Social Network Security Based on Trust Agent and Behavior Induction

Authors

  • A. M. Rangaraj  Assoc.Department of Computer Applications Professor SVCET, Chittoor, Andhra Pradesh, India
  • T. Jyotheesh  PG scholar Department of Computer Applications SVCET, Chittoor, Andhra Pradesh, India
  • K. Sudhakar  PG scholar Department of Computer Applications SVCET, Chittoor, Andhra Pradesh, India

Keywords:

Electronic Commerce (e-commerce), Balanced Incomplete Block Design(BIBD), Transmission Control Protocol(TCP), User Datagram Protocol(UDP).

Abstract

Social networks area unit a form of social group structure that consists of multiple nodes and therefore the relationships among them. Through these relationships, social networks connect all types of participants, from casual speaking acquaintances to closely related family members. However whereas on-line social networks bring convenience to fashionable life, they'll have negative effects yet. In politics, as an example, rumors might be made and unfold on social networks that cause incidents affecting social group stability; similarly, in e-commerce, false info may be touch social networks that deceive customers in on-line looking platforms. porn is commonly distributed via social video sharing and instant messaging platforms, and terrorists have adopted social networks to influence teenagers to take half in their illicit activities. a way to counter these malicious behaviors is to introduce behavior induction, a method during which a person or group influences the behavior of another person or cluster through the induction of behavioral attitudes.

References

  1. Albert, R., Barabasi, A.: Statistical mechanics of complex networks. Reviews of Modern Physics 74(1), 47-97 (2002).
  2. Garton, L., Haythornthwaite, C., Wellman, and B.: Studying online social networks. Journal of Computer-Mediated Communication 3(1) (1997).
  3. Ye, S., Lang, J., Wu, and F.: Crawling Online Social Graphs. In: Proc. of the 12th International Asia-Pacific Web Conference, pp. 236-242. IEEE (2010).
  4. Kleinberg, J.: The small-world phenomenon: an algorithm perspective. In: Proc. of the 32nd annual symposium on Theory of computing, pp. 163-170. ACM (2000).
  5. Gjoka, M., Kurant, M., Butts, C., Markopoulou, and A.: Walking in Face book: a case study of unbiased sampling of OSNs. In: Proc. of the 29th conference on Information communications, pp. 2498-2506. IEEE (2010)
  6. Mislove, A., Marcon, M., Gummadi, K., Druschel, P., Bhattacharjee, and B.: Measurement and analysis of online social networks. In: Proc. of the 7th SIGCOMM conference on Internet measurement, pp. 29-42. ACM (2007)
  7. Han, J., Kamber, M., Pei, J.: Data mining: concepts and techniques. Morgan Kaufman Pub (2011)
  8. Adamic, L., Adar, E.: Friends and neighbors on the web. Social networks 25(3), 211-230 (2003)
  9. Blondel, V., Gajardo, A., Heymans, M., Senellart, P., Van Dooren, P.: A measure of similarity between graph vertices: Applications to synonym extraction and web searching.Siam Review pp. 647-666 (2004)
  10. Jeh, G., Widom, and J.: Simrank: a measure of structural-context similarity. In: Proc. Of the 8th SIGKDD international conference on Knowledge discovery and data mining, pp. 538-543. ACM (2002)
  11. Batagelj, V., Doreian, P., Ferligoj, A.: An optimization approach to regular equivalence .Social Networks 14(1-2), 121-135 (1992)
  12. Blondel, V., Gajardo, A., Heymans, M., Senellart, P., Van Dooren, P.: A measure of similarity between graph vertices: Applications to synonym extraction and web searching.Siam Review pp. 647-666 (2004)
  13. Golub, G., Van Loan, C.: Matrix computations, vol. 3. Johns Hopkins University Press (1996)
  14. Kleinberg, J.: Authoritative sources in a hyperlinked environment. Journal of the ACM 46(5), 604-632 (1999)
  15. Romero, D., Galuba, W., Asur, S., Huberman, B.: Influence and passivity in social media. In: Proc. of the 20th International Conference Companion on World Wide Web, pp. 113-114. ACM (2011)
  16. Mathioudakis, M., Koudas, N.: Efficient identification of starters and followers in social media. In: Proc. of the International Conference on Extending Database Technology, pp. 708-719. ACM (2009)17Song, X., Chi, Y., Hino, K., Tseng, B.: Identifying opinion leaders in the blogosphere. In: Proc. of the 16th Conference on Information and Knowledge Management, pp. 971-974. ACM (2007).
  17. Goldenberg, A., Zheng, A., Fienberg, S., Airoldi, E.: A survey of statistical network models. Foundations and Trends in Machine Learning 2(2), 129-233 (2010)
  18. Aiello, L.M., Barrat, A., Cattuto, C., Ruffo, G., Schifanella, R.: Link creation and profile alignment in the aNobii social network. In: Proc. of the 2nd International Conference on Social Computing, pp. 249-256 (2010)
  19. Mislove, A., Marcon, M., Gummadi, K., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proc. of the 7th SIGCOMM conference on Internet measurement, pp. 29-42. ACM (2007)

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
A. M. Rangaraj, T. Jyotheesh, K. Sudhakar, " Social Network Security Based on Trust Agent and Behavior Induction, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.517-521, March-April-2018.