Collusion-Resistance Misbehaving User Detection Schemes Speaker: Jing-Kai Lou 2015/10/131.

Slides:



Advertisements
Similar presentations
Pseudo-Relevance Feedback For Multimedia Retrieval By Rong Yan, Alexander G. and Rong Jin Mwangi S. Kariuki
Advertisements

Mining di Dati Web Web Community Mining and Web log Mining : Commody Cluster based execution Romeo Zitarosa.
Analysis and Modeling of Social Networks Foudalis Ilias.
Dong Liu Xian-Sheng Hua Linjun Yang Meng Weng Hong-Jian Zhang.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
DSPIN: Detecting Automatically Spun Content on the Web Qing Zhang, David Y. Wang, Geoffrey M. Voelker University of California, San Diego 1.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Expertise Networks in Online Communities: Structure and Algorithms Jun Zhang Mark S. Ackerman Lada Adamic University of Michigan WWW 2007, May 8–12, 2007,
Cluster Analysis.  What is Cluster Analysis?  Types of Data in Cluster Analysis  A Categorization of Major Clustering Methods  Partitioning Methods.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Presented by Zeehasham Rasheed
(hyperlink-induced topic search)
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
Models of Influence in Online Social Networks
CHAMELEON : A Hierarchical Clustering Algorithm Using Dynamic Modeling
Social Network Analysis via Factor Graph Model
Using Friendship Ties and Family Circles for Link Prediction Elena Zheleva, Lise Getoor, Jennifer Golbeck, Ugur Kuter (SNAKDD 2008)
1 Three dimensional mosaics with variable- sized tiles Visual Comput 2008 報告者 : 丁琨桓.
SpotRank : A Robust Voting System for Social News Websites
Free Powerpoint Templates Page 1 Free Powerpoint Templates Influence and Correlation in Social Networks Azad University KurdistanSocial Network.
Modeling Relationship Strength in Online Social Networks Rongjing Xiang: Purdue University Jennifer Neville: Purdue University Monica Rogati: LinkedIn.
Kristina Lerman Aram Galstyan USC Information Sciences Institute Analysis of Social Voting Patterns on Digg.
1 A Graph-Theoretic Approach to Webpage Segmentation Deepayan Chakrabarti Ravi Kumar
Using Hyperlink structure information for web search.
DETECTING SPAMMERS AND CONTENT PROMOTERS IN ONLINE VIDEO SOCIAL NETWORKS Fabrício Benevenuto ∗, Tiago Rodrigues, Virgílio Almeida, Jussara Almeida, and.
When Experts Agree: Using Non-Affiliated Experts To Rank Popular Topics Meital Aizen.
CIKM’09 Date:2010/8/24 Advisor: Dr. Koh, Jia-Ling Speaker: Lin, Yi-Jhen 1.
1 Discovering Authorities in Question Answer Communities by Using Link Analysis Pawel Jurczyk, Eugene Agichtein (CIKM 2007)
Protecting Sensitive Labels in Social Network Data Anonymization.
Presenter: Lung-Hao Lee ( 李龍豪 ) January 7, 309.
A Graph-based Friend Recommendation System Using Genetic Algorithm
MULTI-TORRENT: A PERFORMANCE STUDY Yan Yang, Alix L.H. Chow, Leana Golubchik Internet Multimedia Lab University of Southern California.
Center for E-Business Technology Seoul National University Seoul, Korea BrowseRank: letting the web users vote for page importance Yuting Liu, Bin Gao,
Predicting Positive and Negative Links in Online Social Networks
CS 533 Information Retrieval Systems.  Introduction  Connectivity Analysis  Kleinberg’s Algorithm  Problems Encountered  Improved Connectivity Analysis.
Feedback Effects between Similarity and Social Influence in Online Communities David Crandall, Dan Cosley, Daniel Huttenlocher, Jon Kleinberg, Siddharth.
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
Scalable Computing on Open Distributed Systems Jon Weissman University of Minnesota National E-Science Center CLADE 2008.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
How Useful are Your Comments? Analyzing and Predicting YouTube Comments and Comment Ratings Stefan Siersdorfer, Sergiu Chelaru, Wolfgang Nejdl, Jose San.
Ranking CSCI 572: Information Retrieval and Search Engines Summer 2010.
Jiafeng Guo(ICT) Xueqi Cheng(ICT) Hua-Wei Shen(ICT) Gu Xu (MSRA) Speaker: Rui-Rui Li Supervisor: Prof. Ben Kao.
Ranking Link-based Ranking (2° generation) Reading 21.
Automatic Video Tagging using Content Redundancy Stefan Siersdorfer 1, Jose San Pedro 2, Mark Sanderson 2 1 L3S Research Center, Germany 2 University of.
Harvesting Social Knowledge from Folksonomies Harris Wu, Mohammad Zubair, Kurt Maly, Harvesting social knowledge from folksonomies, Proceedings of the.
2015/12/121 Extracting Key Terms From Noisy and Multi-theme Documents Maria Grineva, Maxim Grinev and Dmitry Lizorkin Proceeding of the 18th International.
Measuring Behavioral Trust in Social Networks
Community Detection Algorithms: A Comparative Analysis Authors: A. Lancichinetti and S. Fortunato Presented by: Ravi Tiwari.
A Classification-based Approach to Question Answering in Discussion Boards Liangjie Hong, Brian D. Davison Lehigh University (SIGIR ’ 09) Speaker: Cho,
Clusters Recognition from Large Small World Graph Igor Kanovsky, Lilach Prego Emek Yezreel College, Israel University of Haifa, Israel.
Post-Ranking query suggestion by diversifying search Chao Wang.
1 Adaptive Subjective Triggers for Opinionated Document Retrieval (WSDM 09’) Kazuhiro Seki, Kuniaki Uehara Date: 11/02/09 Speaker: Hsu, Yu-Wen Advisor:
11 A Classification-based Approach to Question Routing in Community Question Answering Tom Chao Zhou 1, Michael R. Lyu 1, Irwin King 1,2 1 The Chinese.
Crowd Fraud Detection in Internet Advertising Tian Tian 1 Jun Zhu 1 Fen Xia 2 Xin Zhuang 2 Tong Zhang 2 Tsinghua University 1 Baidu Inc. 2 1.
KAIST TS & IS Lab. CS710 Know your Neighbors: Web Spam Detection using the Web Topology SIGIR 2007, Carlos Castillo et al., Yahoo! 이 승 민.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
1 Discovering Web Communities in the Blogspace Ying Zhou, Joseph Davis (HICSS 2007)
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
DATA MINING: CLUSTER ANALYSIS (3) Instructor: Dr. Chun Yu School of Statistics Jiangxi University of Finance and Economics Fall 2015.
Topics In Social Computing (67810) Module 1 (Structure) Centrality Measures, Graph Clustering Random Walks on Graphs.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Jinhong Jung, Woojung Jin, Lee Sael, U Kang, ICDM ‘16
Cluster Validity For supervised classification we have a variety of measures to evaluate how good our model is Accuracy, precision, recall For cluster.
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Date: 2012/11/15 Author: Jin Young Kim, Kevyn Collins-Thompson,
Presentation transcript:

Collusion-Resistance Misbehaving User Detection Schemes Speaker: Jing-Kai Lou 2015/10/131

Outline Introduction – What’s the problem – Does it matter Previous work: What have I done … – Community-based scheme Current Analysis: What am I doing … – HITS – Random walk scheme 2015/10/132

The Rise of User Generated Content Most of the fastest-growing sites on the internet now are based on user-generated content (UGC). Customer Reviews Increase Web Sales --- eMarketer 2015/10/133

Inappropriate UGC The misbehaving users – post the inappropriate UGC Hiring lots of official moderators – is the typical solution But, such high labor cost is a great burden to the service provider There is another choice … 2015/10/134

Social Moderation System A user-assist Moderation Every user is a reviewer Blogger Album Video ?? ? ? !? O O X X X X Official moderator inspects what you see You report what you see while viewing X X 2015/10/135

Social Moderation Effect Advantages of social moderation system: 1.Fewer official moderators 2.Detecting inappropriate content quickly The number of the reports is still large. 1% uploading photos in Flickr are problematic, there are still about 43,200 reports each day An automation scheme to filter the reports 2015/10/136

Automated Filter for Reports Sorting the reports by their number of accusations These photos are reported no more than ( N =20) times These photos are reported more than ( N =20) times 2015/10/137

However, the collusion exists… 2015/10/138

Not All Users Are Trustable While most users report responsibly, colluders report fake results to gain some benefits While most users report responsibly, colluders report fake results to gain some benefits 2015/10/139

The Objective To develop a collusion-resistant scheme CAN automatically infers whether the accusations are fair or malicious. The scheme, therefore, distinguish misbehaving users from victims. 2015/10/1310

Our Work: Graph Theory Approach Using the report (accusation) relation only Previous work: Community-based Scheme – Submitted to 3 rd ACM workshop on Scalable Trust Computing (STC 2008) Extended work: – Propose new schemes – Analyzing new schemes… 2015/10/1311

COMMUNITY-BASED SCHEME 2015/10/1312

Community-based Scheme Achieving accuracy rate higher than 90% Preventing at least 90% victims from collusion attack 2015/10/1313

Idea of Community-based Scheme Accusation Relation: Accusing Graph: /10/1314

Ideal Patterns 2015/10/1315 Colluder Victim Normal user Misbehaving user

Accusing Community Users with similar accusing tend to be in the same community 2015/10/1316 Inter-community edge

Designing Features for Each User To find accusations NOT from colluders Base on the communities, we design features – Incoming Accusation, IA(k) = 2, – Outgoing Accusation, OA(k) = 5 k 2015/10/1317

Community-based Algorithm 1.Partitioning accusing graph into communities. 2.Computing the feature pair ( IA, OA ) of each user 3.Clustering based on their ( IA, OA ) pairs, and label users in the cluster with large ( IA, OA ) as misbehaving users. 2015/10/1318

Evaluation Metric What we care is, False Negative – Misidentifying victims as misbehaving users Collusion Resistance 2015/10/1319

Effect of #(Misbehaving users) Our Method Count-based Method 2015/10/1320

Effect of #(Colluders) Our Method Count-based Method 2015/10/1321

Effect of Accusation Density Our Method Count-based Method 2015/10/1322

Weakness of Community-based scheme In our simulation, the colluders only accuse the victims. Realistically, the colluders sometimes may also vote some misbehaving users. We shall consider smart colluder 2015/10/1323

Smart Colluder Behavior Behavior := probability for colluder to vote misbehaving users, ranges from 0 to 100. Behavior 0100 Naïve Colluder Smart Colluder Normal user 2015/10/1324

HITS, HYPERLINK-INDUCED TOPIC SEARCH 2015/10/1325

Inspiration A link analysis algorithm that rates Web pages, developed by Jon Kleinberg.link analysisalgorithmJon Kleinberg It determines two values for a page: – its authority, which estimates the value of the content of the page, – and its hub value, which estimates the value of its links to other pages. 2015/10/1326

Ideal Authority  Victim Hub value  Colluder For example, – Number of User = 150 – Misbehaving User Ratio = 10%, i.e., 15 – Colluder Ratio = 20%, i.e., 30 – Behavior = 20% 2015/10/1327

2015/10/1328

When Behavior is increasing Parameter: – Number of User = 150 – Misbehaving User Ratio = 10%, i.e., 15 – Colluder Ratio = 20%, i.e., 30 – Behavior = 50% 2015/10/1329

2015/10/1330

RANDOM WALK SCHEME 2015/10/1331

Main Idea 1.Focusing on content accused by many reviewers 2.Creating undirected graph C to describe them and their relation 3.Shaping C, (named it as D) to satisfy the Goal 4.Goal: Putting many people walking several steps on D, then most of people would stay on “victims” finally 2015/10/1332

Co-Voter Graph, C Define a co-voter graph C(V, E) to describe the relation between all accused V(G): accused E(G): – if the intersection of accusers against accused i and j (vertex i and j), then (i, j) in E(G) – weight, w(i. j) = #(intersection of accusers) 2015/10/1333

A snap shot of co-voter graph B C A E F D 1, 2, 3, 4, 5, 6, 7, 81, 12, 13, 145,6,7,8 5, 7,81, 2, 4, 8, 9, 105, 6, /10/1334

Making Ideal Tendency (Be Directed) M M’ V V’ FORCE Strong Weak GOAL: 1.For M, 2 > 1 2.For V, 3 > /10/1335 Key Node

Goal 1: Intersection Ratio M M’ V 2015/10/1336 Prob. to V Prob. to M

GOAL 2: Alpha of Target Alpha(M) < Alpha(V), hopefully Mb V 2015/10/1337 Prob. to M = Alpha(M) Prob. to V = Alpha(V)

What should be Alpha? [Version N(eighborhood)]: Alpha(T) := the number of co-voters between b and all its neighbors Colluder tend to share more co-voters with his collusion group … [Version H(ub)]: Alpha(T) := Sum(hub score of T’s voter) 2015/10/1338

Weight Formula Options Directed weight formula: w(a, b) = Alpha(b) * |a intersect b| / |a union b| Then, we set the node leaving prob. by normalizing outgoing weight 2015/10/1339 X A B C Pr(X  A) =.4 Pr(X  B) =.2 Pr(X  C) =.4

Evaluation Parameter: – Number of User = 250 – Misbehaving User Ratio = 10%, i.e., 25 – Colluder Ratio = 20%, i.e., 50 – Behavior = 50% 2015/10/1340

Evaluation 2015/10/1341

Conclusion Any new factor we shall consider? Any idea to improve the random walk scheme, or HITS Scheme? Any NEW idea? 2015/10/1342

THANKS FOR YOUR LISTENING! 2015/10/1343