OSN Research As If Sociology Mattered Krishna P. Gummadi Networked Systems Research Group MPI-SWS.

Slides:



Advertisements
Similar presentations
Defending against large-scale crawls in online social networks Mainack Mondal Bimal Viswanath Allen Clement Peter Druschel Krishna Gummadi Alan Mislove.
Advertisements

An analysis of Social Network-based Sybil defenses Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University.
Keele Management School
Comparison of Social Networks by Likhitha Ravi. Outline What is a social network? Elements of social network Previous studies What is missing in previous.
Krishna P. Gummadi Networked Systems Research Group MPI-SWS
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Fragmentation of identity through structural holes in.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
An Analysis of Social Network-Based Sybil Defenses Sybil Defender
Toward an Optimal Social Network Defense Against Sybil Attacks Haifeng Yu National University of Singapore Phillip B. Gibbons Intel Research Pittsburgh.
Qiang Cao Duke University
What is Sociology? Family Sociology
Enabling the Social Web Krishna P. Gummadi Networked Systems Group Max Planck Institute for Software Systems.
WEB2.0 Social Media & Independent Pharmacy Real World Use & Possibilities.
Haifeng Yu National University of Singapore
Fifth Workshop on Link Analysis, Counterterrorism, and Security. or Antonio Badia David Skillicorn.
By: Roma Mohibullah Shahrukh Qureshi
UNDERSTANDING VISIBLE AND LATENT INTERACTIONS IN ONLINE SOCIAL NETWORK Presented by: Nisha Ranga Under guidance of : Prof. Augustin Chaintreau.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Measurement and Analysis of Online Social Networks By Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, Bobby Bhattacharjee Attacked.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
User Interactions in OSNs Evangelia Skiani. Do you have a Facebook account? Why? How likely to know ALL your friends? Why confirm requests? Why not remove.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
What’s New in Search? How destinations can leverage new search trends.
By: Aaron Gustafson Owner Computers N’ Stuff.  Facebook is FREE!!!  Youtube is FREE!!!  Twitter is FREE!!!  Google Plus is FREE!!!  Website hosting.
FACEBOOK AS A LEARNING TOOL Implications for ubiquitous learning.
University of California at Santa Barbara Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Zhao.
Modeling Relationship Strength in Online Social Networks Rongjing Xiang: Purdue University Jennifer Neville: Purdue University Monica Rogati: LinkedIn.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Anonymous Identification in Ad Hoc Groups New York, NY, USAApril 6 th, 2004 Yevgeniy Dodis, Antonio Nicolosi, Victor Shoup
CSC8320. Outline Content from the book Recent Work Future Work.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
Internet Skills The World Wide Web (Web) consists of billions of interconnected pages of information from a wide variety of sources. In this section: Web.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
Murtaza Abbas Asad Ali. NETWORKOLOGY THE SCIENCE OF NETWORKS.
Leveraging Social Networks to Defend against Sybil attacks Krishna Gummadi Networked Systems Research Group Max Planck Institute for Software Systems Germany.
Assessing the Frequency of Empirical Evaluation in Software Modeling Research Workshop on Experiences and Empirical Studies in Software Modelling (EESSMod)
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Sunbelt XXX, July 3 rd, Riva, Italy Integration in Social Networks as a form of Social Capital: Evidence from a survey on Social Cohesion Bram Vanhoutte.
Sharing Social Content from Home: A Measurement-driven Feasibility Study Massimiliano Marcon Bimal Viswanath Meeyoung Cha Krishna Gummadi NOSSDAV 2011.
Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University SIGCOMM 2010 Presented by Junyao Zhang Many of the.
The Sociological Perspective Chapter 1, section 1.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Security Analytics Thrust Anthony D. Joseph (UCB) Rachel Greenstadt (Drexel), Ling Huang (Intel), Dawn Song (UCB), Doug Tygar (UCB)
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Measuring Behavioral Trust in Social Networks
+ Big Data, Network Analysis Week How is date being used Predict Presidential Election - Nate Silver –
DSybil: Optimal Sybil-Resistance for Recommendation Systems Haifeng Yu National University of Singapore Chenwei Shi National University of Singapore Michael.
Multiparty Access Control for Online Social Networks : Model and Mechanisms.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang Miriam Metzger, Haitao Zheng and Ben Y. Zhao Computer.
Complex Systems Workshop, September 20-21, 2012 Evaluation of Complex Systems J. Bryan Lyles Program Director CISE/CNS.
A Sybil-Proof Distributed Hash Table Chris Lesniewski-LaasM. Frans Kaashoek MIT 28 April 2010 NSDI
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer.
Social Media & Social Networking 101 Canadian Society of Safety Engineering (CSSE)
Measuring User Influence in Twitter: The Million Follower Fallacy Meeyoung Cha Hamed Haddadi Fabricio Benevenuto Krishna P. Gummadi.
Twitter Community Discovery & Analysis Using Topologies Andrew McClain Karen Aguar.
In your notebooks: 1.) Write down the following names: 1. Auguste Comte 2. Harriet Martineau 3. Herbert Spencer 4. Emile Durkeim 5. Max Weber 6. Karl Marx.
On the State of OSN-based Sybil Defenses David Koll*, Jun Li^, Joshua Stein^ and Xiaoming Fu* *University of Göttingen, Germany ^University of Oregon,
Measuring the Mixing Time of Social Graphs Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim Computer Science and Engineering Department University of Minnesota.
On the Strength of Weak Identities in Social Computing Systems
Web *.0 ? Combining peer production and peer-to-peer systems
Dieudo Mulamba November 2017
By group 3(not the ones who made the paper :D)
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
GANG: Detecting Fraudulent Users in OSNs
Social Network-Based Sybil Defenses
Presentation transcript:

OSN Research As If Sociology Mattered Krishna P. Gummadi Networked Systems Research Group MPI-SWS

OSN research today Computational sociology: A natural sciences approach –Gather and analyze OSN data to study problems in sociology –Sociologists today use pretty sophisticated computing tools Social computing: An engineering approach –Build systems that support / leverage human social interactions –But, we tend to treat human behavior as annoying noise rather than leverage insights from sociology

This talk Argues that insights from sociology can help design better systems Example 1: Dunbar’s number –The case for decentralized content sharing in OSNs Example 2: Group attachment theory –How social network-based Sybil defenses do or don’t work

Example 1: Dunbar’s number Limits the # of stable social relationships a user can have –To less than a couple of hundred –Linked to size of neo-cortex region of the brain –Observed throughout history since hunter-gatherer societies Also observed repeatedly in studies of OSN user activity –Users might have a large number of contacts –But, regularly interact with less than a couple of hundred of them

User generated content sharing over OSNs A very popular activity over Facebook –UGC like pictures, videos, and wall posts Facebook is building massive datacenters to support UGC –Uses Akamai to deliver it But, most of Facebook’s UGC is of personal nature –Pictures and videos of family and social events Content popularity would be limited by Dunbar’s number! Do we really need datacenters & CDNs to share this UGC?

Why not share personal UGC from homes? Advantage: Regain control over personal data sharing –Better control over what you share & whom you share Concerns: –Can we get good performance? Yes, due to Dunbar’s limit on popularity –Can we get good availability? Yes, using always-on and always-connected gateways They are inexpensive: cheap and low-power

Example 2: Group attachment theory Explains how humans join and relate to groups Common-bond based groups –Membership based on inter-personal ties, e.g., family or kinship –Necessarily small, but tightly-knit and cohesive Common-identity based groups –Membership based on self- or shared- interest –Could be larger, but become less cohesive with scale

OSN graphs and groups Most OSN graphs include all manners of links Can extract bond groups from graph structure –By looking for highly clustered communities of nodes But, not identity groups –Loosely-knit, they merge into the rest of the network Result: A size limit on detectable graph communities

Sybil attack A fundamental problem in distributed systems Attacker creates many fake/sybil identities Many cases of real world attacks : Digg, Youtube Automated sybil attack on Youtube for $147!

Defending against Sybil attacks Traditional solutions rely on central trusted authorities –Runs counter to open membership policies of OSNs Recent proposals leverage social networks –Key Insight: Social links are hard to acquire in abundance –Look for small cuts in the graph –Conversely, look for communities around known trusted nodes Links difficult to create

Lots of research activity recently Each optimized under assumptions about the graph structure –E.g., graphs are fast-mixing Each evaluated on different datasets Comparative evaluations yield inconsistent results SybilGuard [SIGCOMM’06] SybilLimit [Oakland’08] Ostra [NSDI’08] SumUp [NSDI’09] SybilInfer [NDSS’09] Whanau [NSDI’10] MobID [INFOCOM’10] All schemes analyse the graph structure to isolate Sybils

Sybil resilience & group attachment theory Sybil schemes find bond groups around a trusted node But, these are only a fraction of all honest nodes Bond groups are hard for Sybils to infiltrate Not the case with identity groups

Implications Graph structure can identify nodes that are non-Sybils But, it cannot identify nodes that are Sybils Most nodes cannot be classified into either categories Does this imply Sybil schemes are useless? –No, they can be used conservatively to find content from people you trust

Summary OSN system designers should look to leverage insights from sociology Presented two examples where some very basic knowledge of sociology proved useful Lots more ways to leverage sociology in the future –Can we leverage strength of ties to set privacy policies or prioritizing updates from friends?