SmartWalk: Enhancing Social Network Security via Adaptive Random Walks

作者: Yushan Liu , Shouling Ji , Prateek Mittal

DOI: 10.1145/2976749.2978319

关键词:

摘要: Random walks form a critical foundation in many social network based security systems and applications. Currently, the design of such mechanisms is limited to classical paradigm using fixed-length random for all nodes on graph. However, walk induces poor trade-off between other desirable properties. In this paper, we propose SmartWalk, enhancing system which incorporates adaptive We utilize set supervised machine learning techniques predict necessary length structural characteristics Using experiments multiple real world topologies, show that desired starting from specific node can be well predicted given local features node, knowledge small training nodes. describe node-adaptive path-adaptive usage models, where adaptively changes intermediate path, respectively. experimentally demonstrate applicability number privacy systems, including Sybil defenses, anonymous communication link preserving up two orders magnitude improvement performance.

参考文章(52)
Xiaowei Ying, Xintao Wu, Randomizing Social Networks: a Spectrum Preserving Approach. siam international conference on data mining. pp. 739- 750 ,(2008)
Sung-Hyuk Cha, Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions International Journal of Mathematical Models and Methods in Applied Sciences. ,vol. 1, ,(2007)
Chris Lesniewski-Laas, M. Frans Kaashoek, Whanau: a sybil-proof distributed hash table networked systems design and implementation. pp. 8- 8 ,(2010) , 10.5555/1855711.1855719
Elena Zheleva, Lise Getoor, Preserving the privacy of sensitive relationships in graph data knowledge discovery and data mining. pp. 153- 171 ,(2007) , 10.1007/978-3-540-78478-4_9
George Danezis, Prateek Mittal, SybilInfer: Detecting Sybil Nodes using Social Networks. network and distributed system security symposium. ,(2009)
George Danezis, Claudia Diaz, Carmela Troncoso, Ben Laurie, Drac: an architecture for anonymous low-volume communications privacy enhancing technologies. pp. 202- 219 ,(2010) , 10.1007/978-3-642-14527-8_12
Stephen J. Hardiman, Liran Katzir, Estimating clustering coefficients and size of social networks via random walk Proceedings of the 22nd international conference on World Wide Web - WWW '13. pp. 539- 550 ,(2013) , 10.1145/2488388.2488436
Lakshminarayanan Subramanian, Jinyang Li, Nguyen Tran, Bonan Min, Sybil-resilient online content voting networked systems design and implementation. pp. 15- 28 ,(2009)
Chi-Yao Hong, Prateek Mittal, Matthew Caesar, Nikita Borisov, Shishir Nagaraja, BotGrep: finding P2P bots with structured graph analysis usenix security symposium. pp. 7- 7 ,(2010)
David A. Levin, Elizabeth L. Wilmer, Y. Peres, Y. Peres, Y. Peres, Markov Chains and Mixing Times ,(2008)