Malicious entity detection using fine-grained DNA-inspired behavioural modelling
Project/Area Number |
21F20785
|
Research Category |
Grant-in-Aid for JSPS Fellows
|
Allocation Type | Single-year Grants |
Section | 外国 |
Review Section |
Basic Section 61030:Intelligent informatics-related
|
Research Institution | National Institute of Informatics |
Principal Investigator |
高須 淳宏 国立情報学研究所, コンテンツ科学研究系, 教授 (90216648)
|
Co-Investigator(Kenkyū-buntansha) |
ANDRIOTIS PANAGIOTIS 国立情報学研究所, コンテンツ科学研究系, 外国人特別研究員
|
Project Period (FY) |
2021-11-18 – 2023-03-31
|
Project Status |
Granted (Fiscal Year 2022)
|
Budget Amount *help |
¥1,100,000 (Direct Cost: ¥1,100,000)
Fiscal Year 2022: ¥600,000 (Direct Cost: ¥600,000)
Fiscal Year 2021: ¥500,000 (Direct Cost: ¥500,000)
|
Keywords | information security |
Outline of Research at the Start |
本研究は,ソーシャルメディアにおけるボットに代表される各種迷惑行為を行うアカウントの検出技術を構築することを目的としている.迷惑行為を行うアカウントは特有な行動履歴パターンを持つという仮定のもと,新たな行動履歴のパターンを記述するためのパターンの表現法とそ獲得アルゴリズム,パターン表現を用いた迷惑行為アカウントの判定手法を構築することにより,より安全なソーシャルメディアの利用環境を構築することをめざす.
|
Outline of Annual Research Achievements |
We did a literature review of papers dealing with the problem of bot detection on social media networks (focused on Twitter) because the inspiration for the project was driven from this problem. It was obvious that since the project was envisioned, automated accounts on Twitter have become more sophisticated and more difficult to detect, as they are now more able to mimic human behaviour. Thus, we invested to aggregate Cyber Security with Bioinformatics. We worked towards three strands to achieve the integration of Bioinformatics principles in Cyber Security research: (1) a theoretical assessment of the complexity of a novel graphical password scheme using “k-mers”, (2) aggregation of DNA-inspired behavioural modelling within a ground-breaking field of research for social networks, and (3) envision to transfer knowledge learned from the latter direction of research to the problem of malicious software detection in mobile environments, using GNNs. We initially explored how we can embed Bioinformatics (in a theoretical level) to the problem of quantifying complexity (and security) for graphical passwords. We therefore implemented a graphical password scheme and tested its usability on mobile devices running the Android operating system. Then, we used Lothaire’s Combinatorics theory (definition of “finite word”, followed by the simple metric “complexity of a word”) with basic Bioinformatics (k-mers) and we introduced a complexity metric to quantify the proposed graphical password scheme space, aiming to identify how it compares with other graphical password schemes.
|
Current Status of Research Progress |
Current Status of Research Progress
2: Research has progressed on the whole more than it was originally planned.
Reason
This research work completed the first part of our plan and it led to the publication of a research paper to the HCI International 2022 conference, to be presented virtually, late June 2022. The paper is titled “P. Andriotis, M. Kirby, A. Takasu, Bu-dash: A universal and dynamic graphical password scheme, in: A. Moallem (Ed.), HCI for Cybersecurity, Privacy and Trust, 2022”, and a preprint can be found here: https://andriotisp.github.io/blog/2022/budashb/. Additionally, we submitted an extended version of this paper that incorporates the findings of our analysis on the complexity characteristics of the scheme. The paper is now under review.
|
Strategy for Future Research Activity |
We now move towards the implementation of the next part of the project. To this end, we have already applied and acquired licence from Twitter to use their API for academic purposes. This will allow us to collect data from the Twitter environment and compare our method with the state of the art in bot detection. We will also use another dataset as a baseline to investigate how our approach of incorporating GNNs with DNA-inspired behavioural modelling works against well-known solutions based on GNNs. The fundamental idea of our approach is to use neighbourhood information derived from an account into question (2-hops away from it) utilising GNNs and accumulate this information with the account’s behavioural patterns, namely their digital DNA.
|
Report
(1 results)
Research Products
(2 results)