Ostra: Leveraging trust to thwart unwanted communication A. Mislove, et al. Offense - Marcel Flores.

Slides:



Advertisements
Similar presentations
BALANCING LIFES ISSUES, INC. Managing Multiple Priorities at Work.
Advertisements

The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
Territory Specialist Training. Who is Lifetime Learning? Lifetime Learning offers support and resources for people interested in going to or returning.
Basic Communication on the Internet:
Communication between clients and technicians January 2007, Alex Righolt.
Personal Computer Safety. What's the point? ● Computers/Internet are a huge part of our lives – A place to store our family photos – A way to pay bills.
Secure Multiparty Computations on Bitcoin
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Copyrights note I don’t mind the use of this powerpoint presentation for sermon purposes, but not to be send as one of those forwarded s. Please note.
RECAP – TASK 1 What is utilitarianism? Who is Jeremy Bentham?
Uniqueness of Optimal Mod 3 Circuits for Parity Frederic Green Amitabha Roy Frederic Green Amitabha Roy Clark University Akamai Clark University Akamai.
Time and Global States Part 3 ECEN5053 Software Engineering of Distributed Systems University of Colorado, Boulder.
Ostra: Leveraging trust to thwart unwanted commnunication Alan Mislove Ansley Post Reter Druschel Krishna P. Gummadi.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Facebookin’ for Bucks A Beginner’s Guide Sarah Spencer.
SplitStream: High-Bandwidth Multicast in Cooperative Environments Marco Barreno Peer-to-peer systems 9/22/2003.
Explorations in Anonymous Communication Andrew Bortz with Luis von Ahn Nick Hopper Aladdin Center, Carnegie Mellon University, 8/19/2003.
Brent Dingle Marco A. Morales Texas A&M University, Spring 2002
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
The Byzantine Generals Strike Again Danny Dolev. Introduction We’ll build on the LSP presentation. Prove a necessary and sufficient condition on the network.
Situational Leadership. Yukl (1989) identifies six variables: Subordinate effort : the motivation and actual effort expended. Subordinate ability and.
Algebra Problems… Solutions
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1.When a job comes in office it goes to Customer Service 2.If you are sending in a payment whether the job is in house or on it’s way, it comes to Customer.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Basic Concepts of Computer Networks
Introduction to Statistical Inferences
#17 - Involve Users in the Development Model of Multinational Corporations - Is it worth it? Experience Report IRCSE '08: IDT Workshop Friday 31 October.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Making The Application Part One We have heard sermon after sermon. How do we translate them into our own personal application?
McGraw-Hill/Irwin © 2005 The McGraw-Hill Companies, Inc. All rights reserved ChapterChapter 10 Networking and Negotiating.
Finding dense components in weighted graphs Paul Horn
Instructor: Tasneem Darwish1 University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Object Oriented.
Outline What Neural Networks are and why they are desirable Historical background Applications Strengths neural networks and advantages Status N.N and.
Nina H. Fefferman, Ph.D. Rutgers Univ. Balancing Workforce Productivity Against Disease Risks for Environmental and Infectious.
Extending the Definition of Exponents © Math As A Second Language All Rights Reserved next #10 Taking the Fear out of Math 2 -8.
K A R A Creations ARLIARLI Topic: Why facebook can be dangerous!!
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Step 2: Inviting to Challenge Group. DON’T! Before getting into the training, it’s important that you DON’T just randomly send someone a message asking.
Accounting Information System. System A system is a set of parts coordinated to accomplish a set of goals. It is also an organized set of interrelated.
Protecting Yourself on Social Media – Friend Requests And Messages.
YOUR SAY PRESENTATION GROUP 1 Jamie (4) Jie Ying (6) Si Yun (7) Zhi Wei (11) Hui Qi (14) Elliott (23)
Dominique Renault. > Groups Groups - A group can be set up by any user and can be set to private. These are generally used by smaller groups of people.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Cyber Bullying Get The Facts! Kindness What is kindness? Share some examples. Why is it important?
HighImpactSoft 2010 Organizing a Better Future. Agenda Specify Goals ScopeDefinitions Process Model Preliminary Requirements Issues and solutions TraceabilityPrototype.
Offense: Planetary-Scale Views on a Large Instant Messaging Network J. Leskovec, et al.
What you need to know.  Each TDI vessel is equipped with satellite communications that supplies a LOW BANDWIDTH internet connection. Even though the.
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
Linked Accelerator Week 3 Ted Prodromou
James Howison What should scientific software learn from “the open source way”? CC Credit: XSEDE Communities Symposium.
Positive Communication with Parents- An Ounce of Prevention Taken from Dealing with Difficult Parents and With Parents in Difficult Situations and With.
8 Reason I Swing Dance For Over 1.5 Years And not going to stop any time soon
E-Safety Parent Talk Helping to keep your children safe online.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
The Layering Effect How to Build a Personal Brand.
Best Facebook Proxy Login Sites
Lower bounds for Unconditionally Secure MPC Ivan Damgård Jesper Buus Nielsen Antigoni Polychroniadou Aarhus University.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
GREENHOUSE 101 FOR BASIC USERS
World Mental Health Day
Tutorial for 21Classes.com
Results of 2012 NACC Member Poll
Fast Action Links extension A love letter to CiviCRM
Data and Computer Communications
CORE 3: Unit 3 - Part D Change depends on…
Symmetric Key Distribution
Outline The concept of perimeter defense and networks Firewalls.
Presentation transcript:

Ostra: Leveraging trust to thwart unwanted communication A. Mislove, et al. Offense - Marcel Flores

A noble goal Seek to reduce unwanted messages A good thing! Minimize incorrect classification Hey! They are aiming for the holy grail of spam filtering!

First, lets consider... What does a user actually want? Something invisible Something that doesn’t ever prevent them from functioning Simplicity

First, lets consider... What can we expect from a user? Nothing! Systems already in place that require little to no regular input, users expect at least as good

The System Trust network requirements “Non-trivial cost of initiating and maintaining links in a network” “Cannot acquire new relationships arbitrarily fast” “Cannot maintain arbitrary number of relationships”

Many networks eliminated! Many networks already do not meet these requirements Hard to draw trust networks in an environment like Facebook or MySpace, where users are generally laid back in their acceptances of friend requests

Limitations... “Thus, Ostra can be used only in conjunction with an ‘invitation-only’ social network” Since it requires established trust links for anyone to begin sending and receiving Not a feasible requirement for many services ( ?)

Limitations... “Users with few links in the trust network are more susceptible to credit exhaustion…” Forces new users to “work” to be able to properly use the service! Users also potentially have to deal with yet another layer of “approvals” and “invitations”

Experimental Network Used a YouTube crawl YouTube doesn’t meet the trust based requirements! Do some analysis to patch this... Also find users with degrees that are too high This is not good data!

Workload Data Again, cannot obtain necessary data, are forced to make assumptions about usage patterns Provide reasonable explanation - still leaves me wondering if the data is particularly representative of any other networks

Results Find Ostra to do a great job of bounding the amount of unwanted communication! Users are still left with another layer of complexity Can this work out in the “wild” Issues of user participation

Generalization Requires Ostra to be distributed Built into every application that uses it? Are users going to need to install and configure it? Are either of these reasonable options?

Complexity Ostra is very complex Upper bounds, lower bounds, credit balances, reserved credits, penalty credits, etc. How does it perform with mass failure? Could it damage a network?

Conclusion Ostra is powerful and effective However... It is complex It is another layer that users or developers would have to wade through Seems inapplicable to many situations (especially when there is nothing to readily adapt to a trust network)

Maybe another approach? While effective, the previously mentioned problems make Ostra not- so-feasible Perhaps this approach is not good For it to be truly applicable to the most desired systems ( ), must be able to function independent of other users