By James Kasten.  Motivation and Proposed Solution  Common Reputation System Errors  Design Principles and Considerations  Specific Design Specifications.

Slides:



Advertisements
Similar presentations
h Protection from cyber attacks is achieved by acting on several levels: first, at the physical and material, placing the server in a place as safe as.
Advertisements

Doc.: IEEE /0413r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 A Study Group for Enhanced Security Date: Authors:
A Trust Management Framework for Service-Oriented Environments William Conner, Arun Iyengar, Thomas Mikalsen, Isabelle Rouvellou, and Klara Nahrstedt
PhishZoo: Detecting Phishing Websites By Looking at Them
Trust Management of Services in Cloud Environments:
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Different methods and Conclusions Liqin Zhang. Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks.
Android Security. N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Building Robust and Automatic Authentication Systems with Activity- Based Personal Questions Mentor: Danfeng Yao Anitra Babic Chestnut Hill College Computer.
Expert COSYSMO Update Raymond Madachy USC-CSSE Annual Research Review March 17, 2009.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Personalized Ontologies for Web Search and Caching Susan Gauch Information and Telecommunications Technology Center Electrical Engineering and Computer.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Presentation By Deepak Katta
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID.
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones Presented By: Steven Zittrower William Enck ( Penn St) (Duke)
Authors: William Enck The Pennsylvania State University Peter Gilbert Duke University Byung-Gon Chun Intel Labs Landon P. Cox Duke University Jaeyeon Jung.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
ENanny: Child Tracking App Andrew Manalo Kevin White CS237 – S15.
A Presentation Of TaintDroid & Related Topics
University of Central Florida TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones Written by Enck, Gilbert,
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Examining Dynamic Trust Relationships in Autonomy-Oriented Partner Finding Department of Computer Science, HKBU, HK International WIC Institute, BJUT,
Problem Paramount to the success of your effort stated precisely address an important question advance knowledge.
Computer Science Department, Peking University
Security Analytics Thrust Anthony D. Joseph (UCB) Rachel Greenstadt (Drexel), Ling Huang (Intel), Dawn Song (UCB), Doug Tygar (UCB)
Arpit Jain Mtech2. Outline Introduction Attacks Solution Experimental Evaluation References.
The EigenTrust Algorithm for Reputation Management in P2P Networks
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
THREATS, VULNERABILITIES IN ANDROID OS BY DNYANADA PRAMOD ARJUNWADKAR AJINKYA THORVE Guided by, Prof. Shambhu Upadhyay.
Peer-to-Peer Information Systems Week 13: Trust Old Dominion University Department of Computer Science CS 495/595 Fall 2003 Michael L. Nelson 11/17/03.
“Ensuring distributed accountability for data sharing in the cloud”
WHAT THE APP IS THAT? DECEPTION AND COUNTERMEASURES IN THE ANDROID USER INTERFACE.
Key management issues in PGP
Presented by Edith Ngai MPhil Term 3 Presentation
Android App Permission Manager
BotTracer: Bot User Detection Using Clustering Method in RecDroid
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Understanding Android Security
Trends in my profession, Information Technology
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Cloud Security Research Based On The Internet of Things
Call AVG Antivirus Support | Fix Your PC
Dieudo Mulamba November 2017
Methodologies for Data Preservation in IoT Platform
De-anonymizing the Internet Using Unreliable IDs By Yinglian Xie, Fang Yu, and Martín Abadi Presented by Peng Cheng 03/22/2017.
Hjalmar Delaude, Jamente Cooper, Sivakumar Pillai, Istvan Barabasi
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Formalization of Trust, Fraud, and Vulnerability Analysis
TRANCO: A Research-Oriented Top Sites Ranking Hardened Against Manipulation By Prudhvi raju G id:
Presentation transcript:

By James Kasten

 Motivation and Proposed Solution  Common Reputation System Errors  Design Principles and Considerations  Specific Design Specifications  Detection of Malicious Behavior  Simulations  Setup and Assumptions  Results  Further Implementation  Future Work

 Google Android Market is very open  Android Security and Privacy permissions are controlled by the user  User has little information regarding use of permissions

 TaintDroid  Tracks the flow of private information through the phone  Notifies the user when private information is sent across the network  Requires advanced and knowledgeable users to operate  Kirin  Based purely on installation privileges  Only as effective as the user makes it

 Provide a mechanism that allows privacy and security information of third-party applications to flow from advanced users to novices  Web of Trust enhanced with Automated Analysis  Web of Trust Examples: Epinions.com, MyWOT.com (internet sites), Google PageRank

 Lack of ability to differentiate dishonest feedback from honest ones  Most systems provide no support against users gaming the system  No incentives for feedback  Sybil Attack

 Large disparity of knowledge in user base  Special two-tiered reputation system  Global Trust Index  Centralized Server  Algorithms need to be computationally inexpensive  Additional information provided to the user with some automated analysis

 User Rating System  Review Types ▪ Application Ratings ▪ Rating Reviews  Additional Influences ▪ User Reputation ▪ Application Author Rating  Automated Analysis  Assess static privileges  Analyze TaintDroid logs for each application  Create/Analyze power consumption profiles

Tetroid by SoftwareWorks Trust Index 7.8 Tetroid by SoftwareWorks Trust Index 7.7  Application Ratings  Influence determined by user’s reputation  Effects both Application Trust Index and Author’s Trust Index  Review Ratings  Either positive or negative  Affects user reputation  Influence determined by reviewer’s user reputation    James’s Rating 7 According to TaintDroid, this app occasionally sends out your location to WebAdds.com. Other than that, it appears safe.

 Provide Global Trust Index for each application Calculating the Trust Index 2/3 Global Application Rating + 1/3 Author Rating Calculating Global Application Rating ∑ (AppRating.user.reputation * AppRating.PrivacyRating) / Accuracy Accuracy = ∑ (AppRating.user.reputation) Calculating Author’s Rating ∑ (Application.Accuracy * Application.TrustIndex) / (∑ Application.Accuracy)

 New users assigned reputation of.5  Cap user reputation between [0, 10]  Reputation Calculation for User  Stops user from gaining max reputation from a single rating  Formulated to separate novice users from experienced users For each (ApplicationRating) { appRatingRep = ∑ ((ReviewRating.user.reputation / 10) * Rating) if ( appRatingRep > 1) discount additional reputation by factor of 5 add appRatingRep to reputation }

1. Review Rating is submitted - O(1) 2. Local user reputation is updated - O(1) 3. Reputation change is propagated to those users immediately affected – O(n) 4. for each (AppRating in users List), add it to set of dirtyApplications - O(n) 5. After period of time, recalculate all dirtyApplication AppRatings and Author Ratings O(nm) 6. Calculate new Trust Index - O(1)

 Maximum of 5 review ratings (thumbs up/ thumbs down) per application  Stops user from trashing or boosting an applications trust index indirectly  Recent Activity Window - Small weighted trust rating maintained and used to punish users with recent low performance  Guards against users using high rep to game the rankings

 Look at the last past 3 application ratings of users with high reputation  If weighted average of Review Ratings is less than threshold, punish user  Weighted average of review ratings  Recent Performance ∑ AppRating.ReviewRating * AppRating.ReviewRating.user.reputation ∑ AppRating.ReviewRating.user.reputation

 Recent performance domain [-1, 1]  Current performance threshold is -.1  Reputation Punishment  rep = rep / (1 + ((-performance) * (accuracy / WEIGHT_FACTOR))) ▪ Current weight factor is 5

 Experienced Users  Rate accurately with standard deviation of 1  Average Users  Rate only half of the applications  Rate apps fairly accurately with st dev of 3  Ignorant Users  Rate randomly on a uniform distribution  Malicious Users  Act like experienced users, but when their reputation is high they game the system

 Ignorant and Average users are expected to recognize experienced user and malicious user application reviews at a rate of.8  Users recognize the experienced vocabulary and rate it up  Experienced users are not as easily fooled by malicious users and only rate up an App Rating if the trust value is relatively “close” to their own opinion (± 1)

 Normal user application ratings are rated up if the corresponding reviewer has a similar opinion  Rated up if rating is within ± 1 of their opinion  Rated down if the reviewer’s opinion is differs from App Ratings author by more than ± 1

Apps = 20 Exp Users = 5 Avg Users = 30 Mal Users = 0

Apps = 20 Exp Users = 5 Avg Users = 30 Ign Users = 30

Exp Users = 5 Avg Users = 30 Ign Users = 30 Mal Users = 5

 Access Application Manifest file to assess static privileges  Classify Application Privacy and Security as Safe, Some Risk, Potentially Dangerous  Safe – No access to private information, accounts and money  Some Privacy Risk – Access to both private information and internet access  Potentially Dangerous – Access to accounts and money

 Google App Engine  Works well with Android Applications  Android Application  Users based on Google Accounts and phone numbers ▪ Android Market requires user to have valid account ▪ Should effectively avoid Sybil attack  Quick Example

 Self-sustaining  Computationally light  Makes the market more efficient as users have increased knowledge of the applications  Accuracy increases as users are able to gather more information

 Requires critical mass to provide reliable ratings  Ensuring authenticity of automated information and developing an appropriate metric is difficult  Need to implement a light clustering algorithm to provide protection against a distributed attack

 Potential bias for negative ratings  Establish baseline for expected negative ratings per download  Adjust Trust Index based on downloads and ratings  Implement lightweight clustering technique to identify groups of malicious users  Potential – Root Mean Square algorithm to determine level of similarity between users  Implement Yahoo Answers like point system

 Look into providing static analysis of static privileges through Kirin system  Implement / incorporate rest of the automated analysis

 [1] TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, William Enck, Peter Gilbert, Byung-gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth, OSDI, October  [2] R. Guha. Open rating systems. Technical report, Stanford University,  [3]Leveraging Robust Service Evaluation by Introducing the Web of Trust, Cai, Sibo, Yanzhen Zou, Bing Xie, and Weizhong Shao, CLOUD '  [4]Kui Meng; Yue Wang; Xu Zhang; Xiao-chun Xiao; Geng-du Zhang;, "Control Theory Based Rating Recommendation for Reputation Systems," Networking, Sensing and Control, ICNSC '06. Proceedings of the 2006 IEEE International Conference on, vol., no., pp ,  [5]Rein, G.L.;, "Reputation Information Systems: A Reference Model," System Sciences, HICSS '05. Proceedings of the 38th Annual Hawaii International Conference on, vol., no., pp. 26a- 26a, Jan  [6]L. Xiong and L. Liu. “PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities”, in IEEE Transactions on Knowledge and Data Engineering, 16(7), 2004, pp  [7]W. Enck, M. Ongtang, and P. McDaniel, “On Lightweight Mobile Phone Application Certification,” in Proceedings of ACM CCS, November  [8]A. Cheng and E. Friedman, “Sybilproof reputation mechanisms,” in Proc. ACM SIGCOMM P2PECON workshop, pp. 128–132, 2005.