Measuring the Mixing Time of Social Graphs Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim Computer Science and Engineering Department University of Minnesota.

Slides:



Advertisements
Similar presentations
Defending against large-scale crawls in online social networks Mainack Mondal Bimal Viswanath Allen Clement Peter Druschel Krishna Gummadi Alan Mislove.
Advertisements

An analysis of Social Network-based Sybil defenses Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University.
Analysis and Modeling of Social Networks Foudalis Ilias.
Krishna P. Gummadi Networked Systems Research Group MPI-SWS
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
An Analysis of Social Network-Based Sybil Defenses Sybil Defender
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
Toward an Optimal Social Network Defense Against Sybil Attacks Haifeng Yu National University of Singapore Phillip B. Gibbons Intel Research Pittsburgh.
Qiang Cao Duke University
Spectrum Based RLA Detection Spectral property : the eigenvector entries for the attacking nodes,, has the normal distribution with mean and variance bounded.
Xiaowei Ying Xintao Wu Univ. of North Carolina at Charlotte 2009 SIAM Conference on Data Mining, May 1, Sparks, Nevada Graph Generation with Prescribed.
DATA MINING LECTURE 12 Link Analysis Ranking Random walks.
Haifeng Yu National University of Singapore
Sybil Attack Hyeontaek Lim November 12, 2010.
1 SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu Michael Kaminsky Phillip B. Gibbons Abraham Flaxman Presented by John Mak,
Sampling from Large Graphs. Motivation Our purpose is to analyze and model social networks –An online social network graph is composed of millions of.
Measurement and Analysis of Online Social Networks By Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, Bobby Bhattacharjee Attacked.
1 The Sybil Attack John R. Douceur Microsoft Research Presented for Cs294-4 by Benjamin Poon.
For slideshow: click “Research and Talks” from slideshow: click “Research and Talks”
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
1 BA 555 Practical Business Analysis Review of Statistics Confidence Interval Estimation Hypothesis Testing Linear Regression Analysis Introduction Case.
The Very Small World of the Well-connected. (19 june 2008 ) Lada Adamic School of Information University of Michigan Ann Arbor, MI
1 Measurement and Analysis of Online Social Networks A. Mislove, M. Marcon, K Gummadi, P. Druschel, B. Bhattacharjee Presentation by Yong Wang (Defense.
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
Structure based Data De-anonymization of Social Networks and Mobility Traces Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
University of California at Santa Barbara Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Zhao.
Spectral coordinate of node u is its location in the k -dimensional spectral space: Spectral coordinates: The i ’th component of the spectral coordinate.
OSN Research As If Sociology Mattered Krishna P. Gummadi Networked Systems Research Group MPI-SWS.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Defending Sybil Attack in Peer2Peer Networks Md. Tanvir Al Amin Shah Md. Rifat Ahsan Adviser : Dr. Reaz Ahmed Distributed Search.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
Leveraging Social Networks to Defend against Sybil attacks Krishna Gummadi Networked Systems Research Group Max Planck Institute for Software Systems Germany.
Presentation: A measure of betweenness centrality based on random walks M.E.J. Newman ELSEVIER Social Networks November 2004 A measure of betweenness centrality.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang, Tian He, Yongdae Kim (ACM Infocom2007) Presenter : Justin.
School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2013 Figures are taken.
Security Mechanisms for Distributed Computing Systems A9ID1007, Xu Ling Kobayashi Laboratory GSIS, TOHOKU UNIVERSITY 2011/12/15 1.
Challenges and Opportunities Posed by Power Laws in Network Analysis Bruno Ribeiro UMass Amherst MURI REVIEW MEETING Berkeley, 26 th Oct 2011.
Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University SIGCOMM 2010 Presented by Junyao Zhang Many of the.
“SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)
Computer Science Department, Peking University
Learning the Structure of Related Tasks Presented by Lihan He Machine Learning Reading Group Duke University 02/03/2006 A. Niculescu-Mizil, R. Caruana.
The Sybil Attack, J. R. Douceur, IPTPS Clifton Forlines CSC2231 Online Social Networks 11/1/2007.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
DSybil: Optimal Sybil-Resistance for Recommendation Systems Haifeng Yu National University of Singapore Chenwei Shi National University of Singapore Michael.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang Miriam Metzger, Haitao Zheng and Ben Y. Zhao Computer.
A Sybil-Proof Distributed Hash Table Chris Lesniewski-LaasM. Frans Kaashoek MIT 28 April 2010 NSDI
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Anonymous communication over social networks Shishir Nagaraja and Ross Anderson Security Group Computer Laboratory.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
On the State of OSN-based Sybil Defenses David Koll*, Jun Li^, Joshua Stein^ and Xiaoming Fu* *University of Göttingen, Germany ^University of Oregon,
by Hyunwoo Park and Kichun Lee Knowledge-Based Systems 60 (2014) 58–72
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Dieudo Mulamba November 2017
By group 3(not the ones who made the paper :D)
Techniques for studying correlation and covariance structure
Department of Computer Science University of York
geometric representations of graphs
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
Properties and applications of spectra for networks
Social Network-Based Sybil Defenses
Modelling and Searching Networks Lecture 2 – Complex Networks
Presentation transcript:

Measuring the Mixing Time of Social Graphs Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim Computer Science and Engineering Department University of Minnesota Twin Cities ACM Internet Measurement Conference Nov. 1—3, 2010, Mel, Australia

Background Sybil Attack: nodes with multiple fake identities –P2P, Sensor/Ad hoc networks, Reputation System “The Sybil Attack” by John Douceur Impossibility of defending against the attack without a trusted centralized authority A new direction Use of social networks to defend against Sybil attack without centralized authority 211/3/10IMC'10

The new direction SybilGuard [SIGCOMM’06] SybilLimit [Oakland’08] GateKeeper [PODC’10] SybilInfer [NDSS’09] SumUp [NSDI’09] MobID [INFOCOM’10] Whanau [NSDI’10] … [SIGCOMM’10] 311/3/10IMC'10

The Idea 4 Intersection node Verifier Attack edge Limited # of attack edges per million nodes 11/3/10IMC'10 Suspect

Main findings Good news – Some Sybil defenses do not need ``fast mixing’’ graphs in order to work for ``good nodes’’. Bad news – Social graphs are not fast mixing. – Some theoretical arguments in Sybil defenses are inaccurate. – The applicability of social network-based Sybil defenses is infeasible for some social graphs. – Negative correlation between trust and mixing. 511/3/10IMC'10

The rest of this talk Assumptions and Preliminaries How to measure the mixing time Results and Implications Conclusion and Future Work 611/3/10IMC'10

The assumptions reloaded Trust in social network – Face-to-face network, not OSN – However… Small mixing time – The cost and effectiveness of designs. – Number of accepted Sybils per attack edge. Small number of attack edges – Justify the sparse-cut hypothesis. 711/3/10IMC'10

Preliminaries Social networks – Undirected graph, edges = interdependencies – A is the adjacency matrix – P is transition matrix, π is stationary distribution Mixing time – The time to reach the stationary distribution 811/3/10IMC'10

Computing the mixing time Bounded by the second largest eigenvalue (µ) Computed directly from the definition. Methodology – Compute the lower bound as an indicator – Compute the mixing time of 1000 random sources selected uniformly at random in the social graph 911/3/10IMC'10

Datasets DatasetNodesEdgesμ Wiki-vote Slashdot Facebook A Facebook B Youtube Enron Physics Physics Physics Livejournal A Livejournal B DBLP /3/10IMC'10

Main Results

12 Faster mixing Slower mixing Big difference between the measurements using the two methods Difference across datasets is related to the social network model 11/3/10IMC'10

13 Big difference between the measurements using the two methods Difference across datasets is related to the social network model 11/3/10IMC'10

Physics 3 Physics 2 Physics A few slow-mixing sources are enough to slow down the overall mixing of the network. 2.The use of the mixing time, as the maximal time, for reasoning about Sybil defenses is inaccurate 11/3/10IMC'10

Physics 1 Physics 3 Physics 2 15 Such slow mixing nodes represent a large percent of nodes in the social graph. 11/3/10IMC'10

1611/3/10IMC'10

Other measurements The impact of trimming low degree nodes – Using the same method as in SIGCOMM’06 – Graph size reduced to only 20% of the original graph after trimming up to 5 degrees – The total variation distance moves from 0.2 to 0.03 for walk length of 100 (SLEM technique) – From to (sampling technique) – From 0.6 to 0.2 at walk length of /3/10IMC'10

Implication What’s the amount of the mixing time we need indeed for these designs to work? 1811/3/10IMC'10

Conclusion Measured the mixing time of several social networks using sampling Showed that 2 nd largest Eigenvalue is not accurate for representing the mixing of the whole graph. Findings Social graphs are slower mixing than anticipated and used Negative correlation between trust and mixing time Smaller walk length is sufficient to accept most honest nodes. Still larger than theoretically assumed Relaxed mixing assumption (larger statistical distance) 1911/3/10IMC'10

Future work 2011/3/10IMC'10

Measuring the Mixing Time of Social Graphs Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim Computer Science and Engineering Department University of Minnesota Twin Cities ACM Internet Measurement Conference Nov. 1—3, 2010, Mel, Australia