Abstract | ||
---|---|---|
This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are most effective at disrupting two online child pornography networks in terms of outcome measures that include density, clustering, compactness, and average path length. For this purpose, two networks were extracted using a web-crawler that recursively follows child exploitation sites. It was found that different attack strategies were warranted depending on the outcome measure and the network structure. Overall, hub attacks were most effective at reducing network density and clustering, whereas fragmentation attacks were most effective at reducing the network's distance-based cohesion and average path length. In certain cases, bridge attacks were almost as effective as some of these measures. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/EISIC.2011.32 | Intelligence and Security Informatics Conference |
Keywords | Field | DocType |
network structure,different attack strategy,online child pornography network,disrupt online child pornography,hub attack,child exploitation site,bridge attack,network density,average path length,outcome measure,fragmentation attack,information retrieval,social network analysis,internet,materials,length measurement | Cohesion (chemistry),Average path length,Child pornography,Computer science,Computer security,Social network analysis,Law enforcement,Cluster analysis,Recursion,The Internet | Conference |
ISBN | Citations | PageRank |
978-0-7695-4406-9 | 8 | 1.17 |
References | Authors | |
1 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kila Joffres | 1 | 8 | 1.17 |
Martin Bouchard | 2 | 15 | 3.79 |
Richard Frank | 3 | 75 | 9.59 |
Bryce Westlake | 4 | 12 | 2.02 |