The Role of Social Network Analysis in Cyber Defence

By: KUKUTLA TEJONATH REDDY, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University, Taiwan, tejonath45@gmail.com

Abstract:

Digital age is introducing SNA as an innovative approach in disclosing sophisticated social networks. This paper outlines the definition of social network analysis (SNA), the methods applied, and areas it is put into use with specific focus on the importance of SNA in detecting targeted phishing attacks among organizations and online communities using communication protocols including careful checking for abnormal SNAs and ir This is the case with this article which indicates that SNA can be used to detect particular phishing instances in order for organisations to defend themselves against such attacks, however this approach hinges on a wider set of data and changing mode of social interactions. There needs to be a balance towards either alertness or adaptability. The book has explained every step of this detailed procedure giving an expert opinion on pros and cons of SNA. Equipped with such information, organizations can apply SNA in creating secure digital environments resistant from these attacks.

Introduction:

The communication landscape has shifted in a digitally communicated age. SNA is an important source of information that helps in uncovering the intricate, diverse associations between individuals and groups. The article explores more and more on the aspects of social network, including its definition, benefits, functions, among others [1].

Definition: Decoding the Network

Social network research is, in essence, the systematic study of the relationships and relationships within a network. These relationships can take many forms, from social media friendships to working together in organizations. SNA analyses the patterns that emerge from this combination, with the aim of distinguishing the underlying structures that define social interaction [2].

How it Works: Unravelling Patterns

Social network analytics work is based on the ability to analyse network patterns and relationships in different contexts, such as organizations or online communities Using advanced algorithms and advanced statistical techniques, SNA identifies anomalies and irregularities in that of these systems, thus revealing potentially suspicious activities in, where it plays an important role in detecting phishing attempts.

In terms of cybersecurity, SNA looks at communication systems within organizations. Deviations from this norm are observed to make the difference between consistent information and professional communication. When analysing these systems, SNA may find unusual or unexpected connections, which could indicate a phishing attempt. Cybercriminals often try to masquerade as legitimate communication channels in order to infiltrate organizations. The SNA acts as a vigilant watchdog, detecting obstructions in networks and exposing these malicious attempts.

Figure 1:Unravelling Patterns

Advantages: The Power of Precision

One of the main advantages of social network analytics is the detection accuracy of targeted phishing attacks. Unlike phishing efforts in general, targeted attacks are carefully crafted to fool a specific person or organization. SNA excels in this context by optimizing the unique communication patterns of the target group. By identifying specific interactions within a specific organization, SNA can quickly pinpoint abnormalities, enabling timely intervention [3][1].

Additionally, SNA gives organizations the ability to aggressively protect their digital assets. By identifying potential threats before they escalate, companies can implement stronger security measures, reducing the risks associated with phishing attacks. This proactive approach not only saves valuable resources, but also strengthens the organization’s overall cybersecurity posture.

Limitations: Navigating the Challenges

Although social network analysis involves a very effective tool, there are some limits to it. Among the major problems includes comprehensive data on the social network. Successful research requires access to adequate and diverse data. Inadequate or insufficient data can cause wrong results which would amount to a false negative or not spotting an actual threat at all.

The other restriction originates from the dynamic characteristics of social networks. The relationships among people and groups within an organization are never constant because employees keep on joining groups or unionizing and there is also change in patterns of communication. Such variance may, as a result, yield misleading positives in the case of social network analysis. Misdetection can happen due to network reconfigurations being treated as malicious events and false alarms. Therefore, it implies that in order to do away with this constraint there is an inherent need for a compromise of alertness and adaptability.

Conclusion: Navigating the Networked World

Social network analytics serves as a shining light amidst ever increasing globalization and with regards to cyber security. It is effective in defining complex linkages among its entities, which increases its role as a phishing protection shield. Still, organizations ought to exercise caution since it is essential that they have reliable fresh data and comprehend evolving social dynamics.

Social network analytics continues to be our strongest companion amidst the complicated virtual interplay. It helps in unravelling the complexity of human connectivity and ensures safety and security of virtual space for all people.

References:

  1. Masys, A. J. (Ed.). (2014). Networks and network analysis for defence and security. Springer Science & Business Media.
  2. Johnson, C. W. (2014). Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures. Ergonomics, 57(3), 419-433.
  3. Huda, M., Sutopo, L., Liberty, Febrianto, & Mustafa, M. C. (2022, March). Digital information transparency for cyber security: critical points in social media trends. In Future of Information and Communication Conference (pp. 814-831). Cham: Springer International Publishing.
  4. Vasudevan, S., Piazza, A., & Carr, M. (2023, March). A Decade of Studies on Cyber Security Training in Organizations using Social Network Analysis: A Systematic Literature Review Through Keyword co-Occurrence Network. In 2023 International Conference on Business Analytics for Technology and Security (ICBATS) (pp. 1-6). IEEE.
  5. Kirichenko, L., Radivilova, T., & Carlsson, A. (2018). Detecting cyber threats through social network analysis: short survey. arXiv preprint arXiv:1805.06680.
  6. Arora, A., Arora, A., & McIntyre, J. (2023). Developing Chatbots for Cyber Security: Assessing Threats through Sentiment Analysis on Social Media. Sustainability, 15(17), 13178.
  7. Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., & Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE Internet of Things Journal6(2), 1402-1409.
  8. Stergiou, C. L., Psannis, K. E., & Gupta, B. B. (2021). InFeMo: flexible big data management through a federated cloud system. ACM Transactions on Internet Technology (TOIT)22(2), 1-22.
  9. Gupta, B. B., Perez, G. M., Agrawal, D. P., & Gupta, D. (2020). Handbook of computer networks and cyber security. Springer10, 978-3.
  10. Bhushan, K., & Gupta, B. B. (2017). Security challenges in cloud computing: state-of-art. International Journal of Big Data Intelligence4(2), 81-107.

Cite As

REDDY K.T (2023) The Role of Social Network Analysis in Cyber Defence, Insights2Techinfo, pp.1

64270cookie-checkThe Role of Social Network Analysis in Cyber Defence
Share this:

Leave a Reply

Your email address will not be published.