webpages. Due to Twitter’s 280 character restriction and automatic shortening of URLs, it is particularly susceptible to the propagation of malware involved in drive-by download attacks. Considering the number of online users and the network formed by retweeting a tweet, a cybercriminal can infect millions of users in a short period. Policymakers and researchers have struggled to develop an efficient network disruption strategy to stop malware propagation effectively. We define an efficient strategy as one that considers network topology and dependency on network resilience, where resilience is the …
引用总数
学术搜索中的文章
A Javed, R Ikwu, P Burnap, L Giommoni, ML Williams - Social Network Analysis and Mining, 2022