SlideShare une entreprise Scribd logo
1  sur  44
Télécharger pour lire hors ligne
Reputation Systems II
Sybil Attack, BlogRank, B2Rank, EigenRumor,
             MailRank, TrustRunk



         Yury Lifshits
         Caltech
         http://yury.name


                   Caltech CMI Seminar
                      March 4, 2008


                                          1 / 22
Outline

1   Sybil Attack

2   Ranking Blogs

3   Reputations For Fighting Spam

4   Conclusions



                                    2 / 22
1
Sybil Attack




               3 / 22
Sybil Attack

   Graph of trust-weighted edges

   n honest nodes + adversary

   overall trust value on attack edges
   (honest-malicious) is limited




                                         4 / 22
Sybil Attack

   Graph of trust-weighted edges

   n honest nodes + adversary

   overall trust value on attack edges
   (honest-malicious) is limited


Question: whether splitting adversarial node
into many is beneficial for acquiring higher
reputation (rank)?

                                               4 / 22
Negative Result


 Assume reputation scores remain the same
           under isomorphism.
             Is it sybilproof?




                                            5 / 22
Negative Result


 Assume reputation scores remain the same
           under isomorphism.
             Is it sybilproof?

Unfortunately, no. Attack strategy?




                                            5 / 22
Negative Result


 Assume reputation scores remain the same
           under isomorphism.
             Is it sybilproof?

Unfortunately, no. Attack strategy?

Answer: double the graph.




                                            5 / 22
Positive Results (1/3)

General form of trust flow reputations:

            r(x) = max           trust(p)
                   Ptx
                         p∈Ptx

Notation:

   t is pre-trusted node

   Pxy is a family of disjoint paths from t to x



                                               6 / 22
Positive Results (2/3)

Assumptions:
 1
     Extending path nonincreases the trust(p)
 2
       and trust are monotone to number of
     paths and edges values, respectively
 3
     Splitting a path into two does not increase
       value




                                                7 / 22
Positive Results (2/3)

Assumptions:
 1
     Extending path nonincreases the trust(p)
 2
       and trust are monotone to number of
     paths and edges values, respectively
 3
     Splitting a path into two does not increase
       value
 4
       = max


                                                7 / 22
Positive Results (3/3)


Under assumptions (1-3) sybil attack does not
increase adversary’s reputation




                                            8 / 22
Positive Results (3/3)


Under assumptions (1-3) sybil attack does not
increase adversary’s reputation

Under assumptions (1-4) sybil attack does not
increase adversary’s rank




                                            8 / 22
Positive Results (3/3)


Under assumptions (1-3) sybil attack does not
increase adversary’s reputation

Under assumptions (1-4) sybil attack does not
increase adversary’s rank

                   Proof?




                                            8 / 22
SybilGuard (1/2)


   Assume number of attack edges is
   A = o( n/ log n)

   System is distributed, honest nodes follow
   the same protocol

   Can an honest node t identify (w.h.p.)
   2A + 1 nodes in such a way that at most A
   of them are powered by adversary?



                                            9 / 22
SybilGuard (2/2)
   For every node fix a bijective mapping
   from in-edges to out-edges
   Take a walk from t of length at most
     n log n using bijection routing
   At some point make a random switch,
   than continue another n log n steps using
   backwalk routing
   Report a point. Repeat, until 2A + 1 points
   are collected



                                             10 / 22
SybilGuard (2/2)
   For every node fix a bijective mapping
   from in-edges to out-edges
   Take a walk from t of length at most
     n log n using bijection routing
   At some point make a random switch,
   than continue another n log n steps using
   backwalk routing
   Report a point. Repeat, until 2A + 1 points
   are collected

Claim
w.h.p. at most A reported nodes are malicious
                                             10 / 22
2
Ranking Blogs




                11 / 22
Ranking Blogs: Factors

   Entities: blogs, posts, communities,
   comments, brand names, external
   websites

   Frineds, blogroll, subscriptions, hyperlinks,
   visitors, clicks, votes

   Time

   Tags


                                              12 / 22
BlogRank

     Any ideas how to rank blogs?




                                    13 / 22
BlogRank

       Any ideas how to rank blogs?

Why not just PageRank?




                                      13 / 22
BlogRank

        Any ideas how to rank blogs?

Why not just PageRank?
Wait a minute, for which graph?




                                       13 / 22
BlogRank

        Any ideas how to rank blogs?

Why not just PageRank?
Wait a minute, for which graph? Linked blogs:

   Hyperlinks, blogrolls
   Common commentors/authors, tags, co-references
   to news



                                               13 / 22
B2Rank
B2Rank(x) = BlogReputation × PostQuality




                                           14 / 22
B2Rank
B2Rank(x) = BlogReputation × PostQuality

BlogReputation is computed in PageRank style
for blogroll graph with one change:

   Blogroll links are weighted by activity level
   (frequency of blogging and commenting)




                                              14 / 22
B2Rank
B2Rank(x) = BlogReputation × PostQuality

BlogReputation is computed in PageRank style
for blogroll graph with one change:

   Blogroll links are weighted by activity level
   (frequency of blogging and commenting)

PostQuality is average for PageRank-style
score of blog posts

   Post-to-post links are weighted by
   referring post activity and time difference
                                              14 / 22
EigenRumor (1/2)




Picture from “The EigenRumor Algorithm for Ranking Blogs” paper
                                                                  15 / 22
EigenRumor (2/2)
Notation:
    ¯: reputation score for posts
    r
    ¯ ¯
    a, h: authority and hub scores for bloggers
    P, E: provision and evaluation matrices




                                                  16 / 22
EigenRumor (2/2)
Notation:
    ¯: reputation score for posts
    r
    ¯ ¯
    a, h: authority and hub scores for bloggers
    P, E: provision and evaluation matrices

                      ¯
¯ = αPT a + (1 − α)ET h
r       ¯
          ¯
a = P¯, h = E¯
¯    r         r




                                                  16 / 22
EigenRumor (2/2)
Notation:
    ¯: reputation score for posts
    r
    ¯ ¯
    a, h: authority and hub scores for bloggers
    P, E: provision and evaluation matrices

                      ¯
¯ = αPT a + (1 − α)ET h
r       ¯
          ¯
a = P¯, h = E¯
¯    r         r

Solution: iterative algorithm for ¯:
                                  r
       T             T
¯ = (αP P + (1 − α)E E)¯
r                       r

                                                  16 / 22
3
Reputations For Fighting Spam




                                17 / 22
Combining Two Scores
  Hyperlink graph




                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes




                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes




                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner




                                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards




                                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards
  Compute spam scores a-la PageRank




                                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards
  Compute spam scores a-la PageRank
  Reweight hyperlink graph and pre-trusted
  nodes

                                         18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards
  Compute spam scores a-la PageRank
  Reweight hyperlink graph and pre-trusted
  nodes
  Compute reputations a-la PageRank      18 / 22
4
Conclusions




              19 / 22
Challenges
  Measurable objectives?
  Model for input data?
  Dynamic aspects of reputations?
  Digg-style ranking?
  Price of attack?
  Ranking in social networks?
  Ranking in RDF data?
  Billion dollar question: how to avoid arms
  race?
                                           20 / 22
References
  K. Fujimura, T. Inoue, M. Sugisaki
  The EigenRumor Algorithm for Ranking Blogs

  A. Kritikopoulos, M. Sideri, I. Varlamis
  BlogRank: ranking weblogs based on connectivity and similarity features

  M.A. Tayebi, S.M. Hashemi, A. Mohades
  B2Rank: An Algorithm for Ranking Blogs Based on Behavioral Features

  A. Cheng, E. Friedman
  Sybilproof reputation mechanisms

  H. Yu, M. Kaminsky, P.B. Gibbons, A, Flaxman
  SybilGuard: defending against sybil attacks via social networks

  P.A. Chirita, J. Diederich, W. Nejdl
  MailRank: using ranking for spam detection

  Z. Gyongyi, H. Garcia-Molina, J. Pedersen
  Combating web spam with TrustRank

  M. Dalal
  Spam and popularity ratings for combating link spam
                                                                            21 / 22
http://yury.name
http://yury.name/reputation.html
Ongoing project: http://businessconsumer.net




                                               22 / 22
http://yury.name
http://yury.name/reputation.html
Ongoing project: http://businessconsumer.net


    Thanks for your attention!
           Questions?



                                               22 / 22

Contenu connexe

En vedette

Business-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury LifshitsBusiness-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury LifshitsYury Lifshits
 
Data Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! ResearchData Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! ResearchYury Lifshits
 
Osh — Curiosity Learning on Mobile
Osh — Curiosity Learning on MobileOsh — Curiosity Learning on Mobile
Osh — Curiosity Learning on MobileYury Lifshits
 
Reputation Systems I
Reputation Systems IReputation Systems I
Reputation Systems IYury Lifshits
 
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010Yury Lifshits
 

En vedette (7)

Business-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury LifshitsBusiness-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury Lifshits
 
Social Design
Social DesignSocial Design
Social Design
 
FaceBook MeetYourFriends Presentation
FaceBook MeetYourFriends PresentationFaceBook MeetYourFriends Presentation
FaceBook MeetYourFriends Presentation
 
Data Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! ResearchData Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! Research
 
Osh — Curiosity Learning on Mobile
Osh — Curiosity Learning on MobileOsh — Curiosity Learning on Mobile
Osh — Curiosity Learning on Mobile
 
Reputation Systems I
Reputation Systems IReputation Systems I
Reputation Systems I
 
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010
 

Similaire à Reputation Systems II

Ranking systems
Ranking systemsRanking systems
Ranking systemsMafer
 
Ranking systems
Ranking systemsRanking systems
Ranking systemsJoyce
 
Dr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graphDr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graphCarlos Castillo (ChaTo)
 
Ranking systems
Ranking systemsRanking systems
Ranking systemscristian L
 
Markov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdfMarkov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdfrayyverma
 
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16MLconf
 

Similaire à Reputation Systems II (7)

Link Analysis
Link AnalysisLink Analysis
Link Analysis
 
Ranking systems
Ranking systemsRanking systems
Ranking systems
 
Ranking systems
Ranking systemsRanking systems
Ranking systems
 
Dr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graphDr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graph
 
Ranking systems
Ranking systemsRanking systems
Ranking systems
 
Markov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdfMarkov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdf
 
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
 

Dernier

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Dernier (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Reputation Systems II

  • 1. Reputation Systems II Sybil Attack, BlogRank, B2Rank, EigenRumor, MailRank, TrustRunk Yury Lifshits Caltech http://yury.name Caltech CMI Seminar March 4, 2008 1 / 22
  • 2. Outline 1 Sybil Attack 2 Ranking Blogs 3 Reputations For Fighting Spam 4 Conclusions 2 / 22
  • 4. Sybil Attack Graph of trust-weighted edges n honest nodes + adversary overall trust value on attack edges (honest-malicious) is limited 4 / 22
  • 5. Sybil Attack Graph of trust-weighted edges n honest nodes + adversary overall trust value on attack edges (honest-malicious) is limited Question: whether splitting adversarial node into many is beneficial for acquiring higher reputation (rank)? 4 / 22
  • 6. Negative Result Assume reputation scores remain the same under isomorphism. Is it sybilproof? 5 / 22
  • 7. Negative Result Assume reputation scores remain the same under isomorphism. Is it sybilproof? Unfortunately, no. Attack strategy? 5 / 22
  • 8. Negative Result Assume reputation scores remain the same under isomorphism. Is it sybilproof? Unfortunately, no. Attack strategy? Answer: double the graph. 5 / 22
  • 9. Positive Results (1/3) General form of trust flow reputations: r(x) = max trust(p) Ptx p∈Ptx Notation: t is pre-trusted node Pxy is a family of disjoint paths from t to x 6 / 22
  • 10. Positive Results (2/3) Assumptions: 1 Extending path nonincreases the trust(p) 2 and trust are monotone to number of paths and edges values, respectively 3 Splitting a path into two does not increase value 7 / 22
  • 11. Positive Results (2/3) Assumptions: 1 Extending path nonincreases the trust(p) 2 and trust are monotone to number of paths and edges values, respectively 3 Splitting a path into two does not increase value 4 = max 7 / 22
  • 12. Positive Results (3/3) Under assumptions (1-3) sybil attack does not increase adversary’s reputation 8 / 22
  • 13. Positive Results (3/3) Under assumptions (1-3) sybil attack does not increase adversary’s reputation Under assumptions (1-4) sybil attack does not increase adversary’s rank 8 / 22
  • 14. Positive Results (3/3) Under assumptions (1-3) sybil attack does not increase adversary’s reputation Under assumptions (1-4) sybil attack does not increase adversary’s rank Proof? 8 / 22
  • 15. SybilGuard (1/2) Assume number of attack edges is A = o( n/ log n) System is distributed, honest nodes follow the same protocol Can an honest node t identify (w.h.p.) 2A + 1 nodes in such a way that at most A of them are powered by adversary? 9 / 22
  • 16. SybilGuard (2/2) For every node fix a bijective mapping from in-edges to out-edges Take a walk from t of length at most n log n using bijection routing At some point make a random switch, than continue another n log n steps using backwalk routing Report a point. Repeat, until 2A + 1 points are collected 10 / 22
  • 17. SybilGuard (2/2) For every node fix a bijective mapping from in-edges to out-edges Take a walk from t of length at most n log n using bijection routing At some point make a random switch, than continue another n log n steps using backwalk routing Report a point. Repeat, until 2A + 1 points are collected Claim w.h.p. at most A reported nodes are malicious 10 / 22
  • 18. 2 Ranking Blogs 11 / 22
  • 19. Ranking Blogs: Factors Entities: blogs, posts, communities, comments, brand names, external websites Frineds, blogroll, subscriptions, hyperlinks, visitors, clicks, votes Time Tags 12 / 22
  • 20. BlogRank Any ideas how to rank blogs? 13 / 22
  • 21. BlogRank Any ideas how to rank blogs? Why not just PageRank? 13 / 22
  • 22. BlogRank Any ideas how to rank blogs? Why not just PageRank? Wait a minute, for which graph? 13 / 22
  • 23. BlogRank Any ideas how to rank blogs? Why not just PageRank? Wait a minute, for which graph? Linked blogs: Hyperlinks, blogrolls Common commentors/authors, tags, co-references to news 13 / 22
  • 24. B2Rank B2Rank(x) = BlogReputation × PostQuality 14 / 22
  • 25. B2Rank B2Rank(x) = BlogReputation × PostQuality BlogReputation is computed in PageRank style for blogroll graph with one change: Blogroll links are weighted by activity level (frequency of blogging and commenting) 14 / 22
  • 26. B2Rank B2Rank(x) = BlogReputation × PostQuality BlogReputation is computed in PageRank style for blogroll graph with one change: Blogroll links are weighted by activity level (frequency of blogging and commenting) PostQuality is average for PageRank-style score of blog posts Post-to-post links are weighted by referring post activity and time difference 14 / 22
  • 27. EigenRumor (1/2) Picture from “The EigenRumor Algorithm for Ranking Blogs” paper 15 / 22
  • 28. EigenRumor (2/2) Notation: ¯: reputation score for posts r ¯ ¯ a, h: authority and hub scores for bloggers P, E: provision and evaluation matrices 16 / 22
  • 29. EigenRumor (2/2) Notation: ¯: reputation score for posts r ¯ ¯ a, h: authority and hub scores for bloggers P, E: provision and evaluation matrices ¯ ¯ = αPT a + (1 − α)ET h r ¯ ¯ a = P¯, h = E¯ ¯ r r 16 / 22
  • 30. EigenRumor (2/2) Notation: ¯: reputation score for posts r ¯ ¯ a, h: authority and hub scores for bloggers P, E: provision and evaluation matrices ¯ ¯ = αPT a + (1 − α)ET h r ¯ ¯ a = P¯, h = E¯ ¯ r r Solution: iterative algorithm for ¯: r T T ¯ = (αP P + (1 − α)E E)¯ r r 16 / 22
  • 32. Combining Two Scores Hyperlink graph 18 / 22
  • 33. Combining Two Scores Hyperlink graph Pre-trusted nodes 18 / 22
  • 34. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes 18 / 22
  • 35. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner 18 / 22
  • 36. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards 18 / 22
  • 37. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards Compute spam scores a-la PageRank 18 / 22
  • 38. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards Compute spam scores a-la PageRank Reweight hyperlink graph and pre-trusted nodes 18 / 22
  • 39. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards Compute spam scores a-la PageRank Reweight hyperlink graph and pre-trusted nodes Compute reputations a-la PageRank 18 / 22
  • 40. 4 Conclusions 19 / 22
  • 41. Challenges Measurable objectives? Model for input data? Dynamic aspects of reputations? Digg-style ranking? Price of attack? Ranking in social networks? Ranking in RDF data? Billion dollar question: how to avoid arms race? 20 / 22
  • 42. References K. Fujimura, T. Inoue, M. Sugisaki The EigenRumor Algorithm for Ranking Blogs A. Kritikopoulos, M. Sideri, I. Varlamis BlogRank: ranking weblogs based on connectivity and similarity features M.A. Tayebi, S.M. Hashemi, A. Mohades B2Rank: An Algorithm for Ranking Blogs Based on Behavioral Features A. Cheng, E. Friedman Sybilproof reputation mechanisms H. Yu, M. Kaminsky, P.B. Gibbons, A, Flaxman SybilGuard: defending against sybil attacks via social networks P.A. Chirita, J. Diederich, W. Nejdl MailRank: using ranking for spam detection Z. Gyongyi, H. Garcia-Molina, J. Pedersen Combating web spam with TrustRank M. Dalal Spam and popularity ratings for combating link spam 21 / 22