TY - GEN
T1 - The impact of unlinkability on adversarial community detection
T2 - 10th International Symposium on Privacy Enhancing Technologies, PETS 2010
AU - Nagaraja, Shishir
PY - 2010/8/16
Y1 - 2010/8/16
N2 - We consider the threat model of a mobile-adversary drawn from contemporary computer security literature, and explore the dynamics of community detection and hiding in this setting. Using a real-world social network, we examine the extent of network topology information an adversary is required to gather in order to accurately ascertain community membership information. We show that selective surveillance strategies can improve the adversary's efficiency over random wiretapping. We then consider possible privacy preserving defenses; using anonymous communications helps, but not much; however, the use of counter-surveillance techniques can significantly reduce the adversary's ability to learn community membership. Our analysis shows that even when using anonymous communications an adversary placing a selectively chosen 8% of the nodes of this network under surveillance (using key-logger probes) can de-anonymize the community membership of as much as 50% of the network. Uncovering all community information with targeted selection requires probing as much as 75% of the network. Finally, we show that a privacy conscious community can substantially disrupt community detection using only local knowledge even while facing up to the asymmetry of a completely knowledgeable mobile-adversary.
AB - We consider the threat model of a mobile-adversary drawn from contemporary computer security literature, and explore the dynamics of community detection and hiding in this setting. Using a real-world social network, we examine the extent of network topology information an adversary is required to gather in order to accurately ascertain community membership information. We show that selective surveillance strategies can improve the adversary's efficiency over random wiretapping. We then consider possible privacy preserving defenses; using anonymous communications helps, but not much; however, the use of counter-surveillance techniques can significantly reduce the adversary's ability to learn community membership. Our analysis shows that even when using anonymous communications an adversary placing a selectively chosen 8% of the nodes of this network under surveillance (using key-logger probes) can de-anonymize the community membership of as much as 50% of the network. Uncovering all community information with targeted selection requires probing as much as 75% of the network. Finally, we show that a privacy conscious community can substantially disrupt community detection using only local knowledge even while facing up to the asymmetry of a completely knowledgeable mobile-adversary.
KW - social network
KW - betweenness centrality
KW - community detection
KW - threat model
KW - community detection algorithm
KW - data privacy
KW - electric network topology
KW - adversarial community detection
KW - anonymous communication
KW - surveillance techniques
UR - http://www.scopus.com/inward/record.url?scp=77955446837&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-14527-8_15
DO - 10.1007/978-3-642-14527-8_15
M3 - Conference contribution book
AN - SCOPUS:77955446837
SN - 3642145264
SN - 9783642145261
VL - 6205
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 253
EP - 272
BT - Privacy Enhancing Technologies - 10th International Symposium, PETS 2010, Proceedings
PB - Springer
CY - Berlin
Y2 - 21 July 2010 through 23 July 2010
ER -