Prajit Limsaiprom

Work place: School of Information Technology, Sripatum University, Bangkok 10900, Thailand

E-mail: crossprajit@yahoo.com

Website:

Research Interests: Visualization, Computer Graphics and Visualization, Information Security, Network Security, Analysis of Algorithms, Social Sciences

Biography

Prajit Limsaiprom received the B. Sc in Applied Statistics from King Mongkut's Institute of Technology, Ladkrabang, Bangkok, THAILAND in 1989, the Master Degree in Information Technology in Business (Statistics) from Chulalongkorn University, Bangkok, THAILAND in 2001. She currently is Information Technology Manager, National Blood Centre, Thai Red Cross Society, Bangkok, THAILAND and presently a Ph.D. candidate in School of Information Technology, Sripatum University, Bangkok, THAILAND. Her research interests in the area of Data Mining Analysis, Information Security Visualization, Social Network Analysis and Social Networks Security. She has recorded in Who’s Who in the world in Information Technology.

Author Articles
Security Visualization Analytics Model in Online Social Networks Using Data Mining and Graphbased Structure Algorithms

By Prajit Limsaiprom Prasong Praneetpolgrang Pilastpongs Subsermsri

DOI: https://doi.org/10.5815/ijitcs.2014.08.01, Pub. Date: 8 Jul. 2014

The rise of the Internet accelerates the creation of various large-scale online social networks, which can be described the relationships and activities between human beings. The online social networks relationships in real world are too big to present with useful information to identify the criminal or cyber-attacks. This research proposed new information security analytic model for online social networks, which called Security Visualization Analytics (SVA) Model. SVA Model used the set of algorithms (1) Graph-based Structure algorithm to analyze the key factors of influencing nodes about density, centrality and the cohesive subgroup to identify the influencing nodes of anomaly and attack patterns (2) Supervised Learning with oneR classification algorithm was used to predict new links from such influencing nodes in online social networks on discovering surprising links in the existing ones of influencing nodes, which nodes in online social networks will be linked next from the attacked influencing nodes to monitor the risk. The results showed 42 influencing nodes of anomaly and attack patterns and can be predict 31 new links from such nodes were achieved by SVA Model with the accuracy of confidence level 95.0%. The new proposed model and results illustrated SVA Model was significance analysis. Such understanding can lead to efficient implementation of tools to links prediction in online social networks. They could be applied as a guide to further investigate of social networks behavior to improve the security model and notify the risk, computer viruses or cyber-attacks for online social networks in advance.

[...] Read more.
Visualization of Influencing Nodes in Online Social Networks

By Prajit Limsaiprom Prasong Praneetpolgrang Pilastpongs Subsermsri

DOI: https://doi.org/10.5815/ijcnis.2014.05.02, Pub. Date: 8 Apr. 2014

The rise of the Internet accelerates the creation of various large-scale online social networks. The online social networks have brought considerable attention as an important medium for the information diffusion model, which can be described the relationships and activities among human beings. The online social networks’ relationships in the real world are too big to present with useful information to identify the criminal or cyber attacks. The methodology for information security analysis was proposed with the complementary of Cluster Algorithm and Social Network Analysis, which presented anomaly and cyber attack patterns in online social networks and visualized the influencing nodes of such anomaly and cyber attacks. The closet vertices of influencing nodes could not avoid from the harmfulness in social networking. The new proposed information security analysis methodology and results were significance analysis and could be applied as a guide for further investigate of social network behavior to improve the security model and notify the risk, computer viruses or cyber attacks for online social networks in advance.

[...] Read more.
Other Articles