Premium
Defense against malicious URL spreading in micro‐blog network with hub nodes
Author(s) -
Liu Xin,
Wang Feng,
Yang Yang,
Xu Jiuyun,
Zou Pingjun,
Wang Yiwen
Publication year - 2016
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.3890
Subject(s) - computer science , computer security , computer network , centrality , node (physics) , redundancy (engineering) , engineering , mathematics , structural engineering , combinatorics , operating system
Summary The micro‐blog network is one of the most popular social networking platforms. By calculating the degree centrality, we found that hub nodes play an important role in micro‐blog networks, which is the main power of message forwarding. To improve the security of the micro‐blog network, we proposed a defending scheme against malicious Uniform Resource Locator (URL) diffusing in micro‐blog networks with hub nodes. After a node found a new malicious URL, it will edit a warning massage about the malicious URL. If the normal node obtains malicious URL warning message, it will send private message with the warning message to the hub node and update its blog article. The malicious URL warning messages spread rapidly in the whole networks in a short period because of the influence of Hub nodes. At the same time, we add the comparison mechanism to reduce the redundancy of spreading the warning message in the networks. So the security of entire micro‐blog networks can be improved against malicious URL without increasing the network load. Experiments show that our scheme can effectively defend against the malicious URL in the any scale of micro‐blog networks. Copyright © 2016 John Wiley & Sons, Ltd.