CAREER: Holistic Framework for Constructing Dynamic Malicious Knowledge Bases in Social Networks

Information

  • NSF Award
  • 2348452
Owner
  • Award Id
    2348452
  • Award Effective Date
    10/1/2023 - 8 months ago
  • Award Expiration Date
    9/30/2027 - 3 years from now
  • Award Amount
    $ 194,465.00
  • Award Instrument
    Continuing Grant

CAREER: Holistic Framework for Constructing Dynamic Malicious Knowledge Bases in Social Networks

Social networks’ reach makes them a tempting target for malicious users to post spam messages intended to pollute social environments, deceive normal users, or sway political opinions. The increasing amount of malicious content has resulted in growing economic loss and adverse social impacts. This project aims to mitigate malicious online behavior by modeling it through a dynamic malicious knowledge graph. Inspired by human learning processes, the graph will gradually accumulate knowledge, becoming over time a powerful tool for analyzing and mitigating online misbehavior. Through modeling the relationships between concepts, content, and actors online, the graph will support research on the evolution of malicious communities and the detection of malicious behavior; the graph itself will be designed to be adaptable across security contexts, and the underlying methods designed to be usable in other applications that require modeling interaction online. To this end, the team will share datasets and software toolkits developed in this project with the research community, and the findings will be integrated into instructional materials in the form of book chapters, course materials, and tutorials to be widely disseminated. The team will also engage undergraduate students, including those from under-represented groups in computing, through a summer tutorial series and research activities. <br/><br/>This project focuses on developing a holistic framework to construct the dynamic malicious knowledge graph, organized around three main thrusts. The first thrust is to develop a real-time malicious content detector that addresses challenging issues such as feature variations, real-time scalable processing, and label scarcity. The second thrust is to conduct periodical analysis on the accumulated data to identify emerging malicious patterns, behaviors, and latent features with the goal of identifying sophisticated, stealthy malicious actors while growing the graph’s size and structure. The third thrust focuses on the design of the knowledge graph itself, including its structure, construction, label-aided evolution, and continuous self-monitoring. The resulting solutions will be first evaluated on real-world datasets to be gathered and then deployed into real-world social networks for full evaluation.<br/><br/>This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

  • Program Officer
    Dan Cosleydcosley@nsf.gov7032928832
  • Min Amd Letter Date
    10/23/2023 - 7 months ago
  • Max Amd Letter Date
    10/23/2023 - 7 months ago
  • ARRA Amount

Institutions

  • Name
    University of Delaware
  • City
    NEWARK
  • State
    DE
  • Country
    United States
  • Address
    220 HULLIHEN HALL
  • Postal Code
    197160099
  • Phone Number
    3028312136

Investigators

  • First Name
    Xu
  • Last Name
    Yuan
  • Email Address
    xyuan@udel.edu
  • Start Date
    10/23/2023 12:00:00 AM

Program Element

  • Text
    Secure &Trustworthy Cyberspace
  • Code
    8060

Program Reference

  • Text
    SaTC: Secure and Trustworthy Cyberspace
  • Text
    CAREER-Faculty Erly Career Dev
  • Code
    1045
  • Text
    EXP PROG TO STIM COMP RES
  • Code
    9150