TY - GEN
T1 - An information theoretic framework for active de-anonymization in social networks based on group memberships
AU - Shirani, Farhad
AU - Garg, Siddharth
AU - Erkip, Elza
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2018/1/17
Y1 - 2018/1/17
N2 - In this paper, a new mathematical formulation for the problem of de-anonymizing social network users by actively querying their membership in social network groups is introduced. In this formulation, the attacker has access to a noisy observation of the group membership of each user in the social network. When an unidentified victim visits a malicious website, the attacker uses browser history sniffing to make queries regarding the victim's social media activity. Particularly, it can make polar queries regarding the victim's group memberships and the victim's identity. The attacker receives noisy responses to her queries. The goal is to de-anonymize the victim with the minimum number of queries. Starting with a rigorous mathematical model for this active de-anonymization problem, an upper bound on the attacker's expected query cost is derived, and new attack algorithms are proposed which achieve this bound. These algorithms vary in computational cost and performance. The results suggest that prior heuristic approaches to this problem provide sub-optimal solutions.
AB - In this paper, a new mathematical formulation for the problem of de-anonymizing social network users by actively querying their membership in social network groups is introduced. In this formulation, the attacker has access to a noisy observation of the group membership of each user in the social network. When an unidentified victim visits a malicious website, the attacker uses browser history sniffing to make queries regarding the victim's social media activity. Particularly, it can make polar queries regarding the victim's group memberships and the victim's identity. The attacker receives noisy responses to her queries. The goal is to de-anonymize the victim with the minimum number of queries. Starting with a rigorous mathematical model for this active de-anonymization problem, an upper bound on the attacker's expected query cost is derived, and new attack algorithms are proposed which achieve this bound. These algorithms vary in computational cost and performance. The results suggest that prior heuristic approaches to this problem provide sub-optimal solutions.
UR - http://www.scopus.com/inward/record.url?scp=85047916070&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85047916070&partnerID=8YFLogxK
U2 - 10.1109/ALLERTON.2017.8262775
DO - 10.1109/ALLERTON.2017.8262775
M3 - Conference contribution
AN - SCOPUS:85047916070
T3 - 55th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2017
SP - 470
EP - 477
BT - 55th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 55th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2017
Y2 - 3 October 2017 through 6 October 2017
ER -