Netinfo Security ›› 2017, Vol. 17 ›› Issue (12): 67-72.doi: 10.3969/j.issn.1671-1122.2017.12.012

• Orginal Article • Previous Articles     Next Articles

User Attribute Completion Attack in Social Networks Based on Node2vec

Yang PEI1,2,3, Xuexin QU1,2,3, Xiaobo GUO1, Dingyang DUAN1   

  1. 1.Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    2.Center of Data Assurance and Communication Security, Chinese Academy of Sciences, Beijing 100093, China
    3.School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
  • Received:2017-08-01 Online:2017-12-20 Published:2020-05-12

Abstract:

In social networks, there is an attack threatening its content security by acquiring user private attributes from attribute inference completion. Traditional user attribute completion methods like unsupervised learning and supervised learning fail to effectively combine homogeneity with structural similarity. This paper presents a user attribute completion attacking method based on implicit expression, which abstracts user attribute completion as a supervised classification problem. The basic idea is to use node2vec algorithm to map the user nodes in social networks into vectors, and then use the clustering method to calculate the community where a node is located, construct the classification model in the community, and use this model to predict the missing attributes of the user. This paper verifies that this algorithm can improve the accuracy of user attribute completion in social networks on a real data set.

Key words: attribute completion, homogeneity, structural similarity, node2vec, content security

CLC Number: