Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm

Document Type : Original Article

Authors

1 PhD student, Shahid Bahonar University of Kerman, Kerman, Iran.

2 Associate Professor, Shahid Bahonar University of Kerman, Kerman, Iran.

Abstract

Cyber networks are considered to be a type of complex and free-scale networks due to the structure and mode of communication within the network. Identifying communities is one of the most important methods of network analysis in order to understand the structure and relationships between network members. With the development of cyber networks, new challenges have been created for users in terms of information security

One of the goals of identifying the communities in cyber networks is to prevent the spread of malware and cyber attacks. For this purpose, in order to prevent and deal with network attacks and intrusions, the communities in the network should be identified in order to significantly reduce the damage and attacks by attackers by securing and reviving the communities as well as implementing defense policies appropriate to each community. In this article, a method for detecting cyber communities by spectral clustering algorithm is presented. Also, by using the property of the normalized Laplace matrix in this algorithm, it is possible to predict the number of suitable cyber communities. In order to evaluate the detection process, two criteria Silhouette Value and Jaccard index are used. The results obtained from the evaluation criteria confirm the effectiveness of the proposed method.

Keywords

Main Subjects


Smiley face

B. Falahati and Y. Fu, “A study on interdependencies of cyber-power networks in smart grid applications,” 2012 IEEE PES Innov. Smart Grid Technol. ISGT 2012, pp. 1–8, 2012, doi: 10.1109/ISGT.2012.6175593.
[2]   L. X. Yang, P. Li, X. Yang, and Y. Y. Tang, “Security Evaluation of the Cyber Networks under Advanced Persistent Threats,” IEEE Access, vol. 5, pp. 20111–20123, 2017, doi: 10.1109/ACCESS.2017.2757944.
[3]   M. D. Mohsen Hesabi, “An Improved Method for Malware Attack Detection in Cloud Computing Using Collective Learning,” Sci. J. Electron. Cyber Def., vol. 10, no. 4, pp. 33–39, 2023, [Online]. Available: https://ecdj.ihu.ac.ir/article_207864.html. (in persian).
[4]   Y. Javed, M. A. Khayat, A. A. Elghariani, and A. Ghafoor, “PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks,” IEEE Trans. Dependable Secur. Comput., pp. 1–17, 2023, doi: 10.1109/TDSC.2023.3240315.
[5]   H. Deshmukh and J. Springer, “Identifying Bipartite Subgraphs for Community Detection in Very Large Scale Cyber Networks,” Proc. - 2018 IEEE Int. Conf. Big Data, Big Data 2018, pp. 4789–4797, 2019, doi: 10.1109/BigData.2018.8622614.
[6]   A. Croitoru, N. Wayant, A. Crooks, J. Radzikowski, and A. Stefanidis, “Linking cyber and physical spaces through community detection and clustering in social media feeds,” Comput. Environ. Urban Syst., vol. 53, pp. 47–64, 2015, doi: 10.1016/j.compenvurbsys.2014.11.002.
[7]   P. Mane, S. Shanbhag, T. Kamath, P. Mackey, and J. Springer, “Analysis of Community Detection Algorithms for Large Scale Cyber Networks,” Proc. 2016 Inf. Secur. Res. Educ. Conf., no. 2016, 2016.
[8]   X. Hu, J. Han, and N. Cercone, “Discovering Cyber Communities from the WWW,” Proc. - IEEE Comput. Soc. Int. Comput. Softw. Appl. Conf., pp. 590–594, 2003, doi: 10.1109/cmpsac.2003.1245400.
[9]   L. Hu, X. Pan, Z. Tang, and X. Luo, “A Fast Fuzzy Clustering Algorithm for Complex Networks via a Generalized Momentum Method,” IEEE Trans. Fuzzy Syst., vol. 30, no. 9, pp. 3473–3485, 2022, doi: 10.1109/TFUZZ.2021.3117442.
[10] T. R. Smith and N. Bosanac, “Constructing a set of motion primitives in the circular restricted three-body problem via clustering,” Adv. Astronaut. Sci., vol. 171, pp. 1283–1302, 2020.
[11] N. Nejjari, S. Lahlou, O. Fadi, K. Zkik, M. Oudani, and H. Benbrahim, “Conflict spectrum: An empirical study of geopolitical cyber threats from a social network perspective,” 2021 8th Int. Conf. Soc. Netw. Anal. Manag. Secur. SNAMS 2021, 2021, doi: 10.1109/SNAMS53716.2021.9732155.
[12] F. Gasparetti, G. Sansonetti, and A. Micarelli, “Community detection in social recommender systems: a survey,” Appl. Intell., vol. 51, no. 6, pp. 3975–3995, 2021, doi: 10.1007/s10489-020-01962-3.
[13] Amna, N. M. Nawi, M. Aamir, and M. F. Mushtaq, The Comparative Performance Analysis of Clustering Algorithms, vol. 457 LNNS. Springer International Publishing, 2022.
[14] U. Von Luxburg, “A tutorial on spectral clustering,” Stat. Comput., vol. 17, no. 4, pp. 395–416, 2007, doi: 10.1007/s11222-007-9033-z.
[15] K. Berahmand, M. Mohammadi, A. Faroughi, and R. P. Mohammadiani, “A novel method of spectral clustering in attributed networks by constructing parameter-free affinity matrix,” Cluster Comput., vol. 25, no. 2, pp. 869–888, 2022, doi: 10.1007/s10586-021-03430-0.
[16] Z. A. El Mouden, A. Jakimi, and M. Hajar, “An application of spectral clustering approach to detect communities in data modeled by graphs,” in ACM International Conference Proceeding Series, 2019, vol. Part F1481, doi: 10.1145/3320326.3320330.
[17] J. Qiu, J. Peng, and Y. Zhai, “Network community detection based on spectral clustering,” in Proceedings - International Conference on Machine Learning and Cybernetics, 2014, vol. 2, pp. 648–652, doi: 10.1109/ICMLC.2014.7009685.
[18] M. Shutaywi and N. N. Kachouie, “Silhouette analysis for performance evaluation in machine learning with applications to clustering,” Entropy, vol. 23, no. 6, pp. 1–17, 2021, doi: 10.3390/e23060759.
[19] L. da F. Costa, “Further Generalizations of the Jaccard Index,” 2021, [Online]. Available: http://arxiv.org/abs/2110.09619.
Volume 12, Issue 1 - Serial Number 45
No. 45, Spring 2024
June 2024
Pages 77-87
  • Receive Date: 14 February 2024
  • Revise Date: 11 April 2024
  • Accept Date: 08 May 2024
  • Publish Date: 02 June 2024