spamresist making peer to peer tagging spamresist making
play

SpamResist: Making Peer-to-Peer Tagging SpamResist: Making - PowerPoint PPT Presentation

SpamResist: Making Peer-to-Peer Tagging SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam Systems Robust to Spam Ennan Ennan Zhai, Zhai, Ruichuan Ruichuan Chen, Eng Keong hen, Eng Keong Lua* Lua* Long Zhang, Long Zhang,


  1. SpamResist: Making Peer-to-Peer Tagging SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam Systems Robust to Spam Ennan Ennan Zhai, Zhai, Ruichuan Ruichuan Chen, Eng Keong hen, Eng Keong Lua* Lua* Long Zhang, Long Zhang, Huiping Huiping Sun, Zhuhua un, Zhuhua Cai Cai Sihan Sihan Qing, Zhong ing, Zhong Chen Chen Peking University & *Carnegie Mellon University Peking University & *Carnegie Mellon University

  2. Roadmap Roadmap What is the tag spam in P2P tagging What is the tag spam in P2P tagging I systems? systems? What are the existing solutions on this What are the existing solutions on this I I problem? problem? Our approach? Our approach? I I I 1

  3. Roadmap Roadmap What is the tag spam in P2P tagging What is the tag spam in P2P tagging I systems? systems? What are the existing solutions on this What are the existing solutions on this I I problem? problem? Our approach? Our approach? I I I 1

  4. Tagging Systems Tagging Systems There are some tagging services-based systems in our lives … … 2

  5. P2P Tagging Systems P2P Tagging Systems To meet the challenge, such as DoS or single point failure, tagging services are introduced into P2P content systems… … 3

  6. P2P Tagging Systems P2P Tagging Systems To meet the challenge, such as DoS or single point failure, tagging services are introduced into P2P content systems… … For example, Tagster is an open source DHT-based P2P tagging system. (http://isweb.uni-koblenz.de/research/tagster) 3

  7. Tag Spam Tag Spam The results for searching tag “iphone” in MyWeb. 4

  8. Tag Spam Tag Spam The results for searching tag “iphone” in MyWeb. When we click this link, we will find the following page ……. 4

  9. Tag Spam Tag Spam This Figure is not related to iphones. 5

  10. Tag Spam Tag Spam This Figure is not related to iphones. We can also observe that this site has been assigned many other popular but irrelevant tags. 5

  11. Tag Spam Tag Spam That is the problem of tag spam! Definition of Tag Spam: The erroneous or misleading tags that are generated by some malicious users to confuse the normal users in the systems. 6

  12. Roadmap Roadmap What is the tag spam in P2P tagging What is the tag spam in P2P tagging I systems? systems? What are the existing solutions on this What are the existing solutions on this I I problem? problem? Our approach? Our approach? I I I 7

  13. Roadmap Roadmap What is the tag spam in P2P tagging What is the tag spam in P2P tagging I systems? systems? What are the existing solutions on this What are the existing solutions on this I I problem? problem? Our approach? Our approach? I I I 7

  14. Related Work Related Work Detection-based Mechanisms. Demotion-based Mechanisms. Interface-based Mechanisms. 8

  15. Related Work Related Work Detection-based Mechanisms. Demotion-based Mechanisms. Interface-based Mechanisms. 8

  16. Related Work Related Work Detection-based Mechanisms. Demotion-based Mechanisms. Interface-based Mechanisms. 8

  17. Related Work Related Work Detection-based Mechanisms. Demotion-based Mechanisms. Interface-based Mechanisms. 8

  18. Roadmap Roadmap What is the tag spam in P2P tagging What is the tag spam in P2P tagging I systems? systems? What are the existing solutions on this What are the existing solutions on this I I problem? problem? Our approach? Our approach? I I I 9

  19. Roadmap Roadmap What is the tag spam in P2P tagging What is the tag spam in P2P tagging I systems? systems? What are the existing solutions on this What are the existing solutions on this I I problem? problem? Our approach? Our approach? I I I 9

  20. SpamResist SpamResist SpamResist is a demotion-based mechanism, and encompasses two key parts: Reliability Mechanism; Social Network-based Enhancement. 10

  21. SpamResist SpamResist SpamResist is a demotion-based mechanism, and encompasses two key parts: Reliability Mechanism; Social Network-based Enhancement. 10

  22. What is reliability mechanism? What is reliability mechanism? For each tag (e.g., Sea) search, client calculates a reliability degree for each respondent, and uses weighted averaging to compute the rank of the search results. 11

  23. What is reliability mechanism? What is reliability mechanism? For each tag (e.g., Sea) search, client calculates a reliability degree for each respondent, and uses weighted averaging to compute the rank of the search results. The peer who annotated some local files with “Sea” will respond the client with these files. We call this peer as respondent. 11

  24. What is reliability mechanism? What is reliability mechanism? For each tag (e.g., Sea) search, client calculates a reliability degree for each respondent, and uses weighted averaging to compute the rank of the search results. Weight is the reliability degree of the owner of each response resource. 11

  25. What is reliability mechanism? What is reliability mechanism? For each tag (e.g., Sea) search, client calculates a reliability degree for each respondent, and uses weighted averaging to compute the rank of the search results. Weight is the reliability degree of the owner of each response resource. How the client to compute the reliability degree for each peer? 11

  26. How to compute reliability? How to compute reliability? Reliability degree is a personalized score assigned to each peer by the client, and SpamResist proposes two schemes for the client to calculate the reliability degrees of two categories of peers respectively: • Unfamiliar peers; • Interacted peers. 12

  27. How to compute reliability? How to compute reliability? Reliability degree is a personalized score assigned to each peer by the client, and SpamResist proposes two schemes for the client to calculate the reliability degrees of two categories of peers respectively: • Unfamiliar peers; • Interacted peers. Normally, the behaviors that peer A downloads some files from peer B are called interactions between A and B. 12

  28. How to compute reliability? How to compute reliability? Reliability degree is a personalized score assigned to each peer by the client, and SpamResist proposes two schemes for the client to calculate the reliability degrees of two categories of peers respectively: • Unfamiliar peers; • Interacted peers. The peers that the client has never interacted with. 12

  29. Unfamiliar Peer’s Reliability Unfamiliar Peer’s Reliability 13

  30. How to compute reliability? How to compute reliability? Reliability degree is a personalized score assigned to each peer by the client, and SpamResist proposes two schemes for the client to calculate the reliability degrees of two categories of peers respectively: • Unfamiliar peers; • Interacted peers. The peers that the client has interacted with. 14

  31. Interacted Peer’s Reliability Interacted Peer’s Reliability The client stores the previous experiences from the interacted peers in his own experience vector (EV A,B ). , ,..., v v v A , B , 1 A , B , 2 A , B , n 15

  32. Interacted Peer’s Reliability Interacted Peer’s Reliability The client stores the previous experiences from the interacted peers in his own experience vector (EV A,B ). , ,..., v v v A , B , 1 A , B , 2 A , B , n Specifically, for the peer B that client A has interacted with, A maintains a vector of length n storing the most recent n experiences with B , and as new experiences are appended the oldest ones are removed. 15

  33. Interacted Peer’s Reliability Interacted Peer’s Reliability 16

  34. Interacted Peer’s Reliability Interacted Peer’s Reliability The client stores the previous experiences from the interacted peers in his own experience vector (EV A,B ). , ,..., v v v A , B , 1 A , B , 2 A , B , n Reliability degree from A to B (interacted peer for A) is: + + ... + v v v A , B , 1 A , B , 2 A , B , n n 17

  35. SpamResist SpamResist SpamResist is a demotion-based mechanism, and encompasses two key parts: Reliability Mechanism; Social Network-based Enhancement. 18

  36. SpamResist SpamResist SpamResist is a demotion-based mechanism, and encompasses two key parts: Reliability Mechanism; Social Network-based Enhancement. 18

  37. Social Network-based Enhancement Social Network-based Enhancement • Re-compute the ranking score (RS) for the result file whose RS is lower than 0.5. • If more than half of friends have RS higher than 0.5, re-locate the position. • According to average of scores higher than 0.5. 19

  38. Social Network-based Enhancement Social Network-based Enhancement Alice’s search result Ranking Score … … 0.4 sea.jpg Alice … … 20

  39. Social Network-based Enhancement Social Network-based Enhancement Alice’s search result Ranking Score … … 0.4 sea.jpg Alice … … Alice’s Friends 20

  40. Social Network-based Enhancement Social Network-based Enhancement Alice’s search result Ranking Score … … 0.4 sea.jpg Alice … … Alice’s Friends 0.7 0.8 0.4 20 Ranking Scores

  41. Social Network-based Enhancement Social Network-based Enhancement Alice’s search result Ranking Score … … 0.4 sea.jpg Alice … … Alice’s Friends (0.7 + 0.8) / 2 = 0.75 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend