Faculty Publications

Document Type

Article

Publication Date

January 2011

Publication Title

European Intelligence and Security Informatics Conference

First Page

163

Last Page

170

Keywords

Social Network Analysis, Child Exploitation, Network Disruption, Internet

Disciplines

Criminology

Abstract

This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are most effective at disrupting two online child pornography networks in terms of outcome measures that include density, clustering, compactness, and average path length. For this purpose, two networks were extracted using a web-crawler that recursively follows child exploitation sites. It was found that different attack strategies were warranted depending on the outcome measure and the network structure. Overall, hub attacks were most effective at reducing network density and clustering, whereas fragmentation attacks were most effective at reducing the network's distance-based cohesion and average path length. In certain cases, bridge attacks were almost as effective as some of these measures.

Comments

© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version of the article may be found online at: http://doi.ieeecomputersociety.org/10.1109/EISIC.2011.32

Included in

Criminology Commons

Share

COinS