Title
Strategies to Disrupt Online Child Pornography Networks
Abstract
This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are most effective at disrupting two online child pornography networks in terms of outcome measures that include density, clustering, compactness, and average path length. For this purpose, two networks were extracted using a web-crawler that recursively follows child exploitation sites. It was found that different attack strategies were warranted depending on the outcome measure and the network structure. Overall, hub attacks were most effective at reducing network density and clustering, whereas fragmentation attacks were most effective at reducing the network's distance-based cohesion and average path length. In certain cases, bridge attacks were almost as effective as some of these measures.
Year
DOI
Venue
2011
10.1109/EISIC.2011.32
Intelligence and Security Informatics Conference
Keywords
Field
DocType
network structure,different attack strategy,online child pornography network,disrupt online child pornography,hub attack,child exploitation site,bridge attack,network density,average path length,outcome measure,fragmentation attack,information retrieval,social network analysis,internet,materials,length measurement
Cohesion (chemistry),Average path length,Child pornography,Computer science,Computer security,Social network analysis,Law enforcement,Cluster analysis,Recursion,The Internet
Conference
ISBN
Citations 
PageRank 
978-0-7695-4406-9
8
1.17
References 
Authors
1
4
Name
Order
Citations
PageRank
Kila Joffres181.17
Martin Bouchard2153.79
Richard Frank3759.59
Bryce Westlake4122.02