研究課題/領域番号 |
21F20785
|
研究種目 |
特別研究員奨励費
|
配分区分 | 補助金 |
応募区分 | 外国 |
審査区分 |
小区分61030:知能情報学関連
|
研究機関 | 国立情報学研究所 |
研究代表者 |
高須 淳宏 国立情報学研究所, コンテンツ科学研究系, 教授 (90216648)
|
研究分担者 |
ANDRIOTIS PANAGIOTIS 国立情報学研究所, コンテンツ科学研究系, 外国人特別研究員
|
研究期間 (年度) |
2021-11-18 – 2023-03-31
|
研究課題ステータス |
交付 (2022年度)
|
配分額 *注記 |
1,100千円 (直接経費: 1,100千円)
2022年度: 600千円 (直接経費: 600千円)
2021年度: 500千円 (直接経費: 500千円)
|
キーワード | information security |
研究開始時の研究の概要 |
本研究は,ソーシャルメディアにおけるボットに代表される各種迷惑行為を行うアカウントの検出技術を構築することを目的としている.迷惑行為を行うアカウントは特有な行動履歴パターンを持つという仮定のもと,新たな行動履歴のパターンを記述するためのパターンの表現法とそ獲得アルゴリズム,パターン表現を用いた迷惑行為アカウントの判定手法を構築することにより,より安全なソーシャルメディアの利用環境を構築することをめざす.
|
研究実績の概要 |
We did a literature review of papers dealing with the problem of bot detection on social media networks (focused on Twitter) because the inspiration for the project was driven from this problem. It was obvious that since the project was envisioned, automated accounts on Twitter have become more sophisticated and more difficult to detect, as they are now more able to mimic human behaviour. Thus, we invested to aggregate Cyber Security with Bioinformatics. We worked towards three strands to achieve the integration of Bioinformatics principles in Cyber Security research: (1) a theoretical assessment of the complexity of a novel graphical password scheme using “k-mers”, (2) aggregation of DNA-inspired behavioural modelling within a ground-breaking field of research for social networks, and (3) envision to transfer knowledge learned from the latter direction of research to the problem of malicious software detection in mobile environments, using GNNs. We initially explored how we can embed Bioinformatics (in a theoretical level) to the problem of quantifying complexity (and security) for graphical passwords. We therefore implemented a graphical password scheme and tested its usability on mobile devices running the Android operating system. Then, we used Lothaire’s Combinatorics theory (definition of “finite word”, followed by the simple metric “complexity of a word”) with basic Bioinformatics (k-mers) and we introduced a complexity metric to quantify the proposed graphical password scheme space, aiming to identify how it compares with other graphical password schemes.
|
現在までの達成度 (区分) |
現在までの達成度 (区分)
2: おおむね順調に進展している
理由
This research work completed the first part of our plan and it led to the publication of a research paper to the HCI International 2022 conference, to be presented virtually, late June 2022. The paper is titled “P. Andriotis, M. Kirby, A. Takasu, Bu-dash: A universal and dynamic graphical password scheme, in: A. Moallem (Ed.), HCI for Cybersecurity, Privacy and Trust, 2022”, and a preprint can be found here: https://andriotisp.github.io/blog/2022/budashb/. Additionally, we submitted an extended version of this paper that incorporates the findings of our analysis on the complexity characteristics of the scheme. The paper is now under review.
|
今後の研究の推進方策 |
We now move towards the implementation of the next part of the project. To this end, we have already applied and acquired licence from Twitter to use their API for academic purposes. This will allow us to collect data from the Twitter environment and compare our method with the state of the art in bot detection. We will also use another dataset as a baseline to investigate how our approach of incorporating GNNs with DNA-inspired behavioural modelling works against well-known solutions based on GNNs. The fundamental idea of our approach is to use neighbourhood information derived from an account into question (2-hops away from it) utilising GNNs and accumulate this information with the account’s behavioural patterns, namely their digital DNA.
|