Skip to main content

Applying Social Network Analysis to Security

Phillips, Elizabeth, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2015) Applying Social Network Analysis to Security. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67512)

PDF Publisher pdf
Language: English

Restricted to Repository staff only
[thumbnail of csss2015_phillips_et_al.pdf]


In this paper, we set out to explore some of the many ways in which Social Network

Analysis (SNA) can be applied to the field of security. In particular, we investigate what

information someone (e.g., an attacker) could infer if they were able to gather data on a

person’s friend-groups or device communications (e.g., email interactions) and whether

this could be used to predict the “hierarchical importance” of the individual. This research

could be applied to various social networks to help with criminal investigations by

identifying the users with high influence within the criminal gangs on DarkWeb Forums, in

order to help identify the ring-leaders of the gangs. For this study we conducted an initial

investigation on the Enron email dataset, and investigated the effectiveness of existing

SNA metrics in establishing hierarchy from the social network created from the email

communications metadata. We then tested the metrics on a fresh dataset to assess the

practicality of our results to a new network.

Item Type: Conference or workshop item (Paper)
Subjects: H Social Sciences
Q Science
T Technology
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
Depositing User: Jason Nurse
Date Deposited: 02 Jul 2018 16:41 UTC
Last Modified: 17 Aug 2022 11:02 UTC
Resource URI: (The current URI for this page, for reference purposes)
Nurse, Jason R. C.:
  • Depositors only (login required):


Downloads per month over past year