Spectrum Based RLA Detection Spectral property : the eigenvector entries for the attacking nodes,, has the normal distribution with mean and variance bounded.

Slides:



Advertisements
Similar presentations
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Advertisements

New Models for Graph Pattern Matching Shuai Ma ( 马 帅 )
Leting Wu Xiaowei Ying, Xintao Wu Aidong Lu and Zhi-Hua Zhou PAKDD 2011 Spectral Analysis of k-balanced Signed Graphs 1.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
A Distributed Algorithm for the Dead End Problem of Location Based Routing in Sensor Networks Le Zou, Mi Lu, Zixiang Xiong, Department of Electrical Engineering,
Introduction to Network Theory: Modern Concepts, Algorithms
SOCELLBOT: A New Botnet Design to Infect Smartphones via Online Social Networking th IEEE Canadian Conference on Electrical and Computer Engineering(CCECE)
Modularity and community structure in networks
Xiaowei Ying, Xintao Wu, Daniel Barbara Spectrum based Fraud Detection in Social Networks 1.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
1 Modularity and Community Structure in Networks* Final project *Based on a paper by M.E.J Newman in PNAS 2006.
Xiaowei Ying Xintao Wu Univ. of North Carolina at Charlotte 2009 SIAM Conference on Data Mining, May 1, Sparks, Nevada Graph Generation with Prescribed.
Leting Wu Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte Reconstruction from Randomized Graph via Low Rank Approximation.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Overlay Networks + Internet routing has exhibited scalability - Internet routing is inefficient -Difficult to add intelligence to Internet Solution: Overlay.
Semantic text features from small world graphs Jure Leskovec, IJS + CMU John Shawe-Taylor, Southampton.
FACE RECOGNITION, EXPERIMENTS WITH RANDOM PROJECTION
Ramanujan Graphs of Every Degree Adam Marcus (Crisply, Yale) Daniel Spielman (Yale) Nikhil Srivastava (MSR India)
Sampling a web subgraph Paraskevas V. Lekeas Proceedings of the 5 th Algorithms, Scientific Computing, Modeling and Simulation (ASCOMS), Web conference,
COVERTNESS CENTRALITY IN NETWORKS Michael Ovelgönne UMIACS University of Maryland 1 Chanhyun Kang, Anshul Sawant Computer Science Dept.
University of California at Santa Barbara Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Zhao.
Lecture 19 Representation and description II
Spectral coordinate of node u is its location in the k -dimensional spectral space: Spectral coordinates: The i ’th component of the spectral coordinate.
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
Efficient Gathering of Correlated Data in Sensor Networks
Efficient Identification of Overlapping Communities Jeffrey Baumes Mark Goldberg Malik Magdon-Ismail Rensselaer Polytechnic Institute, Troy, NY.
Automated Social Hierarchy Detection through Network Analysis (SNAKDD07) Ryan Rowe, Germ´an Creamer, Shlomo Hershkop, Salvatore J Stolfo 1 Advisor:
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
A Graph-based Friend Recommendation System Using Genetic Algorithm
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Optimal Link Bombs are Uncoordinated Sibel Adali Tina Liu Malik Magdon-Ismail Rensselaer Polytechnic Institute.
Xiaowei Ying, Xintao Wu Univ. of North Carolina at Charlotte PAKDD-09 April 28, Bangkok, Thailand On Link Privacy in Randomizing Social Networks.
Anomaly Detection in Data Mining. Hybrid Approach between Filtering- and-refinement and DBSCAN Eng. Ştefan-Iulian Handra Prof. Dr. Eng. Horia Cioc ârlie.
Xiaowei Ying, Leting Wu, Xintao Wu University of North Carolina at Charlotte Privacy and Spectral Analysis on Social Network Randomization.
Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte 2008 SIAM Conference on Data Mining, April 25 th Atlanta, Georgia.
Andreas Papadopoulos - [DEXA 2015] Clustering Attributed Multi-graphs with Information Ranking 26th International.
Random Graph Generator University of CS 8910 – Final Research Project Presentation Professor: Dr. Zhu Presented: December 8, 2010 By: Hanh Tran.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Xintao Wu Jan 18, 2013 Retweeting Behavior and Spectral Graph Analysis in Social Media.
Most of contents are provided by the website Graph Essentials TJTSD66: Advanced Topics in Social Media.
J. Hwang, T. He, Y. Kim Presented by Shan Gao. Introduction  Target the scenarios where attackers announce phantom nodes.  Phantom node  Fake their.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
- Murtuza Shareef Authoritative Sources in a Hyperlinked Environment More specifically “Link Analysis” using HITS Algorithm.
Properties of Growing Networks Geoff Rodgers School of Information Systems, Computing and Mathematics.
CS 590 Term Project Epidemic model on Facebook
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Community structure in graphs Santo Fortunato. More links “inside” than “outside” Graphs are “sparse” “Communities”
Steffen Staab 1WeST Web Science & Technologies University of Koblenz ▪ Landau, Germany Network Theory and Dynamic Systems Link Prediction.
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
COMMUNICATING VIA FIREFLIES: GEOGRAPHIC ROUTING ON DUTY-CYCLED SENSORS S. NATH, P. B. GIBBONS IPSN 2007.
Reliable Mobicast via Face- Aware Routing Qingfeng Huang,Chenyang Lu and Gruia-Catalin Roman Department of Computer Science and Engineering Washington.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Dynamic Network Analysis Case study of PageRank-based Rewiring Narjès Bellamine-BenSaoud Galen Wilkerson 2 nd Second Annual French Complex Systems Summer.
Properties and applications of spectra for networks 章 忠 志 复旦大学计算机科学技术学院 Homepage:
Xiaowei Ying, Kai Pan, Xintao Wu, Ling Guo Univ. of North Carolina at Charlotte SNA-KDD June 28, 2009, Paris, France Comparisons of Randomization and K-degree.
Graph clustering to detect network modules
Random Walk for Similarity Testing in Complex Networks
Cohesive Subgraph Computation over Large Graphs
Shan Lu, Jieqi Kang, Weibo Gong, Don Towsley UMASS Amherst
by Hyunwoo Park and Kichun Lee Knowledge-Based Systems 60 (2014) 58–72
Link-Based Ranking Seminar Social Media Mining University UC3M
Dieudo Mulamba November 2017
Graph-Based Anomaly Detection
3.3 Network-Centric Community Detection
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Properties and applications of spectra for networks
Shan Lu, Jieqi Kang, Weibo Gong, Don Towsley UMASS Amherst
Dominating Set By Eric Wengert.
Planting trees in random graphs (and finding them back)
Presentation transcript:

Spectrum Based RLA Detection Spectral property : the eigenvector entries for the attacking nodes,, has the normal distribution with mean and variance bounded by: Collaborative Attack & Graph Spectrum Collaborative attacks in matrix form: A n : the adjacency matrix of legitimate nodes; B: b_ij=1 if node i is attacked by attacker j; C: the adjacency matrix of the inner-structure of the attackers. The eigenvalues and eigenvectors are given by: Original:, eigenvalue:, eigenvector: After attacks:, eigenvalue:, eigenvector: Spectral coordinate of node u is its location in the k-dimensional spectral space: Approximation of eigenvector entries for the attacking and regular nodes: Spectrum Based Fraud Detection in Social Networks Xiaowei Ying, Xintao Wu, Daniel Barbará* University of North Carolina at Charlotte, * George Mason University 17th ACM Conference on Computer and Communications Security, Oct. 2010, Chicago, IL. Evaluation Data Set and Setting. Web Spam Challenge 2007 data, million pages in 114,529 hosts in the.UK domain. There are 1,836,228 links among hosts. We add 8 simulating attacking groups in the network. The 8 groups either form an ER graph or a power law degree distribution among themselves. Acknowledgments This work was supported in part by U.S. National Science Foundation IIS and CNS first order second order Introduction Social networks are vulnerable to various attacks such as spam s, viral marketing, etc. It is difficult to detect collaborative attacks based on the topology of a large social network. In our work, we project the topology of the network to the spectral space. Our theoretical study shows that the spectral coordinates of the collaborative attackers are mainly determined by that of the victims, and the inner structure among the attackers has negligible impact. In particular, we focus on Random Link Attacks (RLAs). We present an effective algorithm to detect RLAs using the set of suspects filtered by their spectral characteristics. Experimental results show that our spectrum based detection technique is very effective in detecting those attackers and outperforms topology based techniques. Random Link Attack (RLA) Attackers create some fake nodes and randomly connect to regular nodes; Fake nodes form some inner structure among themselves to evade detection. A Topology Based Approach [1] Mechanism randomly selected victims of RLAs have few links among them, while the neighbors of regular nodes form more triangles. Outline of algorithm 1.Testing step: mark a node as suspect if it satisfies either of the following two properties: a)Clustering Property: the node has few triangles round it; b)Neighborhood Independence Property: neighborhood of the node contains a large independent set. 2.Grouping step (Greedy): examine cliques in the neighborhood of each suspect, repeatedly include a new node or filter out a suspect, and check whether they form RLA groups. Drawbacks 1.Difficult to detect collaborative attacks; 2.May only detect part of the collaborative attacking groups; 3.High complexity. [1] N. Shrivastava, A. Majumder, R. Rastogi. Mining (Social) Network Graphs to Detect Random Link Attacks, ICDE08 Outline of Spectral RLA Detection Algorithm 1.Compute the leading eigenvalues, eigenvectors of the adjacency matrix, and the associated means and standard deviations; 2.Identify suspects in the spectral space; 3.Find dense subgraphs in the graph formed by suspects. These dense subgraphs are very likely formed by the collaborative RLA attackers.