Identifying Malicious Players in GWAP-based Disaster Monitoring - - PowerPoint PPT Presentation

identifying malicious players in gwap based disaster
SMART_READER_LITE
LIVE PREVIEW

Identifying Malicious Players in GWAP-based Disaster Monitoring - - PowerPoint PPT Presentation

. Yaxi Chen . . . . . . . . Identifying Malicious Players in GWAP-based Disaster Monitoring Crowdsourcing System Changkun Ou, Yifei Zhan Institute of Computer Science . The Key Laboratory for Computer Systems of University of Munich


slide-1
SLIDE 1

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Identifying Malicious Players in GWAP-based Disaster Monitoring Crowdsourcing System

Changkun Ou, Yifei Zhan Yaxi Chen Institute of Computer Science The Key Laboratory for Computer Systems of University of Munich State Ethnic Afgairs Commission changkun.ou@lmu.de Southwest Minzu University yifei.zhan@campus.lmu.de yaxichen@swun.cn

ICAIBD’ 19, Chengdu, China May 26, 2019

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 1 / 29

slide-2
SLIDE 2

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Outline

1

Background & Motivation

2

Preliminaries

3

Main Results Player Rating Model (PRM) Disaster Evaluation Model (DEM) Model Initialization

4

Evaluation & Discussion Simulation Limitations

5

Conclusions

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 2 / 29

slide-3
SLIDE 3

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Outline

1

Background & Motivation

2

Preliminaries

3

Main Results Player Rating Model (PRM) Disaster Evaluation Model (DEM) Model Initialization

4

Evaluation & Discussion Simulation Limitations

5

Conclusions

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 3 / 29

slide-4
SLIDE 4

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Background: Human Computation in 1 Minute

What are Human Computation systems? “Systems that combine humans and computers to solve large-scale problems that neither can solve alone” (Luis von Ahn, retrived 30

  • Apr. 2019)

Software systems with humans in the loop, human as explicit (or active) or implicit (or passive) contributors Human Computation systems can be seen as Crowdsourcing markets (Wisdom of crowds). Useful inputs (wisdom) can be gained from a group

  • f persons provided: Diversity of opinion; Idependence;

Decentralization; Aggregation. (James Surowiecki, 2005) Game-With-A-Purpose (GWAP) tries to hide actual intent away from players and aggregates human inputs for solving diffjcult problems.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 4 / 29

slide-5
SLIDE 5

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Background: Human Computation in 1 Minute

What are Human Computation systems? “Systems that combine humans and computers to solve large-scale problems that neither can solve alone” (Luis von Ahn, retrived 30

  • Apr. 2019)

Software systems with humans in the loop, human as explicit (or active) or implicit (or passive) contributors Human Computation systems can be seen as Crowdsourcing markets (Wisdom of crowds). Useful inputs (wisdom) can be gained from a group

  • f persons provided: Diversity of opinion; Idependence;

Decentralization; Aggregation. (James Surowiecki, 2005) Game-With-A-Purpose (GWAP) tries to hide actual intent away from players and aggregates human inputs for solving diffjcult problems.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 4 / 29

slide-6
SLIDE 6

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Background: Human Computation in 1 Minute

What are Human Computation systems? “Systems that combine humans and computers to solve large-scale problems that neither can solve alone” (Luis von Ahn, retrived 30

  • Apr. 2019)

Software systems with humans in the loop, human as explicit (or active) or implicit (or passive) contributors Human Computation systems can be seen as Crowdsourcing markets (Wisdom of crowds). Useful inputs (wisdom) can be gained from a group

  • f persons provided: Diversity of opinion; Idependence;

Decentralization; Aggregation. (James Surowiecki, 2005) Game-With-A-Purpose (GWAP) tries to hide actual intent away from players and aggregates human inputs for solving diffjcult problems.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 4 / 29

slide-7
SLIDE 7

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Motivation

Non-profjt organizations (e.g. UNICEF) has lack of resources in monitoring disaster regions, an automated system is essential. Sucessful disaster monitoring requires

reliable predictions: system and algorithm design low costs maintains: GWAPs-based crowdsourcing

Malicious player detection is critical in disaster monitoring and guarentees the health of a GWAP-based human computation system.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 5 / 29

slide-8
SLIDE 8

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Motivation

Non-profjt organizations (e.g. UNICEF) has lack of resources in monitoring disaster regions, an automated system is essential. Sucessful disaster monitoring requires

reliable predictions: system and algorithm design low costs maintains: GWAPs-based crowdsourcing

Malicious player detection is critical in disaster monitoring and guarentees the health of a GWAP-based human computation system.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 5 / 29

slide-9
SLIDE 9

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Outline

1

Background & Motivation

2

Preliminaries

3

Main Results Player Rating Model (PRM) Disaster Evaluation Model (DEM) Model Initialization

4

Evaluation & Discussion Simulation Limitations

5

Conclusions

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 6 / 29

slide-10
SLIDE 10

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

System Architecture

The system consist of three components: task generating service rating service ranking service

Crowdsourcing Players Data Clean Service Rating Service Training Service PlayerDB Ranking Service Front Web Game Service Stakeholders (NPOs, government, hospitals, etc.)

Start

Task Generating Service

Report Disaster Area Pictures Fetch Task Generate Task Play AnonymousID, ROI, Tags Newly tagged satellite Image

ResultDB

Fetch Result Real-time report Disaster Region Disaster Level Report Result Assign Store Gaming Data Notify Training Update Model Report Reliable Result Store Evaluation Result

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 7 / 29

slide-11
SLIDE 11

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

System Interface

(a) (b) (c) Figure: System interface. a) Player game panel overview; b) Multi-tags selection for selected areas; c) Disaster level report in stakeholder view.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 8 / 29

slide-12
SLIDE 12

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Preliminaries

Defjnition (Region of Interests, ROI)

An ROI represents a subset of R2. The i-th ROI from player p in image k is denoted by ROIp,i,k.

Monitored Geographical Region ROI1,1,k1 ROI2,1,k2 ROI1,2,k1

Image

Reliable Players Malicious Player

Image k1 k2

Player 1 Player 2 Player 3

Figure: Reliable players (red and blue) draw rectangles to indicate area with disaster, however malicious player does not cooperate (black) selects other ROIs.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 9 / 29

slide-13
SLIDE 13

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Preliminaries (cond.)

Defjnition (Tag Vector, TV)

Assuming n difgerent tags g1, g2, ..., gn for a certain image k, the tag vector is defjned by Tp,i,k = (|g1|, |g2|, ..., |gn|)⊤ of ROIp,i,k where gl is the l-th tag where l = 1, 2, ..., n, |gl| is the count of gl in a player task object, and n equals to the number of tags.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 10 / 29

slide-14
SLIDE 14

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Outline

1

Background & Motivation

2

Preliminaries

3

Main Results Player Rating Model (PRM) Disaster Evaluation Model (DEM) Model Initialization

4

Evaluation & Discussion Simulation Limitations

5

Conclusions

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 11 / 29

slide-15
SLIDE 15

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Player Rating Graph (PRG)

Defjnition (System Weight Vector)

For n difgerent tags g1, g2, ..., gn. Let |gi| is the count of gi in the system. A system weight vector v = (p(g1), p(g2), ..., p(gn))⊤, where p(gi) = |gi| ∑n

j=1 |gj|, i = 1, ..., n.

(1)

Lemma (Properties)

p(gi) holds the properties: 0 ≤ p(gi) ≤ 1 ∑n

i=1 p(gi) = 1

∑s

i=1 p(gri) ≤ 1

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 12 / 29

slide-16
SLIDE 16

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Player Rating Graph (PRG) cond. I

Defjnition (Image Weight Vector)

For difgerent tags gr1, gr2, ..., grs in a certain k, the image weight vector is a vector for image k that is composed by part of the system weight vector where vk =(p(gr1), p(gr2), ..., p(grs))⊤ with ri(i = 1, 2, ..., s) ∈ {1, 2, ..., n}, ri ̸= rj(i ̸= j, j = 1, 2, ..., s) and s ≤ n.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 13 / 29

slide-17
SLIDE 17

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Player Rating Graph (PRG) cond. II

Defjnition ((Asymmetric) Players ROI Matching Ratio, PRMR)

For player p q, and a certain image k: PRMR(p, q, i, j, k) = |ROIp,i,k ∩ ROIq,j,k| |ROIp,i,k| (2) where ROIp,i,k is the i-th selected ROI from player p, and |ROIp,i,k| is the surface area of ROIp,i,k.

Lemma (PRMR Bounds)

The inequality holds: 0 ≤ PRMR(p, q, i, j, k) ≤ 1 (3)

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 14 / 29

slide-18
SLIDE 18

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Player Rating Graph (PRG) cond. III

Defjnition ((Asymmetric) Player Input Tag Correlation, PITC)

For two difgerent tag vectors Tp,i,k, Tq,j,k from player p, q image weight vector vk, PITC is defjned as follows: PITC(p, q, i, j, k) = Cov(Tp,i,k, Tq,j,k; vk) Cov(Tp,i,k, Tp,i,k; vk) (4) where Cov(X, Y; w) is the weighted covariance of X and Y.

Lemma (PITC Bounds)

The inequality holds: − 1 ≤ PITC(p, q, i, j, k) ≤ 1. (5)

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 15 / 29

slide-19
SLIDE 19

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Player Rating Graph (PRG) cond. IV

Defjnition (PRG Edge Weight)

For a image k, the weight of the PRG between player p and q is: wp,q,k =

n

j=1 m

i=1

PRMR(p, q, i, j, k) (PITC(p, q, i, j, k) + 2) (6) where p selected m ROIs and q selected n ROIs.

New player comes Image k

wp,q,k wq,p,k wq,p,k wp,q,k

Player p Player q Player p Player q Player r (new)

Figure: PRG for certain images: Assume player p and q are former reliable players. A new player is composed with former players in the graph as a game network.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 16 / 29

slide-20
SLIDE 20

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Player Rating Graph (PRG) cond. V

Let a normalized adjacency matrix calculated as follows: Ak = (ap,q,k) = ( wp,q,k ∑

q wp,q,k

) (7) where k is the image indicator. We have

Theorem (Soundness)

The normalized adjacency matrix Ak of PRG of a certain image k is irreducible, real, non-negative, and column-stochastic, with positive diagonal element.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 17 / 29

slide-21
SLIDE 21

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Player Rating Graph (PRG) cond. VI

According to Perron-Frobenius theorem, one can infer that there exists an uniqueness eigenvector Vk = (λ1,k, ..., λn,k)⊤ of Ak (Perron vector), with an uniqueness eigenvalue ρ(Ak) is the spectral radius of Ak (Perron root), such that: Ak · Vk = ρ(Ak) · Vk, λi,k > 0,

n

i=1

λi,k = 1.

Defjnition (Trust Value, λ)

A trust value λi,k of player i on image k is a score that equals to the i-th component of the Perron vector of the normalized PRG adjacency matrix Ak.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 18 / 29

slide-22
SLIDE 22

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Malicious Detection Algorithm

Algorithm 1: Malicious Player Detection

input : New Player p, Reliable Player p1, p2, ..., pm, Task Images k1, k2, ..., k2n, Acceptance Threshold δ

  • utput: Reliability of Player p

begin counter ← − 0 reliability ← − false for k ∈ [k1, k2, ..., k2n] do if k is tagged image then calculate λp,k, λp1,k, ..., λpm,k if λp,k ≥ 1

m

∑m

i=1 λpi,k then

counter ← − counter +1 end end end if counter ≥ δ then reliability ← − true end end

The acceptance threshold is a hyperparameter that can be set beforehand. For instance, if δ = 1, the new player only needs to pass one singular image of all tagged images; if δ = n (half images of the task), the new player has to pass all tagged images, which makes the system unbreakable if the system is initialized by a trusted group.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 19 / 29

slide-23
SLIDE 23

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Malicious Detection Algorithm (Cond.)

New player carries new tags into the system will infmuence the tag vector calculation and cause the weight not computable due to the inequal dimensions of the tag vector of new player and old player. Solution: If a new player does not provide new tag: Directly perform the calculation with the algorithm; If a new player carries new tags only: Directly drop them because they are unreliable; If a player carries both selected and new tags: a) Perform the calculation with the algorithm without new tags; b) Merge and update all weight vector v via formula 6 if the player is reliable; c) Otherwise drop and mark the result as unreliable.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 20 / 29

slide-24
SLIDE 24

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Disaster Evaluation Model (DEM)

Defjnition (Disaster Level ∆)

A monitor region is composed by images k1, ..., kn. Each image exists rki number of ROIs with i = 1, ..., n, and each ROI is tagged with tags g1, ..., gm. The disaster level ∆ of a monitor region is: ∆ =

m

j=1

( p(gj) ∑

gj |ROI|

∑n

i=1 |ki|

) (8) where |ROI| is the surface area of a ROI, ∑

gj |ROI| means accumulated

surface area of all ROIs that tagged by gj, and |ki| is the surface area of image ki.

Theorem (Denseness)

The disaster level ∆ is dense in internal [0, 1].

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 21 / 29

slide-25
SLIDE 25

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Determine The Size of Trusted Group

The PRM is based on graph centrality calculation, which means we need a (at least) two dimensional matrix to perform the overall model calculation. Hence, with the new player, the minimum number of the initial trusted group is 1. Then the initial trusted group (one person) with the new player form a two dimensional adjacency matrix that makes the model computable. For larger initial trusted groups, the trust value can be simply initialized to 1

n with n is the number of

initial trusted group.

Become Minimum Initial Trusted Group New Player Tagging Trusted Group If reliable Untagged images Tagged images

Figure: Initialization of PRM

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 22 / 29

slide-26
SLIDE 26

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Outline

1

Background & Motivation

2

Preliminaries

3

Main Results Player Rating Model (PRM) Disaster Evaluation Model (DEM) Model Initialization

4

Evaluation & Discussion Simulation Limitations

5

Conclusions

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 23 / 29

slide-27
SLIDE 27

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Simulated Evaluation

Monitored Geographical Region

(x,y) WROI HROI

Player Selections Top-Left Selection Central

Figure: An example of ROI simulation which can be used in the system evaluation.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 24 / 29

slide-28
SLIDE 28

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Data Leakage and Information Loss

First Cut Loss “Point” Second Cut

Figure: Information loss may occur on the intersection lines; a possible solution is to perform a “half shifting” cut.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 25 / 29

slide-29
SLIDE 29

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Limitations

Outdated Evaluation If none of the new images gets evaluated, then the disaster level will not be updated. Solution: time series prediction. Game Playability Players may meet the situation that there is no available ROI in several continuous rounds. Solution: pre-fjltering.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 26 / 29

slide-30
SLIDE 30

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Outline

1

Background & Motivation

2

Preliminaries

3

Main Results Player Rating Model (PRM) Disaster Evaluation Model (DEM) Model Initialization

4

Evaluation & Discussion Simulation Limitations

5

Conclusions

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 27 / 29

slide-31
SLIDE 31

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Take Away

Human-computation systems solve problems that neither computer or human can solve alone. We proposed Player Rating Graph Model and Disaster Evaluation Model and mathematically proved its soundness and completeness. Our models solves the model initialization problems in human computation fjeld. The models are generic and can be easily apply to any other similar systems. Simulation and Half Shifting cut are proposed for evaluation and data security. Time series prediction and image pre-fjltering are proposed to address

  • utdated evaluation and game playability for our future works.

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 28 / 29

slide-32
SLIDE 32

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Thank you for your attention!

Ou et al. 2019 (LMU and SMU) Malicious Detection in GAWP Systems May 26, 2019 29 / 29