Computer Science Department, Peking University

Slides:



Advertisements
Similar presentations
Defending against large-scale crawls in online social networks Mainack Mondal Bimal Viswanath Allen Clement Peter Druschel Krishna Gummadi Alan Mislove.
Advertisements

An analysis of Social Network-based Sybil defenses Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University.
Clickstream Models & Sybil Detection Gang Wang ( 王刚 ) UC Santa Barbara
TI: An Efficient Indexing Mechanism for Real-Time Search on Tweets Chun Chen 1, Feng Li 2, Beng Chin Ooi 2, and Sai Wu 2 1 Zhejiang University, 2 National.
TrustRank Algorithm Srđan Luković 2010/3482
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Fault-Tolerant Target Detection in Sensor Networks Min Ding +, Dechang Chen *, Andrew Thaeler +, and Xiuzhen Cheng + + Department of Computer Science,
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
Spectrum Based RLA Detection Spectral property : the eigenvector entries for the attacking nodes,, has the normal distribution with mean and variance bounded.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Haifeng Yu National University of Singapore
Chen Cheng1, Haiqin Yang1, Irwin King1,2 and Michael R. Lyu1
CS246: Page Selection. Junghoo "John" Cho (UCLA Computer Science) 2 Page Selection Infinite # of pages on the Web – E.g., infinite pages from a calendar.
Distributed PageRank Computation Based on Iterative Aggregation- Disaggregation Methods Yangbo Zhu, Shaozhi Ye and Xing Li Tsinghua University, Beijing,
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Informed Detour Selection Helps Reliability Boulat A. Bash.
Communication-Efficient Distributed Monitoring of Thresholded Counts Ram Keralapura, UC-Davis Graham Cormode, Bell Labs Jai Ramamirtham, Bell Labs.
Measurement and Analysis of Online Social Networks By Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, Bobby Bhattacharjee Attacked.
Retrieval Evaluation: Precision and Recall. Introduction Evaluation of implementations in computer science often is in terms of time and space complexity.
Retrieval Evaluation. Introduction Evaluation of implementations in computer science often is in terms of time and space complexity. With large document.
DIDS part II The Return of dIDS 2/12 CIS GrIDS Graph based intrusion detection system for large networks. Analyzes network activity on networks.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
Personalized Ontologies for Web Search and Caching Susan Gauch Information and Telecommunications Technology Center Electrical Engineering and Computer.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Opportunistic Routing Based Scheme with Multi-layer Relay Sets in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
To Trust of Not To Trust? Predicting Online Trusts using Trust Antecedent Framework Viet-An Nguyen 1, Ee-Peng Lim 1, Aixin Sun 2, Jing Jiang 1, Hwee-Hoon.
Speed and Direction Prediction- based localization for Mobile Wireless Sensor Networks Imane BENKHELIFA and Samira MOUSSAOUI Computer Science Department.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
SOS: A Safe, Ordered, and Speedy Emergency Navigation Algorithm in Wireless Sensor Networks Andong Zhan ∗ †, Fan Wu ∗, Guihai Chen ∗ ∗ Shanghai Key Laboratory.
CS An Overlay Routing Scheme For Moving Large Files Su Zhang Kai Xu.
Sensor Positioning in Wireless Ad-hoc Sensor Networks Using Multidimensional Scaling Xiang Ji and Hongyuan Zha Dept. of Computer Science and Engineering,
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
IPCCC’111 Assessing the Comparative Effectiveness of Map Construction Protocols in Wireless Sensor Networks Abdelmajid Khelil, Hanbin Chang, Neeraj Suri.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Ahsanul Haque *, Swarup Chandra *, Latifur Khan * and Michael Baron + * Department of Computer Science, University of Texas at Dallas + Department of Mathematical.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
Presenter: Lung-Hao Lee ( 李龍豪 ) January 7, 309.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
A Novel Local Patch Framework for Fixing Supervised Learning Models Yilei Wang 1, Bingzheng Wei 2, Jun Yan 2, Yang Hu 2, Zhi-Hong Deng 1, Zheng Chen 2.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
DynamicMR: A Dynamic Slot Allocation Optimization Framework for MapReduce Clusters Nanyang Technological University Shanjiang Tang, Bu-Sung Lee, Bingsheng.
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
26/01/20161Gianluca Demartini Ranking Categories for Faceted Search Gianluca Demartini L3S Research Seminars Hannover, 09 June 2006.
1 Friends and Neighbors on the Web Presentation for Web Information Retrieval Bruno Lepri.
Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang Miriam Metzger, Haitao Zheng and Ben Y. Zhao Computer.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Incremental Run-time Application Mapping for Heterogeneous Network on Chip 2012 IEEE 14th International Conference on High Performance Computing and Communications.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
A stochastic scheduling algorithm for precedence constrained tasks on Grid Future Generation Computer Systems (2011) Xiaoyong Tang, Kenli Li, Guiping Liao,
Reliability of Wireless sensors with code attestation for intrusion detection Ing-Ray Chen, Yating Wang, Ding-Chau Wang Information Processing Letters.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Reputation-aware QoS Value Prediction of Web Services Weiwei Qiu, Zhejiang University Zibin Zheng, The Chinese University of HongKong Xinyu Wang, Zhejiang.
TrustRank. 2 Observation – Good pages tend to link good pages. – Human is the best spam detector Algorithm – Select a small subset of pages and let a.
Yu Wang1, Gao Cong2, Guojie Song1, Kunqing Xie1
BotTracer: Bot User Detection Using Clustering Method in RecDroid
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Presenters: Adeela Huma, Lijing Wang, Xuchao Zhang
Learning Influence Probabilities In Social Networks
Dieudo Mulamba November 2017
Jinhong Jung, Woojung Jin, Lee Sael, U Kang, ICDM ‘16
MEgo2Vec: Embedding Matched Ego Networks for User Alignment Across Social Networks Jing Zhang+, Bo Chen+, Xianming Wang+, Fengmei Jin+, Hong Chen+, Cuiping.
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
GANG: Detecting Fraudulent Users in OSNs
Presentation transcript:

Computer Science Department, Peking University VoteTrust Leveraging Friend Invitation Graph to Defend Social Network Sybils Jilong Xue , Zhi Yang , Xiaoyong Yang, Xiao Wang, Lijiang Chen and Yafei Dai Computer Science Department, Peking University

Sybil attack in Social networks Sybils Friend invitation Non-popular users reject accept

VoteTrust: An Overview Basic idea: Considering invitation feedback as voting Key techniques: Trust-based votes assignment Global vote aggregation Properties: High precision in Sybil detection Efficient in limiting Sybil’s attack ability

Graph Model A A 1 C C B B Link initiation graph 𝐺 𝐼 =( 𝑉 𝐼 , 𝐸 𝐼 ) B B Link initiation graph 𝐺 𝐼 =( 𝑉 𝐼 , 𝐸 𝐼 ) Link acceptance graph 𝐺 𝐸 =( 𝑉 𝐸 , 𝐸 𝐸 , 𝑊 𝐸 )

Framework of VoteTrust Select trust seed – high reliable users Distribute votes Collect votes and computing score

Outline Preliminary Implementation Evaluation Conclusion Trust-based vote assignment Global vote aggregation Evaluation Conclusion

Votes Assignment Problem: Principle: How to implement? How to distribute votes across users? Principle: Reliable user should get more votes How to implement? v v Reliable user v v v Non-popular user Sybil

Trust-based Votes Assignment Step1: Assigning votes to little human-selected reliable seeds Step2: Propagating to whole users across the Link initiation graph 𝒗𝒐𝒕𝒆(𝑢)=𝑑∙ 𝑣:(𝑣,𝑢)∈ 𝐸 𝐼 𝒗𝒐𝒕𝒆(𝑣) 𝑜𝑢𝑡_𝑑𝑒𝑔𝑟𝑒𝑒(𝑣) + 1−𝑑 ∙𝒊𝒏𝒊𝒕(𝑢)

Example … A B C D E A B C D E Node A is reliable seed Total votes =5 t=1 0.75 4.25 t=2 0.75 0.65 1.80 1.80 C D E t=3 2.59 0.94 0.31 0.58 0.58 … t=n 1.69 1.57 0.14 0.80 0.80 Node A is reliable seed Total votes =5

Outline Preliminary Implementation Evaluation Conclusion Trust-based vote assignment Global vote aggregation Evaluation Conclusion

Vote Aggregating Problem: Principle: How to collect votes and compute user trust score? Trust score 𝑝 𝑢 ∈[0,1] Principle: Trust user should have high weight in voting. vote=1,score=0.2 vote=1,score=0.9 A B 1 C score=? 𝑠𝑐𝑜𝑟𝑒(𝐶)= 1×0.9 1×0.2+1×0.9 =0.82

Global Vote Aggregation Step1: Set all users’ initial score as 0.5; Step2: Iteratively computing each user’s trust score according to aggregated votes. 𝒔𝒄𝒐𝒓𝒆 𝑢 = 𝑣𝑜𝑡𝑒 𝑣 ∙𝒔𝒄𝒐𝒓𝒆 𝑣 ∙ 𝑥 𝑣,𝑢 𝑣𝑜𝑡𝑒 𝑣 ∙𝒔𝒄𝒐𝒓𝒆 𝑣 , (𝑣,𝑢)∈ 𝐸 𝐸

Small-sample Problem Number of votes is too small. Wilson score weighted average of 𝒑 and 1 2 . vote=1,score=0.2 A B score=0 ? score=0.40 𝒑= 𝒑 + 1 2𝑁 𝑧 1− 𝛼 2 1+ 1 𝑁 𝑧 1− 𝛼 2 vote=1,score=0.2 A 1 B score=1 ? score=0.61

Security Properties (I) Theorem 1: The number of Sybil’s attack-link needs to satisfy the following upper bound where 𝛿 𝑓 is detection threshold. 𝑵 𝒐𝒖𝒕 ≤𝜌 𝑵 𝒊𝒏 ∙ 𝛿 𝑓 − 𝛿 𝑓 2 𝛿 𝑓 −𝑟 𝑁 𝑖𝑛 Normal user Sybil 𝑁 𝑜𝑢𝑡

Simulation of Theorem 1 Comm size: 100 # of in-links: 10 Nout avg: 2.36 Nout max:4

Security Properties (II) Theorem 2: Sybil community size need to satisfy the upper bound , where 𝛿 𝑣 is vote collection threshold. 𝑵 𝒔 ≤𝜎∙ 𝑵 𝒊𝒏 𝛿 𝑣

Simulation of Theorem 2

Outline Preliminary Implementation Evaluation Conclusion Trust-based vote assignment Global vote aggregation Evaluation Conclusion

Experimental Setup Data Set Methodology Renren regional network (PKU) include 200K users, 5.01 million friend invitations 2502 Sybil accounts detected by Renren Manual checking 73 Sybils from 500 random user Methodology Compared with TrustRank and BadRank Evaluation metrics: Precision and Recall

TrustRank vs. VoteTrust Averagely improve 32.9% Averagely improve 75.6%

BadRank vs. VoteTrust Averagely improve 44.5% Averagely improve 41.6%

Separating Normal User from Sybils 80% with low score

Separating Normal User from Sybils Maximum accuracy=85.7%

Performance Summary Outperforms TrustRank by 32.9% in detection precision averagely; Outperforms BadRank by 44.5% in detection precision averagely; High accurate in classifying the Sybil and normal user (include non-popular user)

Outline Preliminary Implementation Evaluation Conclusion Trust-based vote assignment Global vote aggregation Evaluation Conclusion

Conclusion VoteTrust is a rating system Key techniques high accuracy in Sybil detection Efficient in resisting Sybil (community) Key techniques Trust-based vote assignment Global vote aggregation

Thank you!