Inferring Peer Centrality in Socially-Informed P2P Systems Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University.

Slides:



Advertisements
Similar presentations
Optimal Resource Discovery Paths of Gnutella2 The IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA 2008)
Advertisements

1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
Using Network Virtualization Techniques for Scalable Routing Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton University.
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Challenges in Making Tomography Practical
Multihoming and Multi-path Routing
Page 1 Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc Networks Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc.
1 A Static-Node Assisted Adaptive Routing Protocol in Vehicular Networks Yong Ding, Chen Wang, Li Xiao {dingyong, wangchen, Department.
LOD Map – A Visual Interface for Navigating Multiresolution Volume Visualization Chaoli Wang and Han-Wei Shen The Ohio State University Presented at IEEE.
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
and 6.855J Cycle Canceling Algorithm. 2 A minimum cost flow problem , $4 20, $1 20, $2 25, $2 25, $5 20, $6 30, $
An Alliance based Peering Scheme for P2P Live Media Streaming Darshan Purandare Ratan Guha University of Central Florida August 31, P2P-TV, Kyoto.
Scalable Routing In Delay Tolerant Networks
C. Mastroianni, D. Talia, O. Verta - A Super-Peer Model for Resource Discovery Services in Grids A Super-Peer Model for Building Resource Discovery Services.
0 - 0.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Video Services over Software-Defined Networks
Brocade: Landmark Routing on Peer to Peer Networks Ben Y. Zhao Yitao Duan, Ling Huang, Anthony Joseph, John Kubiatowicz IPTPS, March 2002.
17 th International World Wide Web Conference 2008 Beijing, China XML Data Dissemination using Automata on top of Structured Overlay Networks Iris Miliaraki.
T IME SERIES MODELING OF TEMPORAL NETWORK Sandipan Sikdar CNeRG Retreat 14 1.
Peer-to-Peer and Social Networks An overview of Gnutella.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Logically-Centralized Control COS 597E: Software Defined Networking.
高度情報化社会を支えるネットワーキング技術 (大阪大学 工学部説明会資料)
Real-Time Competitive Environments: Truthful Mechanisms for Allocating a Single Processor to Sporadic Tasks Anwar Mohammadi, Nathan Fisher, and Daniel.
Juan-Antonio CorderoPhilippe JacquetEmmanuel Baccelli Orlando, FL -- March 29 th, 2012 Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc.
Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
1 Generating Network Topologies That Obey Power LawsPalmer/Steffan Carnegie Mellon Generating Network Topologies That Obey Power Laws Christopher R. Palmer.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Disambiguation of Residential Wired and Wireless Access in a Forensic Setting Sookhyun.
Supporting Cooperative Caching in Disruption Tolerant Networks
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
S Licentiate course on Telecommunications Technology (4+1+3 cr.) Course Topic Spring 2000: Routing Algorithms in the DiffServ MPLS Networks Introduction.
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system.
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
Scale Free Networks.
1 Dynamics of Real-world Networks Jure Leskovec Machine Learning Department Carnegie Mellon University
Differential Forms for Target Tracking and Aggregate Queries in Distributed Networks Rik Sarkar Jie Gao Stony Brook University 1.
Peter R. Pietzuch Peer-to-Peer Computing – or how to make your BitTorrent downloads go faster... Peter Pietzuch Large-Scale Distributed.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Addition 1’s to 20.
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
Week 1.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
1 A Systematic Review of Cross- vs. Within-Company Cost Estimation Studies Barbara Kitchenham Emilia Mendes Guilherme Travassos.
Traversing symmetric NAT with predictable port allocation function SIN 2014 Dušan Klinec, Vashek Matyáš Faculty of Informatics, Masaryk University.
U of Houston – Clear Lake
Finding Skyline Nodes in Large Networks. Evaluation Metrics:  Distance from the query node. (John)  Coverage of the Query Topics. (Big Data, Cloud Computing,
The Power of Indirect Ties in Friend-to-Friend Storage Systems Xiang Zuo 1, Jeremy Blackburn 2, Nicolas Kourtellis 3, John Skvoretz 1 and Adriana Iamnitchi.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
University at BuffaloThe State University of New York Lei Shi Department of Computer Science and Engineering State University of New York at Buffalo Frequent.
Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Lei Chen and Wendi B. Heinzelman , University of Rochester
Early Measurements of a Cluster-based Architecture for P2P Systems
Peer-to-Peer Information Systems Week 6: Performance
Presentation transcript:

Inferring Peer Centrality in Socially-Informed P2P Systems Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South Florida Tampa, USA 11 th IEEE International Conference on Peer-to-Peer Computing Kyoto, Japan, 2011

Socially-aware Applications Applications collect and use social information: Location, collocation, history of interactions, etc. Build (implicit/explicit) social network of users Use: reduce spam, provide recommendations, etc. Wide range of system architectures How does the social network of users affect the load in a P2P architecture? 2 Decentralization of user social data MobiClique Yarta... PeerSoN LifeSocial.KOM Safebook Prometheus …

Social Graphs & P2P Networks Users connected with application-specific edges User-contributed peers form a P2P network User social graph is partitioned into subgraphs & stored on peers Questions: How do applications traverse a distributed social graph? What does it mean for the P2P routing? 3

Invite user Gs 2-hop hiking contacts to a trip Social graph traversals => many P2P lookups Application performance affected by projection of social graph on peers Application Example 4 => 1-hop={B, C, E} 2-hops={A, D, F, I}

How do the properties of the projection graph compare with the properties of the social graph projected? Projection Graph 5 Projection Graph (PG) P2P Overlay Social Graph (SG)

Projection Graph Model Uses: Study properties of peers such as centrality Study how the social graph topology affects P2P routing & system performance 6

7 Outline Motivation Projection Graph Model Social Network Centrality Metrics Degree Centrality Node Betweenness Centrality Edge Betweenness Centrality Centrality Calculation: Limitations Experimental Questions Experimental Methodology Experimental Results Impacts on Applications & Systems

Number of edges of a node High degree centrality peers: Network Hubs Can be targeted to directly influence many other peers with a message broadcast or distribute a search query Degree Centrality 8

Node Betweenness Centrality Measures the extent to which a node lies on the shortest path between two other nodes High betweenness centrality peers: Control communication between distant peers Can host data caches for reduced latency to locate data 9

Edge Betweenness Centrality Measures the extent to which an edge lies on the shortest path between two nodes High betweenness centrality edges: Connect distant parts of P2P network Can be monitored to block malware traffic 10

Calculating Peer Centrality Challenging because of: Limited access to user data (e.g., privacy settings) P2P network scale Peer churn Through experimental analysis on the social and projection graph, we investigate how to circumvent these limitations 11

Experimental Questions Can we approximate the centrality of peers using the centrality scores of their users? How does the number of users storing data per peer affect the centrality scores of their peers? Social graph is less dynamic than the P2P network Calculate infrequently centrality score of users & use it to estimate their peers centrality Spoiler Alert! [1, ~150] users/peer: Can estimate degree & betweenness centrality of peers with good accuracy Above 150 users/peer: The projection graph becomes highly connected => peers do not differentiate in centrality 12

Naturally-formed communities offer incentives for resource sharing 1 community subgraph mapped per peer Projection graphs generated from 5 real social graphs Communities detected via recursive Louvain algorithm* Varied average community size: 5,10,20,…,1000 users/peer Calculate correlation of centralities of users and their peers Compare average centralities of users and their peers Identify top centrality peers from their users scores Experimental Methodology 13 Social NetworkUsersEdges gnutella0410,87639,994 gnutella3162,561147,878 enron33,696180,811 epinions75,877405,739 slashdot82,168504,230 *V. D. Blondel et al, Fast unfolding of communities in large networks, Journal of Statistical Mechanics: Theory and Experiment, vol. 10, 2008.

Correlation of Centrality Scores [1-150] users/peer: Projection graph resembles closely social graph Highest correlation of social & projection graph metrics Degree & node betweenness estimated from local information (cumulative scores) 14 After 150 users/peer: Projection graph topology loses social properties Highly connected network Peers participate equally in graph traversal Users/Peer vs. Degree Users/Peer vs. Node Betweenness Users/Peer vs. Edge Betweenness

Comparison of Centrality Scores Increase number of users/peer turning point in projection graph More connections with other peers increase peer degree & betweenness to maximum More social edges within peers decrease edge betweenness to minimum 15 Users/Peer vs. Degree Users/Peer vs. Node Betweenness Users/Peer Vs. Edge Betweenness

Finding High Betweenness Peers Placing data caches on high betweenness peers can reduce latency to locate data Can we identify such peers, knowing the top betweenness users or communities? Top 5% betweenness centrality users => top betweenness centrality peers with 80–90% accuracy 16 Users/Peer With Top-N% users With Top-N% communities

Summary of Findings [1, ~150] users/peer: Projection graph resembles closely social graph Highest correlation of social & projection graph metrics Degree & node betweenness can be estimated from local information (cumulative scores of users) Cannot estimate well edge betweenness Above 150 users/peer: Projection graph topology loses social properties A highly connected projection graph No differentiation in peer centrality Top betweenness centrality users can pinpoint the top betweenness centrality peers with good accuracy Overall: Applications can calculate infrequently centrality score of users to estimate peer centrality Social graph changes slowly compared to P2P network 17

Impact on Applications & Systems Target high degree peers to: Decrease search time Increase breadth of search and diversity of results Target high betweenness peers to: Monitor information flow and collect traces Place data caches and indexes of data location Quarantine malware outbursts Disseminate software patches Tackle P2P churn Predict centrality of peers to allocate resources Reduce overlay overhead Enhance routing tables with P2P edges for faster & more secure peer discovery 18

19 Thank you! This work was supported by NSF Grants: CNS and CNS