Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang Miriam Metzger, Haitao Zheng and Ben Y. Zhao Computer.

Slides:



Advertisements
Similar presentations
Defending against large-scale crawls in online social networks Mainack Mondal Bimal Viswanath Allen Clement Peter Druschel Krishna Gummadi Alan Mislove.
Advertisements

An analysis of Social Network-based Sybil defenses Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University.
Scaling Microblogging Services with Divergent Traffic Demands Presented by Tianyin Xu Tianyin Xu, Yang Chen, Lei Jiao, Ben Zhao, Pan Hui, Xiaoming Fu University.
Practical Conflict Graphs for Dynamic Spectrum Distribution Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu *, Ben Y. Zhao and Haitao Zheng Department.
Clickstream Models & Sybil Detection Gang Wang ( 王刚 ) UC Santa Barbara
Concerns of Using Online Social Networks
Qiang Cao Duke University
ABUSING BROWSER ADDRESS BAR FOR FUN AND PROFIT - AN EMPIRICAL INVESTIGATION OF ADD-ON CROSS SITE SCRIPTING ATTACKS Presenter: Jialong Zhang.
Fighting Fire With Fire: Crowdsourcing Security Solutions on the Social Web Christo Wilson Northeastern University
Asking Questions on the Internet
You Are How You Click Clickstream Analysis for Sybil Detection Gang Wang, Tristan Konolige, Christo Wilson †, Xiao Wang ‡ Haitao Zheng and Ben Y. Zhao.
Haifeng Yu National University of Singapore
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao Yinglian Xie *, Fang Yu *, Qifa Ke *, Yuan Yu *, Yan Chen and Eliot Gillum ‡ EECS Department,
Structure based Data De-anonymization of Social Networks and Mobility Traces Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
Midterm Presentation Undergraduate Researchers: Graduate Student Mentor: Faculty Mentor: Jordan Cowart, Katie Allmeroth Krist Culmer Dr. Wenjun (Kevin)
Towards Online Spam Filtering in Social Networks Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary Lab for Internet and Security Technology.
GAYATRI SWAMYNATHAN, CHRISTO WILSON, BRYCE BOE, KEVIN ALMEROTH AND BEN Y. ZHAO UC SANTA BARBARA Do Social Networks Improve e-Commerce? A Study on Social.
EARLY DETECTION OF TWITTER TRENDS MILAN STANOJEVIC UNIVERSITY OF BELGRADE SCHOOL OF ELECTRICAL ENGINEERING.
Fighting Fire With Fire: Crowdsourcing Security Threats and Solutions on the Social Web Gang Wang, Christo Wilson, Manish Mohanlal, Ben Y. Zhao Computer.
Why Crowdsourcing Software automation replaces the role of human in many areas Store and retrieve large volumes of information Perform calculation Human.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Zifei Shan, Haowen Cao, Jason Lv, Cong Yan, Annie Liu Peking University, China 1.
I AM THE ANTENNA: ACCURATE OUTDOOR AP LOCATION USING SMARTPHONES ZENGBIN ZHANG, XIA ZHOU, WEILE ZHANG, YUANYANG ZHANG GANG WANG, BEN Y. ZHAO, HAITAO ZHENG.
Automated malware classification based on network behavior
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
1 Speaker : 童耀民 MA1G Authors: Ze Li Dept. of Electr. & Comput. Eng., Clemson Univ., Clemson, SC, USA Haiying Shen ; Hailang Wang ; Guoxin.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
University of California at Santa Barbara Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Zhao.
Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng and Ben Y. Zhao Computer Science Department, UC Santa Barbara Serf and.
OSN Research As If Sociology Mattered Krishna P. Gummadi Networked Systems Research Group MPI-SWS.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Exploring Metropolitan Dynamics with an Agent- Based Model Calibrated using Social Network Data Nick Malleson & Mark Birkin School of Geography, University.
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
Page 1 Ming Ji Department of Computer Science University of Illinois at Urbana-Champaign.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
Leveraging Social Networks to Defend against Sybil attacks Krishna Gummadi Networked Systems Research Group Max Planck Institute for Software Systems Germany.
ICOM 6115: Computer Systems Performance Measurement and Evaluation August 11, 2006.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University SIGCOMM 2010 Presented by Junyao Zhang Many of the.
Computer Science Department, Peking University
Exploit of Online Social Networks with Community-Based Graph Semi-Supervised Learning Mingzhen Mo and Irwin King Department of Computer Science and Engineering.
The Sybil Attack, J. R. Douceur, IPTPS Clifton Forlines CSC2231 Online Social Networks 11/1/2007.
SocialTube: P2P-assisted Video Sharing in Online Social Networks
Security Analytics Thrust Anthony D. Joseph (UCB) Rachel Greenstadt (Drexel), Ling Huang (Intel), Dawn Song (UCB), Doug Tygar (UCB)
Group 4 1.Maithili Gokhale 2.Swati Sisodia 3.Aman Chanana 4.Piyush Agade “Uncovering Social Network Sybils in the Wild” - Zhi Yang, Christo Wilson, Xio.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Authors: Yazan Boshmaf, Lldar Muslukhov, Konstantin Beznosov, Matei Ripeanu University of British Columbia Annual Computer Security Applications Conference.
I Am the Antenna Accurate Outdoor AP Location Using Smartphones Zengbin Zhang†, Xia Zhou†, Weile Zhang†§, Yuanyang Zhang†, Gang Wang†, Ben Y. Zhao† and.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer.
Gang Wang, Sarita Y. Schoenebeck †, Haitao Zheng, Ben Y. Zhao UC Santa Barbara, † University of Michigan Understanding Bias and Misbehavior on Location-based.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
On the State of OSN-based Sybil Defenses David Koll*, Jun Li^, Joshua Stein^ and Xiaoming Fu* *University of Göttingen, Germany ^University of Oregon,
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks Jenny (Bom Yi) Lee.
Measuring the Mixing Time of Social Graphs Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim Computer Science and Engineering Department University of Minnesota.
Gross Niv Analyzing Spammer’s Social Networks for Fun and Profit
BotTracer: Bot User Detection Using Clustering Method in RecDroid
Online Social Network: Threats &
Dieudo Mulamba November 2017
De-anonymizing the Internet Using Unreliable IDs By Yinglian Xie, Fang Yu, and Martín Abadi Presented by Peng Cheng 03/22/2017.
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
GANG: Detecting Fraudulent Users in OSNs
Social Network-Based Sybil Defenses
Presentation transcript:

Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang Miriam Metzger, Haitao Zheng and Ben Y. Zhao Computer Science Department, UC Santa Barbara.

Sybil In Online Social Networks (OSNs) 1  Sybil (s ɪ b ə l): fake identities controlled by attackerss ɪ b ə l  Friendship is a pre-cursor to other malicious activities  Does not include benign fakes (secondary accounts)  Research has identified malicious Sybils on OSNs  Twitter [CCS 2010]  Facebook [IMC 2010]  Renren [IMC 2011], Tuenti [NSDI 2012]

Real-world Impact of Sybil (Twitter) 2  Russian political protests on Twitter (2011)  25,000 Sybils sent 440,000 tweets  Drown out the genuine tweets from protesters Followers July 21st Jul-4 Jul-8 Jul-12 Jul-16 Jul-20 Jul-24 Jul-28 Aug-1 100,000 new followers in 1 day 900K 800K 700K 4,000 new followers/day

Security Threats of Sybil (Facebook)  Large Sybil population on Facebook  August 2012: 83 million (8.7%)  Sybils are used to:  Share or Send Spam  Theft of user’s personal information  Fake like and click fraud 3 50 likes per dollar Malicious URL

Community-based Sybil Detectors  Prior work on Sybil detectors  SybilGuard [SIGCOMM’06], SybilLimit [Oakland '08], SybilInfer [NDSS’09]  Key assumption: Sybils form tight-knit communities Sybils have difficulty “friending” normal users? 4

Do Sybils Form Sybil Communities? 5  Measurement study on Sybils in the wild [IMC’11]  Study Sybils in Renren (Chinese Facebook)  Ground-truth data on 560K Sybils collected over 3 years  Sybil components: sub-graphs of connected Sybils 5  Sybil components are internally sparse  Not amenable to community detection  New Sybil detection system is needed

Detect Sybils without Graphs  Anecdotal evidence that people can spot Sybil profiles  75% of friend requests from Sybils are rejected  Human intuition detects even slight inconsistencies in Sybil profiles  Idea: build a crowdsourced Sybil detector  Focus on user profiles  Leverage human intelligence and intuition  Open Questions  How accurate are users? What factors affect detection accuracy?  How can we make crowdsourced Sybil detection cost effective? 6

Outline 7  Introduction  User Study  Feasibility Experiment  Accuracy Analysis  Factors Impacting User Accuracy  Scalable Sybil Detection System  Conclusion Details in Paper

User Study Setup *  User study with 2 groups of testers on 3 datasets  2 groups of users  Experts – Our friends (CS professors and graduate students)  Turkers – Crowdworkers from online crowdsourcing systems  3 ground-truth datasets of full user profiles  Renren – given to us by Renren Inc.  Facebook US and India – crawled Sybils profiles – banned profiles by Facebook Legitimate profiles – 2-hops from our own profiles 8 Data collection details *IRB Approved

9 Classifying Profiles Browsing Profiles Screenshot of Profile (Links Cannot be Clicked) Real or fake?Why? Navigation Buttons

Experiment Overview Dataset# of ProfilesTest Group# of Testers Profile per Tester SybilLegit. Renren100 Chinese Expert24100 Chinese Turker41810 Facebook US 3250 US Expert4050 US Turker29912 Facebook India 5049 India Expert20100 India Turker More Profiles per Experts

Individual Tester Accuracy 11 Much Lower Accuracy Excellent! 80% of experts have >80% accuracy! Excellent! 80% of experts have >80% accuracy! Experts prove that humans can be accurate Turkers need extra help…

Wisdom of the Crowd  Is wisdom of the crowd enough?  Majority voting  Treat each classification by each tester as a vote  Majority vote determines final decision of the crowd  Results after majority voting (20 votes)  Both Experts and Turkers have almost zero false positives  Turker’s false negatives are still high US (19%), India (50%), China (60%) 12 False positive rates are excellent What can be done to improve turker accuracy?

Eliminating Inaccurate Turkers 13 Dramatic Improvement Removing inaccurate turkers can effectively reduce false negatives!

Outline 14  Introduction  User Study  Scalable Sybil Detection System  System Design  Trace-driven Simulation  Conclusion

A Practical Sybil Detection System Scalability  Must scale to millions of users  High accuracy with low costs 2. Preserve user privacy when giving data to turkers Key insight to designing our system Accuracy in turker population highly skewed Only 10% turkers > 90% accurate Accuracy (%) CDF (%) Details in Paper

16 Social Network Heuristics User Reports Suspicious Profiles All Turkers OSN Employees Turker Selection Accurate Turkers Very Accurate Turkers Sybils System Architecture Flag Suspicious Users Crowdsourcing Layer Maximize Utility of High Accuracy Turkers Maximize Utility of High Accuracy Turkers Rejected! Continuous Quality Control Locate Malicious Workers Continuous Quality Control Locate Malicious Workers

Trace Driven Simulations  Simulation on 2000 profiles  Error rates drawn from survey data  Calibrate 4 parameters to: Minimize false positives & false negatives Minimize votes per profile (minimize cost) 17 Results (Details in Paper) Average 6 votes per profile <1% false positives <1% false negatives Accurate Turkers Very Accurate Turkers Results++ Average 8 votes per profile <0.1% false positives <0.1% false negatives

Estimating Cost  Estimated cost in a real-world social networks: Tuenti  12,000 profiles to verify daily  14 full-time employees  Annual salary 30,000 EUR * (~$20 per hour)  $2240 per day  Crowdsourced Sybil Detection  20sec/profile, 8 hour day  50 turkers  Facebook wage ($1 per hour)  $400 per day 18 Augment existing automated systems Cost with malicious turkers 25% of turkers are malicous $504 per day Cost with malicious turkers 25% of turkers are malicous $504 per day *

Conclusion 19  Designed a crowdsourced Sybil detection system  False positives and negatives <1%  Resistant to infiltration by malicious workers  Low cost  Currently exploring prototypes in real-world OSNs

Questions? 20 Thank you!