+ All Categories
Home > Documents > Vulnerability in Socially-informed Peer-to-Peer Systems

Vulnerability in Socially-informed Peer-to-Peer Systems

Date post: 05-Jan-2016
Category:
Upload: lowell
View: 52 times
Download: 2 times
Share this document with a friend
Description:
Vulnerability in Socially-informed Peer-to-Peer Systems. Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida. Social and Socially-aware Applications. Internet Applications. Mobile Applications. - PowerPoint PPT Presentation
Popular Tags:
23
Vulnerability in Socially-informed Peer- to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida
Transcript
Page 1: Vulnerability in  Socially-informed Peer-to-Peer Systems

Vulnerability in Socially-informed Peer-to-Peer

Systems

Jeremy Blackburn

Nicolas Kourtellis

Adriana Iamnitchi

University of South Florida

Page 2: Vulnerability in  Socially-informed Peer-to-Peer Systems

2

Social and Socially-aware Applications

Internet Applications

Mobile Applications

Applications may contain user profiles, social networks, history of social interactions, location, collocation

Page 3: Vulnerability in  Socially-informed Peer-to-Peer Systems

3

Problems with Current Social Information Management

• Application specific:

– Need to input data for each new application

– Cannot benefit from information aggregation across

applications

• Typically, data are owned by applications: users

don't have control over their data

• Hidden incentives to have many "friends": social

information not accurate

Page 4: Vulnerability in  Socially-informed Peer-to-Peer Systems

4

Our Previous Work: Prometheus

A peer-to-peer social data management service that:• Receives data from social sensors that collect application-specific social

information

• Represents social data as decentralized social graph stored on trusted peers

• Exposes API to share social information with applications according to user

access control policies

Prometheus: User-Controlled Peer-to-Peer Social Data Management for Socially-Aware Applications, N. Kourtellis et al, Middleware 2010

Page 5: Vulnerability in  Socially-informed Peer-to-Peer Systems

5

Prometheus: A P2P Social Data Management Service

Page 6: Vulnerability in  Socially-informed Peer-to-Peer Systems

6

Social and Peer Networks in Prometheus

Page 7: Vulnerability in  Socially-informed Peer-to-Peer Systems

7

Social and Peer Topology

Page 8: Vulnerability in  Socially-informed Peer-to-Peer Systems

8

Applicable to Other Systems

• Socially-informed search• Contextually-aware information dissemination• Socially-based augmentation of risk analysis

in a money-lending peer-to-peer system (such as prosper.com)

Unifying characteristics:• Socially-informed routing of messages

between nodes in the peer-to-peer network

Page 9: Vulnerability in  Socially-informed Peer-to-Peer Systems

9

Questions

• What is the vulnerability of such a network?

• What design decisions should be considered?

Page 10: Vulnerability in  Socially-informed Peer-to-Peer Systems

10

Outline

• Background• Model• Vulnerability to:

– Malicious users– Malicious peers

• Experimental Evaluation– Setup– Results– Lessons

• Summary

Page 11: Vulnerability in  Socially-informed Peer-to-Peer Systems

11

Malicious Users

• Directed graph limits vulnerability• Even if reciprocal edge created, label and weight

requirement limit effects• Lessons for writing social inference functions that use

the social graph representation

Page 12: Vulnerability in  Socially-informed Peer-to-Peer Systems

12

Malicious Peers

• Several attack mechanisms that are difficult to prevent:– Modifying results sent back to other peers– Dropping/changing/creating fake requests

• We focus on the results sent back by a peer– Question: how much damage can a peer do in

terms of the fraction of requests it can manipulate?

Page 13: Vulnerability in  Socially-informed Peer-to-Peer Systems

13

Experimental Setup

• Social networks:– Synthetic social graph– Real networks (results not presented in the paper)

• Worst case scenario:– Networks have reciprocal edges– No weight or edge label restriction– Requests flood neighborhood of radius K

• Mapping users on peers:– Social: map communities to peers– Random

Page 14: Vulnerability in  Socially-informed Peer-to-Peer Systems

14

Socially-informed P2P Topologies

P2P topology formed by the 25 highest social bandwidth connections between peers

Social mapping Random mapping

Page 15: Vulnerability in  Socially-informed Peer-to-Peer Systems

15

Synthetic Social Network

• 1000 users, 100 peers• Communities identified

with Girvan-Newman algorithm

• Lessons:– Social mapping more

resilient– Replication level

irrelevant for vulnerability

Page 16: Vulnerability in  Socially-informed Peer-to-Peer Systems

16

Mappings Users to Peers in Real Social Networks

• Used a recursive version of the Louvain algorithm for fast community detection– Much more scalable than GN

• For the random mapping: – Keep community size same as social– Reshuffle the community members

Page 17: Vulnerability in  Socially-informed Peer-to-Peer Systems

17

Communities in Real Networks

Social Network

Number of Users

Number of Communitieswith average size S (in users)

S=10 S=50 S=100

gnutella04 10,876 1,088 218 109

gnutella31 62,561 6,256 1,246 619

enron 33,696 3,370 674 337

epinions 75,877 7,564 1,485 727

slashdot 82,168 8,207 1,607 794

Page 18: Vulnerability in  Socially-informed Peer-to-Peer Systems

18

Lesson 1: Network Size Matters

Malicious nodes influence a larger percentage of thenetwork in smaller networks

Page 19: Vulnerability in  Socially-informed Peer-to-Peer Systems

19

Lesson 2: Social Network Topology Matters

Size is not an accurate predictor of vulnerability: • epinions networks are smaller than slashdot networks• yet vulnerability in epinions is lower

Page 20: Vulnerability in  Socially-informed Peer-to-Peer Systems

20

Lesson 3: Grouping Matters

Social user groupingalways lessvulnerable thanrandom grouping

0.0001

0.001

0.01

0.1

1

10-2 50-2 100-2 10-3 50-3 100-3

fraction of requests influenced

Users per Peer - Hops

Gnutella04-socialGnutella04-random

Enron-socialEnron-random

Gnutella31-social

Gnutella31-randomEpinions-socialEpinions-randomSlashdot-socialSlashdot-random

Page 21: Vulnerability in  Socially-informed Peer-to-Peer Systems

21

Lesson 4: Size of Group Matters

More users on peer means moreinfluence onrequests(random or social) 0.0001

0.001

0.01

0.1

1

10-2 50-2 100-2 10-3 50-3 100-3

fraction of requests influenced

Users per Peer - Hops

Gnutella04-socialGnutella04-random

Enron-socialEnron-random

Gnutella31-social

Gnutella31-randomEpinions-socialEpinions-randomSlashdot-socialSlashdot-random

• 50 users/peer, 674 peers in enron• 100 users/peer, 619 peers in gnutella31• yet enron more vulnerable

Page 22: Vulnerability in  Socially-informed Peer-to-Peer Systems

22

Lessons

• Mapping of users onto peers influences system vulnerability– Socially-aware mappings more resilient

• Replication does not significantly affect vulnerability

• Malicious peers can be more effective in small networks

• Size of network is not an accurate predictor of vulnerability

• Hub peers are most damaging

Page 23: Vulnerability in  Socially-informed Peer-to-Peer Systems

23

Summary

• A study on the vulnerability of a socially-informed peer-to-peer network to malicious attacks

• Problem motivated by our previous work but of more general applicability

• Socially-aware design is tricky:– Social mapping increases resilience– Yet peer hubs (an outcome of social mapping)

decrease resilience


Recommended