Ecs289m Spring, 2008 Online Social Network (1) S. Felix Wu Computer Science Department University of California, Davis

Slides:



Advertisements
Similar presentations
1 Davis Social Links Social Network Kernel for Future Internet Design Norm Matloff, Michael Neff, S. Felix Wu, Computer Science Diane Felmlee Sociology.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
IP Forwarding Relates to Lab 3.
Internetworking II: MPLS, Security, and Traffic Engineering
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Davis Social Links FIND: Facebook-based INternet Design S. Felix Wu Computer Science Department University of California, Davis
The Structure of Networks with emphasis on information and social networks RU T-214-SINE Summer 2011 Ýmir Vigfússon.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Davis Social Links S. Felix Wu Computer Science Department University of California, Davis
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
UCDavis, ecs251 Spring /18/2007Davis Social Links1 Davis Social Links A Socially Structured P2P System S. Felix Wu University of California, Davis.
04/05/20011 ecs298k: Routing in General... lecture #2 Dr. S. Felix Wu Computer Science Department University of California, Davis
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Cyber Security Challenges a social informatics touch on old attacks S. Felix Wu University of California, Davis 16/5/2013IEEE Intelligence and Security.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Computer Networks Layering and Routing Dina Katabi
“Consistency is Key!” A Quick Guide to Online Marketing By Virtual Marketing Empire, LLC
1 Internet Protocol: Forwarding IP Datagrams Chapter 7.
Network Kernel Architectures and Implementation ( ) Naming and Addressing Chaiporn Jaikaeo Department of Computer Engineering.
1 CS 4396 Computer Networks Lab Dynamic Routing Protocols - II OSPF.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Internet Application. understanding Addresses Routing of Instant Messaging Collaborative Computing Grid Social networking Forums Societies.
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
10/8/2015CST Computer Networks1 IP Routing CST 415.
Data Structures & Algorithms and The Internet: A different way of thinking.
1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis
Lecture 4: BGP Presentations Lab information H/W update.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Online Social Networks and Media
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Routing and Routing Protocols
Thoughts on KeySec John Viega
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
UNIT 2 LESSON 4 CS PRINCIPLES. OBJECTIVES Students will be able to: Describe the redundancy of routing between two points on the Internet. Send messages.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Computer Networks 0110-IP Gergely Windisch
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Dynamic Routing Protocols II OSPF
CHAPTER 3 Architectures for Distributed Systems
Internet Networking recitation #12
Intra-Domain Routing Jacob Strauss September 14, 2006.
ECE 544 Protocol Design Project 2016
IP Forwarding Relates to Lab 3.
Dynamic Routing Protocols II OSPF
Routers Routing algorithms
Dynamic Routing and OSPF
The Network Layer Network Layer Design Issues:
Computer Networks Protocols
Lecture 4a Mobile IP 1.
Presentation transcript:

ecs289m Spring, 2008 Online Social Network (1) S. Felix Wu Computer Science Department University of California, Davis

03/14/2008Davis Social Links2 Online Social Network What is a social network? What is an online social network? –Realize and represent the human social networks “explicitly” (from “somewhat vague, fuzzy and implicit”) –Promote “OSN Applications” –Utilizing the “online” perspective to further develop the human social network

03/14/2008Davis Social Links3 Is this a spam? FROM:MR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho Branch 171 Shaukiwan Road Hong Kong. Please contact me on my personal box Let me start by introducing myself, Felix. I am Mr. Cheung Pui, director of operations of the Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a obscured business suggestion for you. Before the U.S and Iraqi war our client Matt (Bishop) who was with the Iraqi forces and also business man made a numbered fixed deposit for 18 calendar months, with a value of Twenty Four millions Five Hundred Thousand United State Dollars only in my branch. Upon maturity several notice was sent to him,…

03/14/2008Davis Social Links4 This was considered a spam!

03/14/2008Davis Social Links5

03/14/2008Davis Social Links6

03/14/2008Davis Social Links7 About ecs289m This is a research-oriented course. Learning via guided survey, proposal, research study, and experiments “The process is more important than the result” -- Journaling

03/14/2008Davis Social Links8 The Requirement Your electronic “research journal” –Timestamp –What did you learn from the lectures and the readings? Any reflective comments/thoughts? –What problems are you considering and why? Who you have talked to further narrow or broader the scope? –What was/is your plan (and its evolution)? Why is this plan exciting and how to justify that? –What about the execution and result? –What have you learned?

03/14/2008Davis Social Links9 Grading Is the journal truthful? (I.e., is that really you who did this and that?) Is the journal significant, not superficial, and mature at the end? Was the recording of the journal reasonably frequent? (I.e., you made progress weekly and you need to submit and share your journal with others.) A final presentation & interactive grading

03/14/2008Davis Social Links10 Examples OSN core architecture and evaluation Novel OSN applications OSN data collection and analysis OSN network development Implementation, Theoretical Analysis, Real data analysis, Simulation

03/14/2008Davis Social Links11 About the Instructor S. Felix Wu x4-7070) Office: 3057 Kemper Hall Office Hours: –10:30-11:30 a.m. on Mon/Fri –by appointment Project meeting (10:30~11:30 Wed, TBA) –I like to have another hour for the class to get together for discussion –For remote students, we will do teleconference.

03/14/2008Davis Social Links12 Class communication You must have a Facebook account! I will set up a group for you to join. If you are not yet my FB friend, you must not be my friend until this quarter is over. –I will help you to setup DSL such that you can still communicate with me. –I will use “ ” as the backup. –Header: [ecs289m s2008]

03/14/2008Davis Social Links13 Reading Assignments DSL related papers Many other papers

03/14/2008Davis Social Links14 Readings (1) “Statistical mechanics of complex networks” by Albert and Barabasi, REVIEWS OF MODERN PHYSICS, Volumne 74, January “Complex networks and decentralized search algorithms” by Kleinberg, Proceedings of the International Congress of Mathematicians, Madrid, Spain, “Searching in a Small World” by Oskar Sandberg, Thesis. I will put the links under the course website: – You don’t have to read everything, but please journal the parts you read (and which parts!).

03/14/2008Davis Social Links15 Your inputs are welcome!! This is not a traditional academic graduate course.

03/14/2008Davis Social Links16 Davis Social Links Routable identity versus receiver control Trust & Reputation system in “L3” Applications: –FIND (Future Internet Design), OSN (Facebook/Orkut/SecondLife), MANET

03/14/2008Davis Social Links17 Communicate: [A, D] A B C D As long as “A” knows “D’s routable identity” …

03/14/2008Davis Social Links18 Urgent! Please contact me! FROM:MR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho Branch 171 Shaukiwan Road Hong Kong. Please contact me on my personal box Let me start by introducing myself. I am Mr. Cheung Pui, director of operations of the Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a obscured business suggestion for you. Before the U.S and Iraqi war our client Major Fadi Basem who was with the Iraqi forces and also business man made a numbered fixed deposit for 18 calendar months, with a value of Twenty Four millions Five Hundred Thousand United State Dollars only in my branch. Upon maturity several notice was sent to him,…

03/14/2008Davis Social Links19 Hijacked Routable Identify

03/14/2008Davis Social Links20 [A,D] + social context A B C D “A” has to explicitly declare if there is any social context under this communication activity with “D”!

03/14/2008Davis Social Links21 The same message content “M” from Cheung Pui “M” from Cheung Pui via IETF mailing list “M” from Cheung Pui via Karl Levitt

03/14/2008Davis Social Links22 Social Context “M” from Cheung Pui  Probably a spam “M” from Cheung Pui via IETF mailing list  Probably not interesting “M” from Cheung Pui via Karl Levitt  Better be more serious…

03/14/2008Davis Social Links23 Social Context “M” from Cheung Pui  Probably a spam “M” from Cheung Pui via IETF mailing list  Probably not interesting “M” from Cheung Pui via Karl Levitt  Better be more serious… Either “M” is important, or Karl’s machine has been subverted!

03/14/2008Davis Social Links24 [A,D] + social context A B C D “A” has to explicitly declare if there is any social context under this communication activity with “D”! But, “D” only cares if it is from “C” or not! ??

03/14/2008Davis Social Links25 Online Social Network What is a social network? What is an online social network? –Realize and represent the human social networks “explicitly” (from “somewhat vague, fuzzy and implicit”) –Promote “OSN Applications” –Utilizing the “online” perspective to further develop the human social network Representation, Application, Development

03/14/2008Davis Social Links26 Just initially, a couple issues … How to establish the social route? –How would “A” know about “D” (or “D’s identity”) ? How to maintain this “reputation network”? –MessageReaper: A Feed-back Trust Control System (Spear/Lang/Lu)

03/14/2008Davis Social Links27 Social network analytical models Network Mathematics (Sandberg’s talk) –Random graph model (low diameter) Newman/Watts/Strogatz, 2002 –Small world model (high cluster coefficient) Watts/Strogatz, 1998 –Scale-free network (node degree distribution) Barabasi/Albert, 1999 What is the right model for the network? –Please read “#1”.

03/14/2008Davis Social Links28 Search on “OSN” How to get to from ? The Small world model –6 degree separation (Milgram, 1967) –“existence of a short path” –How to find the short path? (Kleinberg, 2000)

03/14/2008Davis Social Links29 Routing in a Small World Common question: do short paths exist? Algorithmic question: assuming short paths exist. How do people find them?

03/14/2008Davis Social Links30 Kleinberg’s Model Kleinberg’s model: –People  points on a two dimensional grid. –“P” Grid edges (short range). –“Q” long range contacts chosen with the inverse r th -power distribution. –How to search? [S, T] Find the neighbor closest to T –Work well only when r=2, p=q=1

03/14/2008Davis Social Links31 Kleinberg’s Model Use only Local information, except the distance to the target. –However, what is the “global distance” in cyber space? –Yet, the assumption behind is that the “edges” depend on the “relative distance”.

03/14/2008Davis Social Links32 In Facebook… How will we tell whether the relative distance between X&Y is closer than X&Z? –X, Y, Z (assuming they are all direct friends to each other) One simple idea: “Keyword intersection” –KW(X), KW(Y), KW(Z) –1/(#[KW(a) KW(b)] + 1) –Will this work? How about global distance?

03/14/2008Davis Social Links33 Kleinberg’s model Inherently assume “routable identity” –You have to know the Target identity, and you also need to know the distance metric. –And, then the search algorithm will get to it probabilistically. –The sender/receiver interface is very simple. Please read the papers for details.

03/14/2008Davis Social Links34 [A,D] + social context A B C D “A” has to explicitly declare if there is any social context under this communication activity with “D”! But, “D” only cares if it is from “C” or not! ??

03/14/2008Davis Social Links35 Just initially, a couple issues … How to establish the social route? –How would “A” know about “D” (or “D’s identity”) ? How to maintain this “reputation network”? –MessageReaper: A Feed-back Trust Control System (Spear/Lang/Lu)

03/14/2008Davis Social Links36 Social Route Discovery for A2D A B C D Let’s assume A doesn’t have D’s “routable identity” Or, “D” doesn’t have a global unique identity! Then, how can we do A2D? ??

03/14/2008Davis Social Links37 Finding A B C D A2D, while D is McDonald’s! D would like “customers” to find the right route. “idea: keyword propagation” e.g., “McDonald’s” ??

03/14/2008Davis Social Links38 Announcing A B C D Hop-by-hop keyword propagation K: “McDonald’s”

03/14/2008Davis Social Links39 Announcing A B C D Hop-by-hop keyword propagation K: “McDonald’s”

03/14/2008Davis Social Links40 Announcing A B C D Hop-by-hop keyword propagation K: “McDonald’s”

03/14/2008Davis Social Links41 Discussion Hour Wednesday 10:00~10:55a.m Kemper For remote students –I will set up a remote teleconference # –Try this as well

03/14/2008Davis Social Links42 Now Finding A B C D Search Keyword: “McDonald’s” A might know D’s keyword via two channels (1) Somebody else (2) From its friends Questions: does D need an identity? Scalable? K: “McDonald’s” Q: McDonald’s

03/14/2008Davis Social Links43

03/14/2008Davis Social Links44 Phishing is default A B C D Search Keyword: “McDonald’s” Questions: is this the right Felix Wu’s? K: “McDonald’s” Q: McDonald’s Application Test

03/14/2008Davis Social Links45 Application Tests Example 1: credential-oriented –“PKI certificate” as the keyword –If you can sign or decrypt the message, you are the ONE! Example 2: service-oriented –Service/protocol/bandwidth support Example 3: offer-oriented –Please send me your coupons/promotions!

03/14/2008Davis Social Links46 “Identity” Application identity =M=> Network identity Network identity =R=> Network identity Network identity =M=> Application identity Keywords =R=> “Multiple Paths” Application identity selection Network route selection

03/14/2008Davis Social Links47 Finding Search Keyword: “McDonald’s” Questions: is this the right Felix Wu’s? What is the issue here?? A B C D K: “McDonald’s” Q: McDonald’s Application Test

03/14/2008Davis Social Links48 Scalability - Avoid the Flooding As it is, every keyword will need to be propagated to all the nodes/links (but the same keyword will be propagated through the same link once possibly with different policies). The issue: “who should receive my keywords?”

03/14/2008Davis Social Links49 Community-Keyword Model A Social Peer, P, has three keyword sets: –Attributes (ATTR) –Original Keywords (OK) –Propagating Keywords (PK)

03/14/2008Davis Social Links50 Community-Keyword Model Attributes (ATTR) –Keywords describing P (the social node) –Decided/configured by the owner of P Original Keywords (OK) –Keywords announced by P (the social node) –Decide/configured by the owner of P –Each keyword is associated with a propagation policy (decided by the owner of P) Propagating Keywords (PK) –From its own OK and other direct neighbors –Each keyword is associated with a propagation policy

03/14/2008Davis Social Links51 Community-Keyword Model Attributes (ATTR) –Keywords describing P (the social node) –Decided/configured by the owner of P Original Keywords (OK) –Keywords announced by P (the social node) –Decide/configured by the owner of P –Each keyword is associated with a propagation policy (decided by the owner of P) Propagating Keywords (PK) –From its own OK and other direct neighbors –Each keyword is associated with a propagation policy

03/14/2008Davis Social Links52 Community-Keyword Model Attributes (ATTR) –Keywords describing P (the social node) –Decided/configured by the owner of P Original Keywords (OK) –Keywords announced by P (the social node) –Decide/configured by the owner of P –Each keyword is associated with a propagation policy (decided by the owner of P) Propagating Keywords (PK) –From its own OK and other direct neighbors –Each keyword is associated with a propagation policy

03/14/2008Davis Social Links53 in Community of Davis A B C D Who should receive the keyword announcement for “McDonald’s”? ??

03/14/2008Davis Social Links54 as the Social Peer Attributes: –{McDonald’s Express, 640 W Covell Blvd, # D, Davis, (530) , Davis Senior High School, Community Park, North Davis}

03/14/2008Davis Social Links55 as the Social Peer Attributes: –{McDonald’s Express, 640 W Covell Blvd, # D, Davis, (530) , Davis Senior High School, Community Park, North Davis} Original Keywords: –{McDonald, Davis, California, DHS, North Davis, Happy Meal, 50% off Tuesday, Lobster} Propagating Keywords: –{McDonald, Davis, California, DHS, North Davis, Happy Meal, 50% off Tuesday, Lobster, Anderson Plaza, Save-Mart, Taqueria Guadalajara}

03/14/2008Davis Social Links56 “Per-Keyword Policy” For each keyword, we will associate it with a propagation policy: [T, N, A] –T: Trust Value Threshold –N: Hop counts left to propagate (-1 each step) –A: Community Attributes Examples: –[>0.66, 4, “Davis”] K via L 1 –[>=0,, ] K via L 2

03/14/2008Davis Social Links57 in Community of Davis A B C D Who should receive the keyword announcement for “McDonald’s”? ??

03/14/2008Davis Social Links58 Scalability & Controllability McDonald’s doesn’t want to flood the whole network –It only wants to multicast to the “Target set” of customers And, it only wants this target set of users being able to use that particular keyword to contact. –Receiver/owner controllability

03/14/2008Davis Social Links59 Autonomous Community Each social entity configures a set of “attributes” for itself. Some or all of the attributes will be exchange with certain neighbors.

03/14/2008Davis Social Links60 Social/Community Attributes A B C D Who should receive the keyword announcement for “McDonald’s”? Answer: ??

03/14/2008Davis Social Links61 Relevant Attribute/OK/PK ATTR = Davis OK = McDonald’s PK = McDonald’s The owner uses the “policy” to control the flooding: –K = McDonald’s –[T > 0.66, N = 6, ATTR = “Davis”]

03/14/2008Davis Social Links62 Keyword Propagation # of hops left (I.e., TTL) Minimum MessageReaper Trust values Social/Community Attributes –Facebook profile keywords –SecondLife Avatar’s Body language –Could be something else as well

03/14/2008Davis Social Links63 IP versus DSL IP address prefixes announced by BGP to ALL the Autonomous Systems in the whole Internet –Every IP node can send packets to McDonald’s at Davis (if we have a unique IP address) DSL will only announce “McDonald’s” (under the control of McDonald’s express) within the Davis social community –Only the receivers of the announcement can use the keyword to contact McDonald’s express!

03/14/2008Davis Social Links64 Community-Keyword Model A Social Peer, P, has three keyword sets: –Attributes (ATTR) –Original Keywords (OK) –Propagating Keywords (PK) Flooding Avoidance + Receiver/Owner Control

03/14/2008Davis Social Links65 [T >= 0, N =, ATTR = ] K What is the consequence? –Spam –Denial of Service How to deal with it?

03/14/2008Davis Social Links66 [T >= 0, N =, ATTR = ] K Limited Resources on PK –“P” can only remember up to M keywords in its own PK Ordering Preference between K i and K j –T(K i ) > T(K j ) –N(K i ) < N(K j ) –ATTR(K i ) ATTR(K j ) Incentive Model –P is willing to pay a price

03/14/2008Davis Social Links67 Potential Problems Mostly only local contacts –Local interests dominate –Possible resource allocation for different ATTRs within the same community

03/14/2008Davis Social Links68 Community A connected graph of social nodes sharing a set of community attributes

03/14/2008Davis Social Links69 Community A B C D ??

03/14/2008Davis Social Links70 Multiple Social Links BGP, Davis, California, Intrusion Detection,… Soccer, Wine, Bike, Davis, California,…

03/14/2008Davis Social Links71 Community Control: C D Who should receive the keyword announcement for Answer: Who should receive the keyword announcement fot “South Lake Tahoe Tournament”? Answer: E

03/14/2008Davis Social Links72 Community A connected graph of social nodes sharing a set of community attributes

03/14/2008Davis Social Links73 Community A B C D ??

03/14/2008Davis Social Links74 Social/Community Attributes A B C D Who should receive the keyword announcement for “McDonald’s”? Answer: but not ALL ??

03/14/2008Davis Social Links75 Community A connected graph of social nodes sharing a set of community attributes The community members can decide the administrative policy within the community –Membership maintenance –Attribute setting –Keyword propagation policy (e.g., allocation) –Application-dependent policy –Incentive model

03/14/2008Davis Social Links76 Potential Problems Mostly only local contacts –Local interests dominate –Possible resource allocation for different ATTRs within the same community “Reachability” –How likely will my keywords be able to go through to the community I want? –I must be a direct friend of the community –How can we set up “remote long range contact”?

03/14/2008Davis Social Links77 Community Development How will each one of us set up our Attributes and Original Keywords plus policy such that together we can communicate with each other “optimally”? –A game theoretical setting problem for network formation

03/14/2008Davis Social Links78 Community A B C D ??

03/14/2008Davis Social Links79 Network Formation A B C D ??

03/14/2008Davis Social Links80 Network Formation A B C D ?? What is B’s incentive in adding the new ATTR keyword?

03/14/2008Davis Social Links81 Network Formation A B C D ?? If B adds, then A will add !

03/14/2008Davis Social Links82 Network Formation A B C D ?? Both A & C: why would A & C be willing to establish a direct friendship?

03/14/2008Davis Social Links83 Open Issues What is the “value” of this social network? How would this “value” be distributed and allocated to each individual peers?

03/14/2008Davis Social Links84 What is the “value” difference? A B C D A B C D

03/14/2008Davis Social Links85 “ C can join !“ A B C D A B C D

03/14/2008Davis Social Links86 “ A alone can help C to join more communities!“ A B C D A B C D

03/14/2008Davis Social Links87 Value Allocation for B ? A B C D A B C D

03/14/2008Davis Social Links88 Open Issues What is the “value” of this social network? How would this “value” be distributed and allocated to each individual peers? DSL, Facebook, LinkedIn didn’t define the “game” for network formation and value allocation. –But, it is important to design the game such that the OSN will eventually converge to a state to best support the communities.

03/14/2008Davis Social Links89 Let’s come back to SPAM! How will the proposed DSL model handle spam?

03/14/2008Davis Social Links90 + A B C D Who should receive the keyword announcement for Answer: ?? K: + Policy

03/14/2008Davis Social Links91 Even if “A” claims A B C D Who should receive the keyword announcement for Answer: ?? K:

03/14/2008Davis Social Links92 “ B ” can help… A B C D What is B’s incentive? What is B’s risk? ?? K:

03/14/2008Davis Social Links93 Message Value & Prioritization Application IDS Link Ranks Reputation Incentives Other Trust Metrics [good, bad] messages

03/14/2008Davis Social Links94 MessageReaper vs. Spams

03/14/2008Davis Social Links95 MessageReaper vs. Freeloaders

03/14/2008Davis Social Links96 MessageReaper A Feedback Control Trust/Reputation system –P2P and decentralized Collusive Attacks –Still needs more works –But, under our social network, it might not be easy for the attackers to obtain the right social spots to attack us. (can we formally argue that?)

03/14/2008Davis Social Links97 Collusive Attacks A B C D

03/14/2008Davis Social Links98 Robustness as OSN “Value” A B C D A B C D

03/14/2008Davis Social Links99 Community-Oriented Networking DSL offers a way to dynamically identify and establish social communities –But, we still have a lot of open issues Facebook: –Networks: address dependent –Groups: you have to use your existing social network to invite.

Davis Social Links over Facebook

03/14/2008Davis Social Links101 Smart Proxy Overlay Social Graph User-defined keywords and attributes DSL server Trust Routing Protocol DSL Facebook

03/14/2008Davis Social Links102 Sub-communities Social Graph User-defined keywords and attributes DSL server Trust Routing Protocol DSL Facebook

03/14/2008Davis Social Links103 Social Network Development Social Graph User-defined keywords and attributes DSL server Trust Routing Protocol DSL Facebook

03/14/2008Davis Social Links104 Component Interactions Profiles Social Graph, Keywords Attributes Keywords & Policies DSL Facebook

03/14/2008Davis Social Links105 Route Discovery & Messaging Keywords, Message MessageReaper Sender Identify destination nodes Determine Optimal paths Remove paths that violate keyword policies If there is a path, store message for recipient Previous Interaction Outcomes, Shortest Paths Recipient Basic Algorithm DSL Keywords, Message Optimal routes

03/14/2008Davis Social Links106 Antispam /IM UCD Network Keyword Policy: All UCD Members get keyword

03/14/2008Davis Social Links107

03/14/2008Davis Social Links108

03/14/2008Davis Social Links109

03/14/2008Davis Social Links110

03/14/2008Davis Social Links111 Projects Applying the concept of “Smart Proxy” Can you build another OSN application (Facebook or Orkut) to enhance the communication features?

03/14/2008Davis Social Links112

03/14/2008Davis Social Links113 “Bypassing” Facebook When you send a message… –Via Facebook –Via DSL Activity and Intensity hiding via Decentralization! DSL Facebook

03/14/2008Davis Social Links114 Projects Applying the concept of “Smart Proxy” Can you build another OSN application (Facebook or Orkut) to enhance the communication features? Social Network’s business model –Should Facebook/Orkut/MySpace worry about “Smart Proxy”? Can they do something about it?

03/14/2008Davis Social Links115 ADSL (Avatar-based DSL) A B C D ?? K: + Policy

03/14/2008Davis Social Links116 ADSL (Avatar-based DSL) A B C D K: + Policy

03/14/2008Davis Social Links117 SecondLife’s problems It’s a virtual society but the trust model is unclear. –It is much easier to hide and fake (and, BTW, that is not necessarily always a bad thing). What would be the impact to our first-life society?

03/14/2008Davis Social Links118 Project Ideas for ADSL Security and Trust in SecondLife –Trust-value control View Plane –Body language analysis Communication Infrastructure within SecondLife! Virtual Social Reality -- how far should we go?

03/14/2008Davis Social Links119 SecondLife No communication infrastructure No/minimum pre-exist social trust –How do we recover such information? (And, should we?)

03/14/2008Davis Social Links120 DSL vs. Google

03/14/2008Davis Social Links121 “Google” It’s about the “content” –Data-centric networking. Input to the Engine –A set of key words characterizing the target document. Output –A set of documents/links matching the keywords

03/14/2008Davis Social Links122 “DSL” It’s also about the “content” –Application will decide the mechanism to further the communication. Input to the Decentralized Engine –A set of key words characterizing the target document (plus the aggregation keywords). Output –A set of DSL entities with the DSP (Davis Social Path pointer) matching the keywords

03/14/2008Davis Social Links123 DSL Search Engine DSL Social World Receiver or Content Sender or Reader We are not just connecting the IP addresses! We are connecting all the contents that can be interpreted!

03/14/2008Davis Social Links124 Google vs. DSL Google is essentially a “routing” framework between the contents and their potential consumers. Google decides how to extract the “key words” from your (the owner) web page or document.

03/14/2008Davis Social Links125 Google vs. DSL Google is essentially a “routing” framework between the contents and their potential consumers. Google decides how to extract the “key words” from your (the owner) web page or document. A DSL “owner/receiver to be” has the complete control over that. A balance between: –How I would like others to know about me? And, I might want different folks to know me in different ways! –How I can differentiate myself from other Felix Wu?

03/14/2008Davis Social Links126 DSL is an old idea! We, as human, have been using similar communication principles. Maybe it is a good opportunity to re-think about our cyber communication system. Identity is a per-application, context- oriented, and sometime relative issue. Forming cyber communities of interests for application. AB AB F F F

03/14/2008Davis Social Links127 DSL is still an old idea! Many applications already have “social network like” structure to enable P2P sharing across Internet. e.g., media sharing, on-line game, restaurant recommendation,… Should we push these into a generic Social Network layer-3 to support all the applications? AB AB F F F

03/14/2008Davis Social Links128 A Different Internet?! Current Internet: every IP address will be able to communicate with every other IP address! –Allow by Default DSL-based “Internet”: we have a large number of “pairs” (two entities and their corresponding direct social link) –Deny by Default

03/14/2008Davis Social Links129 Comparison IP/ –Convergence to an absolute consistent state –IP/ addresses are all you need, but the controllability is biased toward the sender DSL: –Convergence to a relative consistent state –No global network identity. Every DSL entity defines its own relative identity based on origin keywords. –Controllability is more balanced with other application challenges.

03/14/2008Davis Social Links130 Spam on DSL Still needs much more evaluation on how the spammer can exploit the DSL framework. But, maybe some spammers will no longer spam economically! –Social network will give the merchants much better channels to send their advertisements! –Using spam to deliver product information over DSL might seriously hurt the sales on the social channels. –Still there will still be some global spam activities.

03/14/2008Davis Social Links131 Social/Community Attributes Limit the spread of keywords Establish the “social trust boundary” –Community-oriented Networking –Identity became “community-oriented” Receiver controllability Incentive model for attribute selections

03/14/2008Davis Social Links132 Autonomous Community Communities as the unit for administration, policy, aggregation, AC key words, incentive, trust and reputation. initialization, split, join, termination Inter-AC activities

03/14/2008Davis Social Links133 Autonomous Community Initiator –Pick the community key words –Discover/maintain community members DSL route discovery Open versus close community Membership social recommendation Reputation and trust Intra-Community DSL –Overlay: DSL over DSL Inter-Community DSL

03/14/2008Davis Social Links134 AC Key Word Propagation Key words: which communities to announce? Initially, every DSL peer is, by itself, a community. –How would two peers merge into one single community?

03/14/2008Davis Social Links135 Internet Basic datagram service between one IP address and another Routing: exchanging the information regarding the address space and how to reach them. “Allow by Default” Applications built on top of the services –MySpace/Facebook/Orkut, SecondLife, LiveJournal, LinkedIn, Wikipedia, Skype, Google, Bittorrent, LimeWire, Youtube, IM,…

03/14/2008Davis Social Links136 IP IP address is all we need to communicate and everything else is on top of IP. IP is global “routable” identity However, too simple to be perfect?! –Can we remove the need for global routable identities?

03/14/2008Davis Social Links137 Easy to Send & Receive Easy for both the good users and the spammers. (fair simplicity) The spammers abuse the “sending” right, while the good users have very limited options to counter back. –how easy can we change our address? –how often do we need to do that? A “receiver” or “the owner of the identity” should have some control. –But, that means also “burden” to the users.

03/14/2008Davis Social Links138 Easy to Send & Receive Easy for both the good users and the spammers. (fair simplicity) The spammers abuse the “sending” right, while the good users have very limited options to counter back. –how easy can we change our address? –how often do we need to do that? A “receiver” or “the owner of the identity” should have some control. –But, that means also “burden” to the users.

03/14/2008Davis Social Links139 What is the right trade-off? Ease of use User Control Still an open issue

03/14/2008Davis Social Links140 Identifier & Keyword Under DSL, each peer has its own decision or policy regarding what “social keywords” to announce, and it can change the announcement itself any time. NO global unique network-wide identifier –No unique IP address or address in the “network” layer –Identity only in the application layer Relative Peering relationship only –Local “link” identity

03/14/2008Davis Social Links141 Privacy and Accountability No single intermediate node will have the knowledge, at least in the network layer, about “who is talking to who on what”. –In DSL, no global identifier. However, the messages themselves contain sufficient information to trace back toward the “social path”, if necessary and nodes are collaborative. –BTW, this (tracing on a per packet/ basis) is impossible for today’s Internet, even for “route path”.

03/14/2008Davis Social Links142 A “Relative” Identity under DSL “Key words” plus one DSL path –Why will this be sufficient for communication? –Especially, when even the DSL information itself is decentralized? (I.e., in general, no one single DSL router knows the complete DSL path.)

03/14/2008Davis Social Links143 Davis Social Links Peer-to-Peer System (P2P) –How human socially communicate? Online Social Network (OSN) –How to utilize OSN to enhance communication? –How to have a securer OSN? Autonomous Community (AC) –How to build/develop more effective community-based social networks?

03/14/2008Davis Social Links144 ecs289m: Looking ahead… Social network models and analysis Social network development and impact Social network architectures, systems, applications

03/14/2008Davis Social Links145