M. R. THAKUR, S. SANYAL
Copyright © 2013 SciRes. SN
45
7. Conclusion
The suggested technique thus addresses the issue of ma-
licious and spam interactions among profiles in a social
networking platform in an effective way by correlating
the scenario with the interactions in the society. The use
of the weighted social graph imparts the suggested tech-
nique the ability to not only view and understand the way
individuals are connected in a social networking platform
but also reflects the trust level among individuals which
helps to filter out malicious and unwanted spam interac-
tions. It must be noted that the suggested technique will
be unable to prevent spam and malicious interaction if
already existing legitimate profiles with high trust level
are compromised. The solution to this problem is outside
the scope of this work however a potential solution to
this problem is the N/R one time password system sug-
gested in [19]. The problems of passwords of legitimate
profiles being disclosed by means of attacks like pass-
word guessing attacks can be addresses by the approach
suggested in [19].
REFERENCES
[1] Social Networking Statistics, URL (last checked 14 Dec
2012)
http://www.internetsafety101.org/Socialnetworkingstats.h
tm.
[2] E. F. Walter, S. Battiston and F. Schweitzer, “Persona-
lized and Dynamic Trust in Social Networks,” Proceed-
ings of The Third ACM Conference on Recommender
Systems, Association for Computing Machinery, New
York, pp. 197-204.
[3] E. F. Walter, S. Battiston and F. Schweitzer, “A Model of
a Trust-Based Recommendation System on a Social
Network,” Autonomous Agents and Multi-Agent Systems,
Vol. 16, No. 1, 2008, pp. 57-74.
doi:10.1007/s10458-007-9021-x
[4] Uniform Resource Locator, “Weighted Graphs.” (last
checked 02 Dec 2012)
http://courses.cs.vt.edu/~cs3114/Fall10/Notes/T22.Weigh
tedGraphs.pdf.
[5] A. K. Trivedi, R. Arora, R. Kapoor, Sudip Sanyal and Su-
gata Sanyal, “A Semi-Distributed Reputation-Based In-
trusion Detection System for Mobile Ad hoc Networks,”
Journal of Information Assurance and Security, Vol. 1,
No. 4, 2006, pp. 265-274.
[6] A. K. Trivedi, R. Kapoor, R. Arora, Sudip Sanyal and
Sugata Sanyal, “RISM—Reputation Based Intrusion De-
tection System for Mobile Ad hoc Networks,” Third In-
ternational Conference on Computers and Devices for
Communications, Institute of Radio Physics and Elec-
tronics, University of Calcutta, Kolkata, 18-20 December
2006, pp. 234-237.
[7] P. A. Chirita, J. Diederich and W. Nejdl, “MailRank:
Using Ranking for Spam Detection,” Proceedings of the
14th ACM international conference on Information and
Knowledge Management, Bremen, 31 October-5 Novem-
ber 2005.
[8] J. Golbeck and J. Hendler, “Reputation Network Analysis
for Email Filtering,” Proceedings of the 1st Conference
on Email and Anti-Spam, Mountain View, 2004.
[9] B. Markines, C. Cattuto and F. Menczer, “Social Spam
Detection,” Proceedings of the 5th International Work-
shop on Adversarial Information Retrieval on the Web,
Madrid, 21-21 April 2009. doi:10.1145/1531914.1531924
[10] H. Y. Lam and D. Y. Yeung, “A Learning Approach to
Spam Detection based on Social Networks,” Proceedings
of the Fourth Conference on Email and Anti-Spam,
Mountain View, 2007.
[11] R. Bhadauria and S. Sanyal, “Survey on Security Issues
in Cloud Computing and Associated Mitigation Tech-
niques,” International Journal of Computer Applications,
Vol. 47, No. 18, Foundation of Computer Science, New
York, 2012, pp. 47-66. doi:10.5120/7292-0578
[12] R. A. Vasudevan, A. Abraham, S. Sa nyal and D. P. Agra -
wal, “Jigsaw-Based Secure Data Transfer over Computer
Networks,” IEEE International Conference on Informa-
tion Technology: Coding and Computing, Las Vegas, Vol.
1, 2004, pp. 2-6.
[13] A. Abraham, R. Jain, S. Sanyal and S. Y. Han, “SCIDS:
A Soft Computing Intrusion Detection System,” In: A.
Sen, et al., Eds., 6th International Workshop on Distri-
buted Computing, Lecture Notes in Computer Science,
Vol. 3326, Springer Verlag, Berlin, pp. 252-257.
[14] S. Sanyal, D. Gada, R. Gogri, P. Rathod, Z. Dedhia and N.
Mody, “Security Scheme for Distributed DoS in Mobile
Ad Hoc Networks,” Technical Report, School of Tech-
nology & Computer Science, Tata Institute Of Funda-
mental Research 2004.
[15] S. Pal, S. Khatua, N. Chaki and S. Sanya l, “A New Trust-
ed and Collaborative Agent Based Approach for Ensuring
Cloud Security,” Annals of Faculty Engineering Hune-
doara International Journal of Engineering, Vol. 10, No.
1, 2012, pp. 71-78.
[16] P. Rathod, N. Mody, D. G., Rajat G., Z. Dedhia, S. San-
yal and A. Abraham, “Security Scheme for Malicious
Node Detection in Mobile Ad Hoc Networks,” In: A. Sen
et al., Eds., 6th International Workshop on Distributed
Computing, Lecture Notes in Computer Science, Vol.
3326, Springer Verlag, Berlin, 2004, pp. 541-542.
[17] Uniform Resource Locator, “Social Graph.” (last checked
on 11 Dec 2012)
http://en.wikipedia.org/wiki/Social_graph.
[18] Uniform Resource Locator, “Recommender System.”
(last checked 10 Dec 2012)
http://en.wikipedia.org/wiki/Recommender_system.
[19] V. Goyal, V. Kumar, M. Singh, A. Abraham and S.
Sanyal, “CompChall: Addressing Password Guess-
ing Attacks,” IEEE International Conference on In-
formation Technology: Coding and Computing, Vol.
1, 4-6 April 2005, pp 73 9- 7 44 .