SlideShare uma empresa Scribd logo
1 de 44
Baixar para ler offline
Reputation Systems II
Sybil Attack, BlogRank, B2Rank, EigenRumor,
             MailRank, TrustRunk



         Yury Lifshits
         Caltech
         http://yury.name


                   Caltech CMI Seminar
                      March 4, 2008


                                          1 / 22
Outline

1   Sybil Attack

2   Ranking Blogs

3   Reputations For Fighting Spam

4   Conclusions



                                    2 / 22
1
Sybil Attack




               3 / 22
Sybil Attack

   Graph of trust-weighted edges

   n honest nodes + adversary

   overall trust value on attack edges
   (honest-malicious) is limited




                                         4 / 22
Sybil Attack

   Graph of trust-weighted edges

   n honest nodes + adversary

   overall trust value on attack edges
   (honest-malicious) is limited


Question: whether splitting adversarial node
into many is beneficial for acquiring higher
reputation (rank)?

                                               4 / 22
Negative Result


 Assume reputation scores remain the same
           under isomorphism.
             Is it sybilproof?




                                            5 / 22
Negative Result


 Assume reputation scores remain the same
           under isomorphism.
             Is it sybilproof?

Unfortunately, no. Attack strategy?




                                            5 / 22
Negative Result


 Assume reputation scores remain the same
           under isomorphism.
             Is it sybilproof?

Unfortunately, no. Attack strategy?

Answer: double the graph.




                                            5 / 22
Positive Results (1/3)

General form of trust flow reputations:

            r(x) = max           trust(p)
                   Ptx
                         p∈Ptx

Notation:

   t is pre-trusted node

   Pxy is a family of disjoint paths from t to x



                                               6 / 22
Positive Results (2/3)

Assumptions:
 1
     Extending path nonincreases the trust(p)
 2
       and trust are monotone to number of
     paths and edges values, respectively
 3
     Splitting a path into two does not increase
       value




                                                7 / 22
Positive Results (2/3)

Assumptions:
 1
     Extending path nonincreases the trust(p)
 2
       and trust are monotone to number of
     paths and edges values, respectively
 3
     Splitting a path into two does not increase
       value
 4
       = max


                                                7 / 22
Positive Results (3/3)


Under assumptions (1-3) sybil attack does not
increase adversary’s reputation




                                            8 / 22
Positive Results (3/3)


Under assumptions (1-3) sybil attack does not
increase adversary’s reputation

Under assumptions (1-4) sybil attack does not
increase adversary’s rank




                                            8 / 22
Positive Results (3/3)


Under assumptions (1-3) sybil attack does not
increase adversary’s reputation

Under assumptions (1-4) sybil attack does not
increase adversary’s rank

                   Proof?




                                            8 / 22
SybilGuard (1/2)


   Assume number of attack edges is
   A = o( n/ log n)

   System is distributed, honest nodes follow
   the same protocol

   Can an honest node t identify (w.h.p.)
   2A + 1 nodes in such a way that at most A
   of them are powered by adversary?



                                            9 / 22
SybilGuard (2/2)
   For every node fix a bijective mapping
   from in-edges to out-edges
   Take a walk from t of length at most
     n log n using bijection routing
   At some point make a random switch,
   than continue another n log n steps using
   backwalk routing
   Report a point. Repeat, until 2A + 1 points
   are collected



                                             10 / 22
SybilGuard (2/2)
   For every node fix a bijective mapping
   from in-edges to out-edges
   Take a walk from t of length at most
     n log n using bijection routing
   At some point make a random switch,
   than continue another n log n steps using
   backwalk routing
   Report a point. Repeat, until 2A + 1 points
   are collected

Claim
w.h.p. at most A reported nodes are malicious
                                             10 / 22
2
Ranking Blogs




                11 / 22
Ranking Blogs: Factors

   Entities: blogs, posts, communities,
   comments, brand names, external
   websites

   Frineds, blogroll, subscriptions, hyperlinks,
   visitors, clicks, votes

   Time

   Tags


                                              12 / 22
BlogRank

     Any ideas how to rank blogs?




                                    13 / 22
BlogRank

       Any ideas how to rank blogs?

Why not just PageRank?




                                      13 / 22
BlogRank

        Any ideas how to rank blogs?

Why not just PageRank?
Wait a minute, for which graph?




                                       13 / 22
BlogRank

        Any ideas how to rank blogs?

Why not just PageRank?
Wait a minute, for which graph? Linked blogs:

   Hyperlinks, blogrolls
   Common commentors/authors, tags, co-references
   to news



                                               13 / 22
B2Rank
B2Rank(x) = BlogReputation × PostQuality




                                           14 / 22
B2Rank
B2Rank(x) = BlogReputation × PostQuality

BlogReputation is computed in PageRank style
for blogroll graph with one change:

   Blogroll links are weighted by activity level
   (frequency of blogging and commenting)




                                              14 / 22
B2Rank
B2Rank(x) = BlogReputation × PostQuality

BlogReputation is computed in PageRank style
for blogroll graph with one change:

   Blogroll links are weighted by activity level
   (frequency of blogging and commenting)

PostQuality is average for PageRank-style
score of blog posts

   Post-to-post links are weighted by
   referring post activity and time difference
                                              14 / 22
EigenRumor (1/2)




Picture from “The EigenRumor Algorithm for Ranking Blogs” paper
                                                                  15 / 22
EigenRumor (2/2)
Notation:
    ¯: reputation score for posts
    r
    ¯ ¯
    a, h: authority and hub scores for bloggers
    P, E: provision and evaluation matrices




                                                  16 / 22
EigenRumor (2/2)
Notation:
    ¯: reputation score for posts
    r
    ¯ ¯
    a, h: authority and hub scores for bloggers
    P, E: provision and evaluation matrices

                      ¯
¯ = αPT a + (1 − α)ET h
r       ¯
          ¯
a = P¯, h = E¯
¯    r         r




                                                  16 / 22
EigenRumor (2/2)
Notation:
    ¯: reputation score for posts
    r
    ¯ ¯
    a, h: authority and hub scores for bloggers
    P, E: provision and evaluation matrices

                      ¯
¯ = αPT a + (1 − α)ET h
r       ¯
          ¯
a = P¯, h = E¯
¯    r         r

Solution: iterative algorithm for ¯:
                                  r
       T             T
¯ = (αP P + (1 − α)E E)¯
r                       r

                                                  16 / 22
3
Reputations For Fighting Spam




                                17 / 22
Combining Two Scores
  Hyperlink graph




                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes




                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes




                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner




                                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards




                                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards
  Compute spam scores a-la PageRank




                                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards
  Compute spam scores a-la PageRank
  Reweight hyperlink graph and pre-trusted
  nodes

                                         18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards
  Compute spam scores a-la PageRank
  Reweight hyperlink graph and pre-trusted
  nodes
  Compute reputations a-la PageRank      18 / 22
4
Conclusions




              19 / 22
Challenges
  Measurable objectives?
  Model for input data?
  Dynamic aspects of reputations?
  Digg-style ranking?
  Price of attack?
  Ranking in social networks?
  Ranking in RDF data?
  Billion dollar question: how to avoid arms
  race?
                                           20 / 22
References
  K. Fujimura, T. Inoue, M. Sugisaki
  The EigenRumor Algorithm for Ranking Blogs

  A. Kritikopoulos, M. Sideri, I. Varlamis
  BlogRank: ranking weblogs based on connectivity and similarity features

  M.A. Tayebi, S.M. Hashemi, A. Mohades
  B2Rank: An Algorithm for Ranking Blogs Based on Behavioral Features

  A. Cheng, E. Friedman
  Sybilproof reputation mechanisms

  H. Yu, M. Kaminsky, P.B. Gibbons, A, Flaxman
  SybilGuard: defending against sybil attacks via social networks

  P.A. Chirita, J. Diederich, W. Nejdl
  MailRank: using ranking for spam detection

  Z. Gyongyi, H. Garcia-Molina, J. Pedersen
  Combating web spam with TrustRank

  M. Dalal
  Spam and popularity ratings for combating link spam
                                                                            21 / 22
http://yury.name
http://yury.name/reputation.html
Ongoing project: http://businessconsumer.net




                                               22 / 22
http://yury.name
http://yury.name/reputation.html
Ongoing project: http://businessconsumer.net


    Thanks for your attention!
           Questions?



                                               22 / 22

Mais conteúdo relacionado

Destaque

Business-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury LifshitsBusiness-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury LifshitsYury Lifshits
 
Data Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! ResearchData Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! ResearchYury Lifshits
 
Osh — Curiosity Learning on Mobile
Osh — Curiosity Learning on MobileOsh — Curiosity Learning on Mobile
Osh — Curiosity Learning on MobileYury Lifshits
 
Reputation Systems I
Reputation Systems IReputation Systems I
Reputation Systems IYury Lifshits
 
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010Yury Lifshits
 

Destaque (7)

Business-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury LifshitsBusiness-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury Lifshits
 
Social Design
Social DesignSocial Design
Social Design
 
FaceBook MeetYourFriends Presentation
FaceBook MeetYourFriends PresentationFaceBook MeetYourFriends Presentation
FaceBook MeetYourFriends Presentation
 
Data Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! ResearchData Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! Research
 
Osh — Curiosity Learning on Mobile
Osh — Curiosity Learning on MobileOsh — Curiosity Learning on Mobile
Osh — Curiosity Learning on Mobile
 
Reputation Systems I
Reputation Systems IReputation Systems I
Reputation Systems I
 
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010
 

Semelhante a Reputation Systems II

Ranking systems
Ranking systemsRanking systems
Ranking systemsMafer
 
Ranking systems
Ranking systemsRanking systems
Ranking systemsJoyce
 
Dr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graphDr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graphCarlos Castillo (ChaTo)
 
Ranking systems
Ranking systemsRanking systems
Ranking systemscristian L
 
Markov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdfMarkov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdfrayyverma
 
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16MLconf
 

Semelhante a Reputation Systems II (7)

Link Analysis
Link AnalysisLink Analysis
Link Analysis
 
Ranking systems
Ranking systemsRanking systems
Ranking systems
 
Ranking systems
Ranking systemsRanking systems
Ranking systems
 
Dr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graphDr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graph
 
Ranking systems
Ranking systemsRanking systems
Ranking systems
 
Markov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdfMarkov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdf
 
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Reputation Systems II

  • 1. Reputation Systems II Sybil Attack, BlogRank, B2Rank, EigenRumor, MailRank, TrustRunk Yury Lifshits Caltech http://yury.name Caltech CMI Seminar March 4, 2008 1 / 22
  • 2. Outline 1 Sybil Attack 2 Ranking Blogs 3 Reputations For Fighting Spam 4 Conclusions 2 / 22
  • 4. Sybil Attack Graph of trust-weighted edges n honest nodes + adversary overall trust value on attack edges (honest-malicious) is limited 4 / 22
  • 5. Sybil Attack Graph of trust-weighted edges n honest nodes + adversary overall trust value on attack edges (honest-malicious) is limited Question: whether splitting adversarial node into many is beneficial for acquiring higher reputation (rank)? 4 / 22
  • 6. Negative Result Assume reputation scores remain the same under isomorphism. Is it sybilproof? 5 / 22
  • 7. Negative Result Assume reputation scores remain the same under isomorphism. Is it sybilproof? Unfortunately, no. Attack strategy? 5 / 22
  • 8. Negative Result Assume reputation scores remain the same under isomorphism. Is it sybilproof? Unfortunately, no. Attack strategy? Answer: double the graph. 5 / 22
  • 9. Positive Results (1/3) General form of trust flow reputations: r(x) = max trust(p) Ptx p∈Ptx Notation: t is pre-trusted node Pxy is a family of disjoint paths from t to x 6 / 22
  • 10. Positive Results (2/3) Assumptions: 1 Extending path nonincreases the trust(p) 2 and trust are monotone to number of paths and edges values, respectively 3 Splitting a path into two does not increase value 7 / 22
  • 11. Positive Results (2/3) Assumptions: 1 Extending path nonincreases the trust(p) 2 and trust are monotone to number of paths and edges values, respectively 3 Splitting a path into two does not increase value 4 = max 7 / 22
  • 12. Positive Results (3/3) Under assumptions (1-3) sybil attack does not increase adversary’s reputation 8 / 22
  • 13. Positive Results (3/3) Under assumptions (1-3) sybil attack does not increase adversary’s reputation Under assumptions (1-4) sybil attack does not increase adversary’s rank 8 / 22
  • 14. Positive Results (3/3) Under assumptions (1-3) sybil attack does not increase adversary’s reputation Under assumptions (1-4) sybil attack does not increase adversary’s rank Proof? 8 / 22
  • 15. SybilGuard (1/2) Assume number of attack edges is A = o( n/ log n) System is distributed, honest nodes follow the same protocol Can an honest node t identify (w.h.p.) 2A + 1 nodes in such a way that at most A of them are powered by adversary? 9 / 22
  • 16. SybilGuard (2/2) For every node fix a bijective mapping from in-edges to out-edges Take a walk from t of length at most n log n using bijection routing At some point make a random switch, than continue another n log n steps using backwalk routing Report a point. Repeat, until 2A + 1 points are collected 10 / 22
  • 17. SybilGuard (2/2) For every node fix a bijective mapping from in-edges to out-edges Take a walk from t of length at most n log n using bijection routing At some point make a random switch, than continue another n log n steps using backwalk routing Report a point. Repeat, until 2A + 1 points are collected Claim w.h.p. at most A reported nodes are malicious 10 / 22
  • 18. 2 Ranking Blogs 11 / 22
  • 19. Ranking Blogs: Factors Entities: blogs, posts, communities, comments, brand names, external websites Frineds, blogroll, subscriptions, hyperlinks, visitors, clicks, votes Time Tags 12 / 22
  • 20. BlogRank Any ideas how to rank blogs? 13 / 22
  • 21. BlogRank Any ideas how to rank blogs? Why not just PageRank? 13 / 22
  • 22. BlogRank Any ideas how to rank blogs? Why not just PageRank? Wait a minute, for which graph? 13 / 22
  • 23. BlogRank Any ideas how to rank blogs? Why not just PageRank? Wait a minute, for which graph? Linked blogs: Hyperlinks, blogrolls Common commentors/authors, tags, co-references to news 13 / 22
  • 24. B2Rank B2Rank(x) = BlogReputation × PostQuality 14 / 22
  • 25. B2Rank B2Rank(x) = BlogReputation × PostQuality BlogReputation is computed in PageRank style for blogroll graph with one change: Blogroll links are weighted by activity level (frequency of blogging and commenting) 14 / 22
  • 26. B2Rank B2Rank(x) = BlogReputation × PostQuality BlogReputation is computed in PageRank style for blogroll graph with one change: Blogroll links are weighted by activity level (frequency of blogging and commenting) PostQuality is average for PageRank-style score of blog posts Post-to-post links are weighted by referring post activity and time difference 14 / 22
  • 27. EigenRumor (1/2) Picture from “The EigenRumor Algorithm for Ranking Blogs” paper 15 / 22
  • 28. EigenRumor (2/2) Notation: ¯: reputation score for posts r ¯ ¯ a, h: authority and hub scores for bloggers P, E: provision and evaluation matrices 16 / 22
  • 29. EigenRumor (2/2) Notation: ¯: reputation score for posts r ¯ ¯ a, h: authority and hub scores for bloggers P, E: provision and evaluation matrices ¯ ¯ = αPT a + (1 − α)ET h r ¯ ¯ a = P¯, h = E¯ ¯ r r 16 / 22
  • 30. EigenRumor (2/2) Notation: ¯: reputation score for posts r ¯ ¯ a, h: authority and hub scores for bloggers P, E: provision and evaluation matrices ¯ ¯ = αPT a + (1 − α)ET h r ¯ ¯ a = P¯, h = E¯ ¯ r r Solution: iterative algorithm for ¯: r T T ¯ = (αP P + (1 − α)E E)¯ r r 16 / 22
  • 32. Combining Two Scores Hyperlink graph 18 / 22
  • 33. Combining Two Scores Hyperlink graph Pre-trusted nodes 18 / 22
  • 34. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes 18 / 22
  • 35. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner 18 / 22
  • 36. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards 18 / 22
  • 37. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards Compute spam scores a-la PageRank 18 / 22
  • 38. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards Compute spam scores a-la PageRank Reweight hyperlink graph and pre-trusted nodes 18 / 22
  • 39. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards Compute spam scores a-la PageRank Reweight hyperlink graph and pre-trusted nodes Compute reputations a-la PageRank 18 / 22
  • 40. 4 Conclusions 19 / 22
  • 41. Challenges Measurable objectives? Model for input data? Dynamic aspects of reputations? Digg-style ranking? Price of attack? Ranking in social networks? Ranking in RDF data? Billion dollar question: how to avoid arms race? 20 / 22
  • 42. References K. Fujimura, T. Inoue, M. Sugisaki The EigenRumor Algorithm for Ranking Blogs A. Kritikopoulos, M. Sideri, I. Varlamis BlogRank: ranking weblogs based on connectivity and similarity features M.A. Tayebi, S.M. Hashemi, A. Mohades B2Rank: An Algorithm for Ranking Blogs Based on Behavioral Features A. Cheng, E. Friedman Sybilproof reputation mechanisms H. Yu, M. Kaminsky, P.B. Gibbons, A, Flaxman SybilGuard: defending against sybil attacks via social networks P.A. Chirita, J. Diederich, W. Nejdl MailRank: using ranking for spam detection Z. Gyongyi, H. Garcia-Molina, J. Pedersen Combating web spam with TrustRank M. Dalal Spam and popularity ratings for combating link spam 21 / 22