Russell Allsup, E. Thomas, Bryan Monk, Richard Frank, M. Bouchard
{"title":"儿童剥削中的网络-利用注册者信息评估破坏策略","authors":"Russell Allsup, E. Thomas, Bryan Monk, Richard Frank, M. Bouchard","doi":"10.1145/2808797.2809297","DOIUrl":null,"url":null,"abstract":"This research utilizes social network analysis to determine the success of three different disruption strategies on a child exploitation network extracted from the public internet. Using a custom-written web-crawler called LECEN, data from a set of hyperlinked child-exploitation websites was collected from the Internet. From these data, two types of networks were coded: the nodes of the first network consisted of only website domains, while the nodes of the second were generated using the registrant data, where the nodes represented the legal owners of those same domains. Three attack scenarios were carried out on these two networks: two types of hub attacks (one focused on in-degree and one focused on out-degree) and a bridge attack. Using these disruption strategies, it was found that bridge attacks were more suitable for disrupting the domain networks, while both hub-attacks could be favored when disrupting the network of registrants. These findings have implications for law enforcement, as it provides real-world applications to disruption where registrants may be targeted directly.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"511 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Networking in child exploitation — Assessing disruption strategies using registrant information\",\"authors\":\"Russell Allsup, E. Thomas, Bryan Monk, Richard Frank, M. Bouchard\",\"doi\":\"10.1145/2808797.2809297\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This research utilizes social network analysis to determine the success of three different disruption strategies on a child exploitation network extracted from the public internet. Using a custom-written web-crawler called LECEN, data from a set of hyperlinked child-exploitation websites was collected from the Internet. From these data, two types of networks were coded: the nodes of the first network consisted of only website domains, while the nodes of the second were generated using the registrant data, where the nodes represented the legal owners of those same domains. Three attack scenarios were carried out on these two networks: two types of hub attacks (one focused on in-degree and one focused on out-degree) and a bridge attack. Using these disruption strategies, it was found that bridge attacks were more suitable for disrupting the domain networks, while both hub-attacks could be favored when disrupting the network of registrants. These findings have implications for law enforcement, as it provides real-world applications to disruption where registrants may be targeted directly.\",\"PeriodicalId\":371988,\"journal\":{\"name\":\"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)\",\"volume\":\"511 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-08-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2808797.2809297\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2808797.2809297","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Networking in child exploitation — Assessing disruption strategies using registrant information
This research utilizes social network analysis to determine the success of three different disruption strategies on a child exploitation network extracted from the public internet. Using a custom-written web-crawler called LECEN, data from a set of hyperlinked child-exploitation websites was collected from the Internet. From these data, two types of networks were coded: the nodes of the first network consisted of only website domains, while the nodes of the second were generated using the registrant data, where the nodes represented the legal owners of those same domains. Three attack scenarios were carried out on these two networks: two types of hub attacks (one focused on in-degree and one focused on out-degree) and a bridge attack. Using these disruption strategies, it was found that bridge attacks were more suitable for disrupting the domain networks, while both hub-attacks could be favored when disrupting the network of registrants. These findings have implications for law enforcement, as it provides real-world applications to disruption where registrants may be targeted directly.