Measuring OSNs: Things Id Like to Know Nick Feamster Georgia Tech.

Slides:



Advertisements
Similar presentations
Grand Challenges in Networking Nick Feamster CS 7001.
Advertisements

Accessibility and Trust Nick Feamster Georgia Tech.
Networking Research Nick Feamster CS Nick Feamster Ph.D. from MIT, Post-doc at Princeton this fall Arriving January 2006 –Here off-and-on until.
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations Teaching CS 7260 in Spring 2007 CS 7001 Mini-projects: –
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Network Security Highlights Nick Feamster Georgia Tech.
Network Operations Research Nick Feamster
Network Security Highlights Nick Feamster Georgia Tech.
An analysis of Social Network-based Sybil defenses Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University.
Distributed Advice-Seeking on an Evolving Social Network Dept Computer Science and Software Engineering The University of Melbourne - Australia Golriz.
Analysis and Modeling of Social Networks Foudalis Ilias.
Broadband Internet Performance: A View from the Gateway Srikanth Sundaresan, Walter de Donato, Nick Feamster, Renata Teixeira, Sam Crawford, Antonio Pescapè.
Xiaowei Ying, Xintao Wu, Daniel Barbara Spectrum based Fraud Detection in Social Networks 1.
Towards a Logic for Wide-Area Internet Routing Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Kunal.
TDTS21: Advanced Networking Lecture 8: Online Social Networks Based on slides from P. Gill Revised 2015 by N. Carlsson.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Networks FIAS Summer School 6th August 2008 Complex Networks 1.
A S URVEY OF TRUST MANAGEMENT AND ITS APPLICATIONS S UPERVISED BY : D R. Y AN W ANG Ravendra Singh Student-id:
28/6/05 ICFI05 1 A generic approach for the automatic verification of featured, parameterised systems Alice Miller and Muffy Calder University of Glasgow.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Web as Graph – Empirical Studies The Structure and Dynamics of Networks.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Small Worlds and the Security of Ubiquitous Computing From : IEEE CNF Author : Harald Vogt Presented by Chen Shih Yu.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
User Interactions in OSNs Evangelia Skiani. Do you have a Facebook account? Why? How likely to know ALL your friends? Why confirm requests? Why not remove.
Social-Aware Collaborative Visualization for Large Scientific Projects Kwan-Liu Ma and Chaoli Wang CTS’085/21/2008.
Social Context Based Recommendation Systems and Trust Inference Student: Andrea Manrique ID: ITEC810, Macquarie University1 Advisor: A/Prof. Yan.
1 Detecting Logic Vulnerabilities in E- Commerce Applications Presenter: Liu Yin Slides Adapted from Fangqi Sun Computer Science Department College of.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Recommender Systems. >1,000,000,000 Finding Trusted Information How many cows in Texas?
Mashups… …Recycling Data. As a simple example…  Click on  Videos that are uploaded individually over time are collected.
University of California at Santa Barbara Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Zhao.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Exploring the dynamics of social networks Aleksandar Tomašević University of Novi Sad, Faculty of Philosophy, Department of Sociology
Modeling Relationship Strength in Online Social Networks Rongjing Xiang: Purdue University Jennifer Neville: Purdue University Monica Rogati: LinkedIn.
Suggesting Friends using the Implicit Social Graph Maayan Roth et al. (Google, Inc., Israel R&D Center) KDD’10 Hyewon Lim 1 Oct 2014.
Capacity Scaling with Multiple Radios and Multiple Channels in Wireless Mesh Networks Oguz GOKER.
Using Transactional Information to Predict Link Strength in Online Social Networks Indika Kahanda and Jennifer Neville Purdue University.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
The Opinion Evaluation Network Nikos Korfiatis Computer Technology Institute (CTI) University of Patras, Greece & Royal Institute of Technology (KTH),
Social Networking As A Teaching Tool Pre-Ah Hill And Carla Williams.
Computational Challenges in E-Commerce By Joan Feigenbaum, David C.Parkes, and David M.Pennock Presented by Wu Jingyuan.
1 Security on Social Networks Or some clues about Access Control in Web Data Management with Privacy, Time and Provenance Serge Abiteboul, Alban Galland.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Social Networking Presentation to Department Heads January 21, 2010.
Measuring Behavioral Trust in Social Networks
Create Your Web Presence IsaacStennett GarrettJenkins.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
MedBiquitous May 15, 2008 Integrating Quality Improvement Data into a Web- based CME Activity MedBiquitous May 15, 2008 Annette D. Boyer, R.Ph. CECity.com,
Doc.: IEEE /0598r0 Submission May 2004 Tyan-Shu Jou, et al., Janusys NetworksSlide 1 Is Spanning Tree Protocol Right for ESS Mesh? Tyan-Shu Jou,
Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Towards a Peer-to-Peer Recommender System Based on Collaborative Filtering.
Chapter 8: Web Analytics, Web Mining, and Social Analytics
Dynamic Network Analysis Case study of PageRank-based Rewiring Narjès Bellamine-BenSaoud Galen Wilkerson 2 nd Second Annual French Complex Systems Summer.
Hawaii Property Management Companies
Best Property Management Company in Oahu
Hawaii Property Management Companies -
The intimate relationship between networks' structure and dynamics
Deployment Flavor Model – Challenges and Emerging trends for ONAP adaptation Priya TG, NetCracker Technology.
Gmail Support Phone Number Australia For Gmail Account Recovery
Dieudo Mulamba November 2017
Ahnert, S. E., & Fink, T. M. A. (2016). Form and function in gene regulatory networks: the structure of network motifs determines fundamental properties.
Internet of Things A Process Calculus Approach
Survivable Real-Time Network Services (G409/J175)
Item-to-Item Recommender Network Optimization Methodology
Graph Neural Networks Amog Kamsetty January 30, 2019.
Presentation transcript:

Measuring OSNs: Things Id Like to Know Nick Feamster Georgia Tech

Why Measure Social Networks? Trustworthy Applications –Secure Channels [Authenticatr, Lockr] –Spam filters and whitelists [Re:, LineUp] –Automated backup systems [Friendstore] –Anti-censorship [Anti-Blocker] Advertising and Relationship Management Real-world Social Networking –Real-world socializing [Serendipity, aka-aki] –Public health applications

What We Need to Know Structure: Where are links/nodes in the graph? Semantics: What does a link imply? Visibility: Are there unknown links? Dynamics: How do graphs evolve? Invariants: (How) do OSNs differ? Sounds familiar…

Structure Problem: Where are links/edges in the graph? –Application specific metrics are more interesting than high-level properties Example #1: Anti-censorship –Want to find the existence of rings in the social network topology –The graph structure will determine what we can use for a deniable clickstream Example #2: Collaborative measurement –Graph structure determines vantage points/nework graph that each user has

Semantics Problem: In a social network, what determines weight/trust? –Frequency of communication –Type of communication –Common interests Some other graphs: the semantics are more clear because there is a notion of weight Links may not directly reflect network behavior –What are the sources/catalysts for link formation? –Getting Closer or Drifting Apart? Mobius et al.

Visibility Problem: How complete are graph measurements? Many social networks prevent scraping Aspects of profile are restricted/not public –May make it difficult to see some links –This sounds familiar, too: Analogous to hidden peering links in AS graph?

Dynamics Serendipity Project –Real-world interactions create links in social graph –New OSN links create interactions in the real world Challenges: –Understanding graph evolution may rely on exogenous factors that are difficult to measure Real-world Interactions Evolution of OSN Graph Problem: How does the network evolve over time?

Invariants What constitutes a representative data set? –Graph properties may vary by application (PGP keys, , Facebook, YouTube, etc.) Suppose that you are an advertiser, application builder, etc. –What conclusions can be drawn from a measurement study on one social network?

Can We Avoid Repeating Mistakes? Separation of exogenous factors Explanatory/evocative models –Exploration of why certain links form –Impact on applications Closing the loop –Effects on real-world behavior