Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.

Slides:



Advertisements
Similar presentations
+ Multi-label Classification using Adaptive Neighborhoods Tanwistha Saha, Huzefa Rangwala and Carlotta Domeniconi Department of Computer Science George.
Advertisements

Active Learning for Streaming Networked Data Zhilin Yang, Jie Tang, Yutao Zhang Computer Science Department, Tsinghua University.
Data Mining Classification: Alternative Techniques
Social Media Mining Chapter 5 1 Chapter 5, Community Detection and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool, September, 2010.
Node labels as random variables prior belief observed neighbor potentials compatibility potentials Opinion Fraud Detection in Online Reviews using Network.
Classification and Prediction: Regression Via Gradient Descent Optimization Bamshad Mobasher DePaul University.
Relational Learning with Gaussian Processes By Wei Chu, Vikas Sindhwani, Zoubin Ghahramani, S.Sathiya Keerthi (Columbia, Chicago, Cambridge, Yahoo!) Presented.
NetQuest: A Flexible Framework for Internet Measurement Lili Qiu Joint work with Mike Dahlin, Harrick Vin, and Yin Zhang UT Austin.
+ Doing More with Less : Student Modeling and Performance Prediction with Reduced Content Models Yun Huang, University of Pittsburgh Yanbo Xu, Carnegie.
Scalable Text Mining with Sparse Generative Models
Latent Boosting for Action Recognition Zhi Feng Huang et al. BMVC Jeany Son.
Transfer Learning From Multiple Source Domains via Consensus Regularization Ping Luo, Fuzhen Zhuang, Hui Xiong, Yuhong Xiong, Qing He.
Active Learning for Networked Data Based on Non-progressive Diffusion Model Zhilin Yang, Jie Tang, Bin Xu, Chunxiao Xing Dept. of Computer Science and.
Using Friendship Ties and Family Circles for Link Prediction Elena Zheleva, Lise Getoor, Jennifer Golbeck, Ugur Kuter (SNAKDD 2008)
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
by B. Zadrozny and C. Elkan
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Random Walk with Restart (RWR) for Image Segmentation
Exploring Online Social Activities for Adaptive Search Personalization CIKM’10 Advisor : Jia Ling, Koh Speaker : SHENG HONG, CHUNG.
CS 782 – Machine Learning Lecture 4 Linear Models for Classification  Probabilistic generative models  Probabilistic discriminative models.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
Zibin Zheng DR 2 : Dynamic Request Routing for Tolerating Latency Variability in Cloud Applications CLOUD 2013 Jieming Zhu, Zibin.
Computer Science Department, Peking University
CISC Machine Learning for Solving Systems Problems Presented by: Ashwani Rao Dept of Computer & Information Sciences University of Delaware Learning.
Andreas Papadopoulos - [DEXA 2015] Clustering Attributed Multi-graphs with Information Ranking 26th International.
Online Multiple Kernel Classification Steven C.H. Hoi, Rong Jin, Peilin Zhao, Tianbao Yang Machine Learning (2013) Presented by Audrey Cheong Electrical.
Group ID: 19 ZHU Wenya & LIN Dandan Predicting student performance from book-borrowing records.
Detecting New a Priori Probabilities of Data Using Supervised Learning Karpov Nikolay Associate professor NRU Higher School of Economics.
Towards Social User Profiling: Unified and Discriminative Influence Model for Inferring Home Locations Rui Li, Shengjie Wang, Hongbo Deng, Rui Wang, Kevin.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
ICONIP 2010, Sydney, Australia 1 An Enhanced Semi-supervised Recommendation Model Based on Green’s Function Dingyan Wang and Irwin King Dept. of Computer.
Supervised Random Walks: Predicting and Recommending Links in Social Networks Lars Backstrom (Facebook) & Jure Leskovec (Stanford) Proc. of WSDM 2011 Present.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Unsupervised Streaming Feature Selection in Social Media
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Mining Advisor-Advisee Relationships from Research Publication.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Scalable Learning of Collective Behavior Based on Sparse Social Dimensions Lei Tang, Huan Liu CIKM ’ 09 Speaker: Hsin-Lan, Wang Date: 2010/02/01.
Measuring the Mixing Time of Social Graphs Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim Computer Science and Engineering Department University of Minnesota.
Lecture 7: Constrained Conditional Models
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Exploring Social Tagging Graph for Web Object Classification
Sofus A. Macskassy Fetch Technologies
Boosted Augmented Naive Bayes. Efficient discriminative learning of
A Study of Group-Tree Matching in Large Scale Group Communications
A Pool of Deep Models for Event Recognition
Multimodal Learning with Deep Boltzmann Machines
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Classification with Perceptrons Reading:
Intelligent Information System Lab
Edge Weight Prediction in Weighted Signed Networks
Dieudo Mulamba November 2017
Using Friendship Ties and Family Circles for Link Prediction
Data Mining Practical Machine Learning Tools and Techniques
A survey of network anomaly detection techniques
Yiyu Shi*, Wei Yao*, Jinjun Xiong+ and Lei He*
iSRD Spam Review Detection with Imbalanced Data Distributions
MEgo2Vec: Embedding Matched Ego Networks for User Alignment Across Social Networks Jing Zhang+, Bo Chen+, Xianming Wang+, Fengmei Jin+, Hong Chen+, Cuiping.
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Lecture 15: Data Cleaning for ML
Asymmetric Transitivity Preserving Graph Embedding
GANG: Detecting Fraudulent Users in OSNs
Actively Learning Ontology Matching via User Interaction
Sofia Pediaditaki and Mahesh Marina University of Edinburgh
Kostas Kolomvatsos, Christos Anagnostopoulos
Graph Attention Networks
David Kauchak CS158 – Spring 2019
2019/9/14 The Deep Learning Vision for Heterogeneous Network Traffic Control Proposal, Challenges, and Future Perspective Author: Nei Kato, Zubair Md.
Presentation transcript:

Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil Zhenqiang Gong Department of Electrical and Computer Engineering

What is Collective Classification? - ? - ? ? + - ? + ? ? ? + ?

Modeling Security & Privacy Problems as Collective Classification Malware detection Sybil detection Attribute inference - - - - + + + + Host-file graph Social graph Social graph

Existing Collective Classification Methods Studied by multiple research communities Networking, security, machine learning, data mining, etc. Classified as Random walk (RW) and Loopy belief propagation (LBP) Three key steps: Step I: assign nodes’ prior scores based on a training dataset Step II: assign (fixed/equal) weight to every edge in the graph Step III: obtain nodes’ posterior scores by propagating nodes’ prior scores among the weighted graph; larger posterior score indicates a higher likelihood to be positive

Fundamental Limitation of Existing Methods Assign small weights to a large number of homogeneous edges homogeneous edge (u,v) => u and v have the same label => large weight Assign large weights to a large number of heterogeneous edges heterogeneous edge (u,v) => u and v have different labels => small weight Limited success in security and privacy problems having a large amount of heterogeneous edges e.g., Sybil detection in weak-trust social networks (like Twitter)

Our Work: Joint Weight Learning and Propagation Jointly learning edge weights and propagating posterior scores Applicable to both RW-based and LBP-based methods Applicable to both undirected and directed graphs Applicable to various graph-based security and privacy problems Sybil detection in social networks Fake review detection Attribute inference in social networks Malware detection Malicious website detection …

Outline Background Methodology Evaluation Conclusion

Outline Background Methodology Evaluation Conclusion

Collective Classification Nodes’ posterior scores are solutions to a system of equations: q, p: nodes’ prior and posterior scores W: edge weight matrix f: different methods use different function f Iteratively updating the posterior scores:

LBP on Undirected Graphs Function f Nodes’ prior scores 𝐿 𝑝 , 𝐿 𝑁 : labeled positive and labeled negative nodes 𝜃>0: strength of the prior Edge weight: likelihood two nodes have the same label 𝑤 𝑢𝑣 >0: u, v likely to have the same label 𝑤 𝑢𝑣 <0: u, v likely to have different labels w uv =w >0, i.e., assume all edges homogeneous! 𝑞=−1 𝑞=0 𝑤 𝑤 𝑤 𝑞=1 𝑤 𝑤 𝑤 𝑤 𝑞=0 𝑞=0

Outline Background Methodology Evaluation Conclusion

Motivation Existing methods assign large weights to a large number of heterogeneous edges Existing methods assign small weights to a large number of homogeneous edges Can we adaptively learn edge weights such that heterogeneous (homogeneous) edges have small (large) weights?

Goals Goal 1: final posterior scores of labeled nodes should be close to their groundtruth labels Quantifying Goal 1: 𝑦 𝑙 =1, if 𝑙 is labeled positive 𝑦 𝑙 =−1, if 𝑙 is labeled negative L(W): loss function over the training dataset

Goals Goal 2: edge weights and final posterior scores be consistent u and v predicted the same label => edge (u,v) homogeneous u and v predicted different labels => edge (u,v) heterogeneous Quantifying Goal 2: 𝑝 𝑢 𝑝 𝑣 >0 => 𝑤 𝑢𝑣 >0 𝑝 𝑢 𝑝 𝑣 <0 => 𝑤 𝑢𝑣 <0 C(W): regularization term

Learning Edge Weights via Gradient Descent Optimization problem: Gradient descent: Solving a linear system for each edge: Computationally infeasible for large graphs!

Alternative Goals Computational challenge due to two goals using final posterior scores Instead, quantify the two goals using the current posterior scores Given posterior scores 𝑝 (𝑡) and edge weights 𝑊 (𝑡−1) , we learn 𝑊 (𝑡) Goal 1’: posterior scores 𝑝 (𝑡+1) of labeled nodes should be close to their labels Goal 2’: edge weights 𝑊 (𝑡) and posterior scores 𝑝 (𝑡) should be consistent

Joint Weight Learning and Propagation Propagating posterior reputation scores 𝑝 (𝑡+1) : Learning weight matrix 𝑊 (𝑡) : Gradient descent ( 𝑝 (𝑡) is known): W(0) p(0) W(1) p(1) W(2) p(2) … Computationally efficient!

Outline Background Methodology Evaluation Conclusion

Experimental Setup Application scenarios Datasets Security problem: Sybil detection & fake review detection Privacy problem: Attribute (city lived) inference attack Datasets

Experimental Setup Training datasets Evaluation metrics AUC Twitter: 3000 Sybils and 3000 benign users Sina Weibo: 980 labeled users Yelp: 1000 fake reviews and 1000 genuine reviews Google+: 75% users who have at least one city Evaluation metrics AUC Learnt edge weights Scalability

Compared Methods RW-based methods LBP-based methods For undirected graphs: RW-N, RW-P, RW-B, RW-FLW For directed graphs: RW-N-D, RW-P-D LBP-based methods For undirected graphs: LBP-U, LBP-FLW-U For directed graphs: LBP-D Our proposed methods LBP-JWP-w/o, LBP-JWP-L1, LBP-JWP-L2, LBP-JWP

Our methods consistently outperform existing ones AUC Performance Our methods consistently outperform existing ones Jointly edge weight learning and propagation indeed enhances performance

The average edge weights between negative (or positive) nodes increase Learnt Edge Weights The average edge weights between positive nodes and negative nodes decrease The average edge weights between negative (or positive) nodes increase

Our methods are only 2-3 times slower than state-of-the-art methods Scalability Our methods are only 2-3 times slower than state-of-the-art methods

Outline Background Methodology Evaluation Conclusion

Conclusion We propose a general framework to learn edge weights for graph- based security and privacy analytics Our framework is applicable to both RW-based and LBP-based methods, and both undirected and directed graphs Iteratively learning edge weights can enhance performance for various graph-based security and privacy applications, with an acceptable computational overhead