Dieudo Mulamba November 2017

Slides:



Advertisements
Similar presentations
Defending against large-scale crawls in online social networks Mainack Mondal Bimal Viswanath Allen Clement Peter Druschel Krishna Gummadi Alan Mislove.
Advertisements

Analysis and Modeling of Social Networks Foudalis Ilias.
SOCELLBOT: A New Botnet Design to Infect Smartphones via Online Social Networking th IEEE Canadian Conference on Electrical and Computer Engineering(CCECE)
An Analysis of Social Network-Based Sybil Defenses Sybil Defender
Xiaowei Ying, Xintao Wu, Daniel Barbara Spectrum based Fraud Detection in Social Networks 1.
Qiang Cao Duke University
Hongyu Gao, Tuo Huang, Jun Hu, Jingnan Wang.  Boyd et al. Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication,
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao Yinglian Xie *, Fang Yu *, Qifa Ke *, Yuan Yu *, Yan Chen and Eliot Gillum ‡ EECS Department,
Spam Detection Jingrui He 10/08/2007. Spam Types  Spam Unsolicited commercial  Blog Spam Unwanted comments in blogs  Splogs Fake blogs.
Structure based Data De-anonymization of Social Networks and Mobility Traces Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
Towards Online Spam Filtering in Social Networks Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary Lab for Internet and Security Technology.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
Automatic Gender Identification using Cell Phone Calling Behavior Presented by David.
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
University of California at Santa Barbara Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Zhao.
OSN Research As If Sociology Mattered Krishna P. Gummadi Networked Systems Research Group MPI-SWS.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Anomalous Node Detection in Time Series of Mobile Communication Graphs Leman Akoglu January 28, 2010.
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
To Blog or Not to Blog: Characterizing and Predicting Retention in Community Blogs Imrul Kayes 1, Xiang Zuo 1, Da Wang 2, Jacob Chakareski 3 1 University.
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
A Graph-based Friend Recommendation System Using Genetic Algorithm
The Database and Info. Systems Lab. University of Illinois at Urbana-Champaign User Profiling in Ego-network: Co-profiling Attributes and Relationships.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Computer Science Department, Peking University
Exploit of Online Social Networks with Community-Based Graph Semi-Supervised Learning Mingzhen Mo and Irwin King Department of Computer Science and Engineering.
Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.
1 Privacy-Enhanced Collaborative Filtering Privacy-Enhanced Personalization workshop July 25, 2005, Edinburgh, Scotland Shlomo Berkovsky 1, Yaniv Eytani.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Measuring Behavioral Trust in Social Networks
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Authors: Yazan Boshmaf, Lldar Muslukhov, Konstantin Beznosov, Matei Ripeanu University of British Columbia Annual Computer Security Applications Conference.
Mining information from social media
Learning Photographic Global Tonal Adjustment with a Database of Input / Output Image Pairs.
Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang Miriam Metzger, Haitao Zheng and Ben Y. Zhao Computer.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
Algorithms and Computational Biology Lab, Department of Computer Science and & Information Engineering, National Taiwan University, Taiwan Network Biology.
Exploiting Input Features for Controlling Tunable Approximate Programs Sherry Zhou Department of electronic engineering Tsinghua University.
Learning to Detect and Classify Malicious Executables in the Wild by J
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Uncovering Social Spammers: Social Honeypots + Machine Learning
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Trustworthiness Management in the Social Internet of Things
Location Cloaking for Location Safety Protection of Ad Hoc Networks
A Network Science Approach to Fake News Detection on Social Media
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
Source: Procedia Computer Science(2015)70:
Cheng-Ming Huang, Wen-Hung Liao Department of Computer Science
Facebook Immune System
A survey of network anomaly detection techniques
Department of Computer Science University of York
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
GANG: Detecting Fraudulent Users in OSNs
Social Network-Based Sybil Defenses
Resource Allocation for Distributed Streaming Applications
Mingzhen Mo and Irwin King
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Presentation transcript:

Dieudo Mulamba November 2017 Efficient Sybil Classification in Online Social Networks using Structural Features Dieudo Mulamba November 2017 Department of Computer Science

introduction Online Social Network Preferred way to connect peoples Open platform: Anyone can join Some users can be fake or malicious - Sybils

Fake accounts are for sale on the underground market introduction Fake Accounts Fake accounts are for sale on the underground market

Why are fake accounts harmful ? introduction Fake Accounts Why are fake accounts harmful ? Fake accounts can be used to : Send spam Do phishing Access personal user info Launch a propaganda campaign.

introduction Detecting Fake Accounts We want to be able to detect Detecting fake accounts is difficult: These accounts may resemble real users We want to be able to detect these automatically

There are several approaches introduction Existing approaches There are several approaches to detect sybils: Origin of data : User profile User activities Social graph structure

There are several approaches introduction Existing approaches There are several approaches to detect sybils: Content-based approaches Behavior-based approaches Graph-Structure based approaches

introduction Existing approaches Content-based approaches Collect node’s attributes (genre, age, mobility, power, …) Use machine-learning to classify nodes Behavior-based approaches Collect node interaction data (flow, level of activity, …) Use machine-learning to classify nodes

introduction Existing approaches Graph-Structure based approaches Leverage the relationship between nodes

introduction Existing approaches Content-based approaches Problems : High false positive and negative rates Not too difficult to evade (mimicking real nodes, deception) Most famous: Facebook Immune System (only 20% detection rate) [Boshmaf et al.]

introduction Existing approaches Content-based approaches The fix : Add interaction data (Behavior-based approaches) Add social graph data (Graph-Structure based approaches)

introduction Existing approaches Problems : Goal : Users do not always provide all the info requested in the profile. Collecting activities data raises the concern about user privacy) Goal : We propose a classification method using only social graph info.

Proposed approach contributions First classification method using only info from the structure of the social graph New set of structural features : Weighted Degree-core centrality; Weighted Degree-c lustering centrality; Degree-intensity centrality; Degree-coherence centrality; Core-intensity centrality; Core-coherence centrality.

Proposed approach overview Convert the social network into a graph Features engineering Features selection Build the classification models. Evaluation

Proposed approach Attack model No assumption about attacker capabilities Attacker can create unlimited number of sybils Sybils are connected to each other Attacker can befriend an unlimited number of benign nodes. Attacker does not have control on the number of friend requests accepted.

Proposed approach Features engineering Existing features: Average nearest neighbor degree. Average degree. Core number. Clustering coefficient.

Proposed approach Features engineering Proposed features: Weighted Degree-degree centrality. Weighted Degree-Core centrality. Weighted Degree-clustering centrality. Weight :

Proposed approach Features engineering Proposed features: A subgraph intensity: A subgraph coherence:

Proposed approach Features engineering Proposed features: Degree-intensity centrality. Degree-coherence centrality. Core-intensity centrality. Core-coherence centrality.

Proposed approach Features selection Our feature selection model is the Recursive Feature Elimination (RFE): Selected features: core number, degree-degree centrality, core-degree centrality, degree-coherence centrality, core-coherence centrality, average degree

Proposed approach Features selection Feature correlation

Features distribution Proposed approach Features selection Features distribution

Features distribution Proposed approach Features selection Features distribution

Features distribution Proposed approach Features selection Features distribution

Proposed approach Experimental results Synthetic dataset Honest region has 5,800 nodes and 453,682 edges Sybil region has 2,200 nodes and 5,000 edges The graph has 10,000 attack edges.

Proposed approach Experimental results Twitter dataset Graph : Nodes : 469,504 Edges : 2,153,426 Honest : Nodes : 372,251 Sybils : Nodes : 97,253

Classification methods Proposed approach Experimental results Classification methods SVM, Random Forest, and Adaboost.

Classification on synthetic dataset Proposed approach Experimental results Classification on synthetic dataset

Classification on Twitter dataset Proposed approach Experimental results Classification on Twitter dataset

THANKS