Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.

Slides:



Advertisements
Similar presentations
Inferring Peer Centrality in Socially-Informed P2P Systems Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University.
Advertisements

Making P2P Networks Scalable a paper presentation by Derek Tingle.
LASTor: A Low-Latency AS-Aware Tor Client
Rarest First and Choke Algorithms are Enough Arnaud LEGOUT INRIA, Sophia Antipolis France G. Urvoy-Keller and P. Michiardi Institut Eurecom France.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
On the Economics of P2P Systems Speaker Coby Fernandess.
MMCN 19 Jan 2005 Ooi Wei Tsang Peer-to-Peer Streaming.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn,
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
The Power of Indirect Ties in Friend-to-Friend Storage Systems Xiang Zuo 1, Jeremy Blackburn 2, Nicolas Kourtellis 3, John Skvoretz 1 and Adriana Iamnitchi.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
1 A Framework for Lazy Replication in P2P VoD Bin Cheng 1, Lex Stein 2, Hai Jin 1, Zheng Zhang 2 1 Huazhong University of Science & Technology (HUST) 2.
 We developed a fast and tunable crawler, Cruiser.  Cruiser uses a master-slave architecture, parallel crawling, and leverages the two-tier topology.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Small Worlds and the Security of Ubiquitous Computing From : IEEE CNF Author : Harald Vogt Presented by Chen Shih Yu.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Searching in Unstructured Networks Joining Theory with P-P2P.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
Memoplex Browser: Searching and Browsing in Semantic Networks CPSC 533C - Project Update Yoel Lanir.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
The Influence of Indirect Ties on Social Network Dynamics Xiang Zuo 1, Jeremy Blackburn 2, Nicolas Kourtellis 3, John Skvoretz 1 and Adriana Iamnitchi.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Gnutella2: A Better Gnutella?
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Network Aware Resource Allocation in Distributed Clouds.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
The Social Hourglass: Enabling Socially-aware Applications and Services Adriana Iamnitchi University of South Florida
EmNet: Satisfying The Individual User Through Empathic Home Networks J. Scott Miller, John R. Lange & Peter A. Dinda Department of Electrical Engineering.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Enabling Socially-Aware Distributed Systems or Some Ongoing Research in the Distributed Systems Group Adriana Iamnitchi
Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn,
1 presentation of article: Small-World File-Sharing Communities Article: Adriana Iamnitchi, Matei Ripeanu, Ian Foster Presentation: Periklis Akritidis.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
A Peer-to-Peer Approach to Resource Discovery in Grid Environments (in HPDC’02, by U of Chicago) Gisik Kwon Nov. 18, 2002.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
1 An Efficient, Low-Cost Inconsistency Detection Framework for Data and Service Sharing in an Internet-Scale System Yijun Lu †, Hong Jiang †, and Dan Feng.
Network Community Behavior to Infer Human Activities.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
1 Query-Flood DoS Attacks in Gnutella by Andreas Legrum based upon a paper by Neil Daswani and Hector Garcia-Molina.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design Authors: Matei Ripeanu Ian Foster Adriana.
1 NETWORKING 2012 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 22, 2012 Reducing the History in Decentralized.
1 HOTP2P 2011 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 20, 2011 Betweenness Centrality Approximations.
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
CASCADE: AN ATTACK-RESISTANT DHT WITH MINIMAL HARD STATE
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Peer-to-peer networking
Dieudo Mulamba November 2017
Paraskevi Raftopoulou, Euripides G.M. Petrakis
Peer-to-Peer Information Systems Week 6: Performance
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
Resource Allocation for Distributed Streaming Applications
复杂网络可控性 研究进展 汪秉宏 2014 北京 网络科学论坛.
Ho-Ramamoorthy 2-Phase Deadlock Detection Algorithm
Presentation transcript:

Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida

2 Social and Socially-aware Applications Internet Applications Mobile Applications Applications may contain user profiles, social networks, history of social interactions, location, collocation

3 Problems with Current Social Information Management Application specific: –Need to input data for each new application –Cannot benefit from information aggregation across applications Typically, data are owned by applications: users don't have control over their data Hidden incentives to have many "friends": social information not accurate

4 Our Previous Work: Prometheus A peer-to-peer social data management service that : Receives data from social sensors that collect application-specific social information Represents social data as decentralized social graph stored on trusted peers Exposes API to share social information with applications according to user access control policies Prometheus: User-Controlled Peer-to-Peer Social Data Management for Socially-Aware Applications, N. Kourtellis et al, Middleware 2010

5 Prometheus: A P2P Social Data Management Service

6 Social and Peer Networks in Prometheus

7 Social and Peer Topology

8 Applicable to Other Systems Socially-informed search Contextually-aware information dissemination Socially-based augmentation of risk analysis in a money-lending peer-to-peer system (such as prosper.com) Unifying characteristics: Socially-informed routing of messages between nodes in the peer-to-peer network

9 Questions What is the vulnerability of such a network? What design decisions should be considered?

10 Outline Background Model Vulnerability to: –Malicious users –Malicious peers Experimental Evaluation –Setup –Results –Lessons Summary

11 Malicious Users Directed graph limits vulnerability Even if reciprocal edge created, label and weight requirement limit effects Lessons for writing social inference functions that use the social graph representation

12 Malicious Peers Several attack mechanisms that are difficult to prevent: –Modifying results sent back to other peers –Dropping/changing/creating fake requests We focus on the results sent back by a peer –Question: how much damage can a peer do in terms of the fraction of requests it can manipulate?

13 Experimental Setup Social networks: –Synthetic social graph –Real networks (results not presented in the paper) Worst case scenario: –Networks have reciprocal edges –No weight or edge label restriction –Requests flood neighborhood of radius K Mapping users on peers: –Social: map communities to peers –Random

14 Socially-informed P2P Topologies P2P topology formed by the 25 highest social bandwidth connections between peers Social mappingRandom mapping

15 Synthetic Social Network 1000 users, 100 peers Communities identified with Girvan-Newman algorithm Lessons: –Social mapping more resilient –Replication level irrelevant for vulnerability

16 Mappings Users to Peers in Real Social Networks Used a recursive version of the Louvain algorithm for fast community detection –Much more scalable than GN For the random mapping: –Keep community size same as social –Reshuffle the community members

17 Communities in Real Networks Social Network Number of Users Number of Communities with average size S (in users) S=10S=50S=100 gnutella0410,8761, gnutella3162,5616,2561, enron33,6963, epinions75,8777,5641, slashdot82,1688,2071,607794

18 Lesson 1: Network Size Matters Malicious nodes influence a larger percentage of the network in smaller networks

19 Lesson 2: Social Network Topology Matters Size is not an accurate predictor of vulnerability: epinions networks are smaller than slashdot networks yet vulnerability in epinions is lower

20 Lesson 3: Grouping Matters Social user grouping always less vulnerable than random grouping

21 Lesson 4: Size of Group Matters More users on peer means more influence on requests (random or social) 50 users/peer, 674 peers in enron 100 users/peer, 619 peers in gnutella31 yet enron more vulnerable

22 Lessons Mapping of users onto peers influences system vulnerability –Socially-aware mappings more resilient Replication does not significantly affect vulnerability Malicious peers can be more effective in small networks Size of network is not an accurate predictor of vulnerability Hub peers are most damaging

23 Summary A study on the vulnerability of a socially- informed peer-to-peer network to malicious attacks Problem motivated by our previous work but of more general applicability Socially-aware design is tricky: –Social mapping increases resilience –Yet peer hubs (an outcome of social mapping) decrease resilience