Hacking social networks examining the viability of using computer network attack against social networks
Schuhart, Russell G.
MetadataShow full item record
Social Network Analysis (SNA) has been proposed as a tool to defeat transnational terrorist groups such as Al Qaeda. However, SNA is an descriptive tool that is a product of sociology and not an offensive tool used to attack a social network. SNA was not designed to destabilize covert networks that are difficult to observe and penetrate. This work presents a possible way to improve SNAâ s performance against a covert social network by employing the Computer Network Attack (CNA) model. The CNA model is used by computer network security to represent the traditional approach to hacking a computer network. Although not tested in this paper, it is argued that the CNA model should be able to improve the accuracy of SNA when applied to a covert social network by standardizing the destabilization process and allowing for frequent challenges of operating assumptions. A history and overview of both computer networks and social networks is covered to allow for a comparison of the two networks. The networks have enough similarities to allow the application of the CNA model without major modification from its original form. Assumptions about the security of computer and social networks are examined to clarify how the CNA model can attack a social network. The model is examined for validity and the conclusion is that the CNA model can incorporate SNA into a more methodical approach to achieve better results that using SNA alone. The final portion of the paper details a possible implementation of the CNA model and how it can be used as part of an offensive effort to destabilize a covert social network.
Showing items related by title, author, creator and subject.
Ozmen, Ersin (Monterey, CA; Naval Postgraduate School, 2018-12);Dark networks can be defined as illegal and covert social networks. Terrorist groups are an excellent example of a dark network. Decision makers have two basic options to disrupt dark networks. The first option is kinetic ...
Violent extremist network representation and attack the network course of action analysis in social simulation Alt, Jonathan K.; Lieberman, Steven; Everton, Sean (Monterey, California, Naval Postgraduate School, 2010);The representation of violent extremist networks (VENs) and their behaviors within social simulation is required in order to leverage models and simulations for use to attack the networks course of action analysis. VENs ...
Bollmann, Chad A.; Tummala, Murali; McEachen, John C. (Elsevier, 2021);This work describes a novel application of robust estimation to the detection of volumetric anomalies in computer network traffic. The proposed tests are based on sample location and dispersion and derived from relatively ...