2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2017
DOI: 10.1109/allerton.2017.8262775
|View full text |Cite
|
Sign up to set email alerts
|

An information theoretic framework for active de-anonymization in social networks based on group memberships

Abstract: In this paper, a new mathematical formulation for the problem of de-anonymizing social network users by actively querying their membership in social network groups is introduced. In this formulation, the attacker has access to a noisy observation of the group membership of each user in the social network. When an unidentified victim visits a malicious website, the attacker uses browser history sniffing to make queries regarding the victim's social media activity. Particularly, it can make polar queries regardi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 13 publications
(25 citation statements)
references
References 5 publications
0
25
0
Order By: Relevance
“…In this section, we provide a rigorous formulation of the active fingerprinting problem. This is a generalization of the formulation provided in [11]. We model the group memberships in the social network by a bipartite graph.…”
Section: Problem Formulationmentioning
confidence: 99%
See 4 more Smart Citations
“…In this section, we provide a rigorous formulation of the active fingerprinting problem. This is a generalization of the formulation provided in [11]. We model the group memberships in the social network by a bipartite graph.…”
Section: Problem Formulationmentioning
confidence: 99%
“…The variable Z represents the correct response to the attacker's query, where Z = 1 indicates a 'yes' response, and the variable Y represents the noisy response received by the attacker after making the query. As explained in [11], the set of possible queries is divided into two categories: i) User identity (UID): a UID query asks if the unknown victim u J is user u j in the network, and ii) group Membership Queries (GM): a GM asks if the unknown victim u J is a member of the group r i . Hence, the conditional distributions P UID Y|Z and P GM Y|Z are the distribution of the response received by the attacker given the correct response to the attacker's UID and GM queries, respectively.…”
Section: Problem Formulationmentioning
confidence: 99%
See 3 more Smart Citations