network structure
play

Network Structure Grant Schoenebeck, Aaron Snook, Fang-Yi Yu Sybil - PowerPoint PPT Presentation

Sybil Detection Using Latent Network Structure Grant Schoenebeck, Aaron Snook, Fang-Yi Yu Sybil Attack An attack to compromise a recommendation systems by forging identities. Recommendation System How is that restaurant? Bad Good Good


  1. Sybil Detection Using Latent Network Structure Grant Schoenebeck, Aaron Snook, Fang-Yi Yu

  2. Sybil Attack • An attack to compromise a recommendation systems by forging identities.

  3. Recommendation System How is that restaurant? Bad Good Good Bad Good Good Bad

  4. Sybil Can Manipulate the Opinion How is that restaurant? Bad Good Good Bad Good Good Bad

  5. Activities and Profile Characteristics • Pros – Proliferating signals to exploit – Practical benefits • Cons – Cat and mouse game

  6. Structure of the Social Network • Pros – Expensive signal to forge • Cons – Stringent conditions

  7. Assumptions on Network Topology • Assuming distinct ability • Empirical results [Alvisi 2013] – Honest nodes: Well-mixed – Social networks don’t have fast networks mixing time – Sybil: Limited connection to the – Sybil are accepted as friends much honest higher than anticipated

  8. Alternative Assumptions Previous Assumptions Our Assumptions • Honest nodes: • Honest nodes: – Well-mixed networks – ‘locally’ dense in low dimensional space • Sybil: • Sybil: – Limited connection to the honest – relax to constant fraction of honest agent would be compromisable Goal Goal • Recover all honest agents • core space: a whitelist of nodes

  9. Alternative Assumptions Previous Assumptions Our Assumptions • Honest nodes: • Honest nodes: – Well-mixed networks – ‘locally’ dense in low dimensional space • Sybil: • Sybil: – Limited connection to the honest – relax to constant fraction of honest agent would be compromisable Goal Goal • Recover all honest agents • core space: a whitelist of nodes

  10. Low Dimensional Latent Metric Space • Intuition – Metrics space encodes the similarity between agents • Well-regarded network models – Watts-Strogatz model: ring – Kleinberg’s small world model: lattices – Low distortion multiplex social network [Abraham2013]

  11. Our Low Dimensional Assumptions • Dimensionality – Graph with pairwise distance having ℝ 𝑒 as special cases – Requiring low doubling dimension • Density – Every local region contains a random graph – Only require of constant fraction of nodes • How realistic are our assumptions

  12. Experiment Setups • Dataset Description – Facebook – Twitter – Wiki-vote – Epinion • Implementation – Use Spectrum embedding – Compute the core space

  13. Core Space in Facebook • Graph properties – 4,039 nodes, 88,234 edges – Average degree 21.8 • Core space – Density > 10 – Connect to 𝑞 fraction of nearby nodes

  14. Core Space in Twitter • Graph properties – 81,306 nodes, 1,768,149 edges – Average degree 21,75 • Core space – Density > 10 – Connect to 𝑞 fraction of nearby nodes

  15. Alternative Assumptions Previous Assumptions Our Assumptions • Honest nodes: • Honest nodes: – Well-mixed networks – ‘locally’ dense in low dimensional space • Sybil: • Sybil: – Limited connection to the honest – relax to constant fraction of honest agent would be compromisable Goal Goal • Recover all honest agents • core space: a whitelist of nodes

  16. Compromisable Agents • Idea – Someone might accept all the friend requests • Honest nodes – Most of the nodes are trustworthy – A random portion of nodes are compromisable • Sybils – Cannot connect to trustworthy nodes

  17. Assumptions Summary Assumptions Social network Sybils Previous Works Well-mixed Bounded connection to honest nodes Our Work Locally dense in low- Only connection to dimensional space compromisable nodes

  18. Detection Game • Original Graph

  19. Detection Game • Reveal the trustworthy and compromisable nodes

  20. Detection Game • Adversary try to add Sybil nodes into the networks

  21. Detection Game • Adversary try to add Sybil nodes into the networks

  22. Detection Game • Detection algorithm return a whitelist

  23. Detection Game • Detection algorithm return a whitelist

  24. Theorem • If the total number of Sybil nodes and Compromisable nodes is smaller than some constant fraction the honest nodes, and the graph can be imbedded into locally dense low dimensional space, in the detection game for any adversary the detection algorithm can return a large whitelist without any Sybil

  25. A Toy Model • Network of honest nodes – 1 dimensional unit circle – 𝑜 nodes uniformly placed 1 – Well-connected within distance log 𝑜 • Limitation of Sybils – Connects to Sybil or compromisable node – #Sybil = O(𝑜) , #the Compromisable = O(𝑜)

  26. A Toy Model • Network of honest nodes – 1 dimensional unit circle – 𝑜 nodes uniformly placed 1 – Well-connected within distance log 𝑜 • Limitation of Sybils – Connects to Sybil or compromisable node – #Sybil = O(𝑜) , #the Compromisable = O(𝑜)

  27. What can Sybil do? Connect to the compromisable Form its own network

  28. What should detection algorithm do? Remove non-local edges Remove low degree nodes

  29. Future Work • Can we do better if we have information of compromisable nodes?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend