Thesis Poster

Transcription

Thesis Poster
Improving Online Social Network collection and processing mechanisms
Dimitris Tsagkarakis, Alexandros Vavakos, Vasilis Stavrou, Miltiadis Kandias
{d.tsagkarakis, alexandros.vavakos, stavrouv, kandias}@aueb.gr
Information Security and Critical Infrastructure Protection Laboratory
Dept. of Informatics, Athens University of Economics & Business (AUEB)
Introduction
Problems
 Rapid explosion of Online Social Networks.
 Time-consuming data management due to conventional relational databases.
 Users transfer their offline behavior to the online world.
 Delays in the data mining mechanisms due to lack of parallel processing.
Extraction of information from social networks contributes to the profiling of users.
 Need to upgrade existing mechanisms in order to make use of the latest API versions.
Open Source INTelligence (OSINT) to mitigate the insider threat.
OLTP vs. OLAP
Inserts and Updates
Queries
Hadoop Ecosystem
OLTP System
OLAP System
Short and fast inserts and
Periodic long-running batch jobs refresh
updates initiated by end users
the data
Relatively standardized and
Often complex queries involving
simple queries that return
aggregations
relatively few records
Processing Speed
Typically very fast
Depends on the amount of data involved
Space Requirements
Relatively small
Relatively large
Database Design
Highly normalized with many
Typically de-normalized with fewer
tables
tables; use of star and snowflake
schemas
Figure 3: Hadoop ecosystem
Final Twitter Crawler
Figure 1: OLTP vs OLAP Systems
Twitter
 User Privacy:
 Ability to identify a user from a comment or image by third
parties.
 Option to display the geographical location where a comment
or image was posted from.
 Utilization of users’ personal information in order to associate
certain advertisements with them.
 Improvements:
 Parallelization using multithreading.
 Design of a Graphical User Interface.
 Crawler update to sequentially gather users using a file.
 Crawler update to modify the tool’s configuration from within the application.
 Crawler update to store incidents in a log file for later use (analysis or debugging).
Conclusions
Figure 4: Twitter Crawler root window
Figure 5: Twitter Crawler configuration window
Youtube
 User Privacy:
 Ability to display user’s activity to third parties.
 Ability to display video’s information (view count, likes, etc).
 Connection with Google accounts.
 Shared accounts with Facebook and Twitter.
 Improvements:
 Updates and improvements on YouTube’s API responses.
 Parallelization using multithreading.
 Changes on the data stored in the data warehouse.
References
Figure 2: Social media connectivity
 Use of a distributed cluster of machines to store and manage large amounts of data.
 Need for parallelized data collection due to the constantly increasing amounts of
data that social networks process.
 Ability to connect to a social network using accounts from different networks.
 Ability to simultaneously collect user’s data from all the social networks in which
they use the same account.
 Proactive critical infrastructure protection capability.
 Ability to enhance organizational monitoring systems to mitigate the insider threat.
Athens University of Economics and Business
1. Amichai-Hamburger, Y., Vinitzky, G., Social Network Use and Personality”, 2010.
2. Gritzalis, D., Kandias, M., Stavrou, V., Mitrou, L., "History of Information: The case of Privacy and Security in Social Media", in Proc. of
the History of Information Conference, pp. 283-310, Law Library Publications, Greece, 2014.
3. Gritzalis, D., Stavrou, V., Kandias, M., Stergiopoulos, G., “Insider Threat: Εnhancing BPM through Social Media”, in Proc. of the 6th IFIP
International Conference on New Technologies, Mobility and Security, Springer, UAE, 2014.
4. Kandias, M., Mylonas, A., Virvilis, N., Theoharidou, M., Gritzalis, D., “An Insider Threat Prediction Model”, in Proc. of the 7th International Conference on Trust, Pri­vacy, and Security in Digital Business, pp. 26-37, Springer (LNCS-6264), Spain, 2010.
5. Kandias, M., Stavrou, V., Bosovic, N., Gritzalis, D., “Proactive Insider Threat Detection Through Social Media: The YouTube Case”, in Proc.
of the 12th Workshop on Privacy in the Electronic Society, Berlin, 2013.
6. Kandias, M., Mitrou, L., Stavrou, V., Gritzalis, D., “Which side are you on? A new Panopticon vs. Privacy”, in Proc. of the 10th International Conference on Security and Cryptography, pp. 98-110, Iceland, 2013.
7. Kandias, M., Galbogini, K., Mitrou, L., Gritzalis, D., "Insiders trapped in the mirror reveal themselves in social media", in Proc. of the 7th
International Conference on Network and System Security, pp. 220-235, Springer (LNCS 7873), Spain, 2013.
8. Kandias, M., Stavrou, V., Bozovic, N., Mitrou, L., Gritzalis, D., "Can we trust this user? Predicting insider’s attitude via YouTube usage
profiling", in Proc. of 10th IEEE International Conference on Autonomic and Trusted Computing, pp. 347-354, IEEE Press, Italy, 2013.
9. Kandias, M., Virvilis, N., Gritzalis, D., “The Insider Threat in Cloud Computing”, in Proc. of the 6th International Workshop on Critical
Infrastructure Security, pp. 93-103, Springer, Switzerland, 2011.
10. Kotzanikolaou, P., Theoharidou, M., Gritzalis, D., “Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading
Effects”, in Proc. of the 6th International Workshop on Critical Infrastructure Security, pp. 107-118, Springer, Switzerland, 2011.
11. Mylonas, A., Kastania, A., Gritzalis, D., “Delegate the smartphone user? Security awareness in smartphone platforms”, Computers &
Security, Vol. 34, pp. 47-66, May 2013.
12. Mylonas, A., Meletiadis, V., Mitrou, L., Gritzalis, D., “Smartphone sensor data as digital evidence”, Computers & Security, Vol. 38, pp. 5175, October 2013.
13. Stavrou, V., Kandias, M., Karoulas, G., Gritzalis, D., "Business Process Modeling for Insider threat monitoring and handling", in Proc. of
the 11th International Conference on Trust, Privacy & Security in Digital Business, pp. 119-131, Springer (LNCS 8647), Germany, 2014.
14. Shaw, E., Ruby, K., Post, J., “The insider threat to information systems: The psychology of the dangerous insider”, Security Awareness
Bulletin, pp. 1-10, 1998.
15. Theoharidou, M., Kotzanikolaou, P., Gritzalis, D., “Risk assessment methodology for interdependent critical infrastructures”, International Journal of Risk Assessment and Management, Vol. 15, No. 2-2, pp. 128-148, 2011.
Improving Online Social Network collection and processing mechanisms
D. Tsagkarakis, A. Vavakos, V. Stavrou, M. Kandias