SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Downloaden Sie, um offline zu lesen
Reputation Systems II
Sybil Attack, BlogRank, B2Rank, EigenRumor,
             MailRank, TrustRunk



         Yury Lifshits
         Caltech
         http://yury.name


                   Caltech CMI Seminar
                      March 4, 2008


                                          1 / 22
Outline

1   Sybil Attack

2   Ranking Blogs

3   Reputations For Fighting Spam

4   Conclusions



                                    2 / 22
1
Sybil Attack




               3 / 22
Sybil Attack

   Graph of trust-weighted edges

   n honest nodes + adversary

   overall trust value on attack edges
   (honest-malicious) is limited




                                         4 / 22
Sybil Attack

   Graph of trust-weighted edges

   n honest nodes + adversary

   overall trust value on attack edges
   (honest-malicious) is limited


Question: whether splitting adversarial node
into many is beneficial for acquiring higher
reputation (rank)?

                                               4 / 22
Negative Result


 Assume reputation scores remain the same
           under isomorphism.
             Is it sybilproof?




                                            5 / 22
Negative Result


 Assume reputation scores remain the same
           under isomorphism.
             Is it sybilproof?

Unfortunately, no. Attack strategy?




                                            5 / 22
Negative Result


 Assume reputation scores remain the same
           under isomorphism.
             Is it sybilproof?

Unfortunately, no. Attack strategy?

Answer: double the graph.




                                            5 / 22
Positive Results (1/3)

General form of trust flow reputations:

            r(x) = max           trust(p)
                   Ptx
                         p∈Ptx

Notation:

   t is pre-trusted node

   Pxy is a family of disjoint paths from t to x



                                               6 / 22
Positive Results (2/3)

Assumptions:
 1
     Extending path nonincreases the trust(p)
 2
       and trust are monotone to number of
     paths and edges values, respectively
 3
     Splitting a path into two does not increase
       value




                                                7 / 22
Positive Results (2/3)

Assumptions:
 1
     Extending path nonincreases the trust(p)
 2
       and trust are monotone to number of
     paths and edges values, respectively
 3
     Splitting a path into two does not increase
       value
 4
       = max


                                                7 / 22
Positive Results (3/3)


Under assumptions (1-3) sybil attack does not
increase adversary’s reputation




                                            8 / 22
Positive Results (3/3)


Under assumptions (1-3) sybil attack does not
increase adversary’s reputation

Under assumptions (1-4) sybil attack does not
increase adversary’s rank




                                            8 / 22
Positive Results (3/3)


Under assumptions (1-3) sybil attack does not
increase adversary’s reputation

Under assumptions (1-4) sybil attack does not
increase adversary’s rank

                   Proof?




                                            8 / 22
SybilGuard (1/2)


   Assume number of attack edges is
   A = o( n/ log n)

   System is distributed, honest nodes follow
   the same protocol

   Can an honest node t identify (w.h.p.)
   2A + 1 nodes in such a way that at most A
   of them are powered by adversary?



                                            9 / 22
SybilGuard (2/2)
   For every node fix a bijective mapping
   from in-edges to out-edges
   Take a walk from t of length at most
     n log n using bijection routing
   At some point make a random switch,
   than continue another n log n steps using
   backwalk routing
   Report a point. Repeat, until 2A + 1 points
   are collected



                                             10 / 22
SybilGuard (2/2)
   For every node fix a bijective mapping
   from in-edges to out-edges
   Take a walk from t of length at most
     n log n using bijection routing
   At some point make a random switch,
   than continue another n log n steps using
   backwalk routing
   Report a point. Repeat, until 2A + 1 points
   are collected

Claim
w.h.p. at most A reported nodes are malicious
                                             10 / 22
2
Ranking Blogs




                11 / 22
Ranking Blogs: Factors

   Entities: blogs, posts, communities,
   comments, brand names, external
   websites

   Frineds, blogroll, subscriptions, hyperlinks,
   visitors, clicks, votes

   Time

   Tags


                                              12 / 22
BlogRank

     Any ideas how to rank blogs?




                                    13 / 22
BlogRank

       Any ideas how to rank blogs?

Why not just PageRank?




                                      13 / 22
BlogRank

        Any ideas how to rank blogs?

Why not just PageRank?
Wait a minute, for which graph?




                                       13 / 22
BlogRank

        Any ideas how to rank blogs?

Why not just PageRank?
Wait a minute, for which graph? Linked blogs:

   Hyperlinks, blogrolls
   Common commentors/authors, tags, co-references
   to news



                                               13 / 22
B2Rank
B2Rank(x) = BlogReputation × PostQuality




                                           14 / 22
B2Rank
B2Rank(x) = BlogReputation × PostQuality

BlogReputation is computed in PageRank style
for blogroll graph with one change:

   Blogroll links are weighted by activity level
   (frequency of blogging and commenting)




                                              14 / 22
B2Rank
B2Rank(x) = BlogReputation × PostQuality

BlogReputation is computed in PageRank style
for blogroll graph with one change:

   Blogroll links are weighted by activity level
   (frequency of blogging and commenting)

PostQuality is average for PageRank-style
score of blog posts

   Post-to-post links are weighted by
   referring post activity and time difference
                                              14 / 22
EigenRumor (1/2)




Picture from “The EigenRumor Algorithm for Ranking Blogs” paper
                                                                  15 / 22
EigenRumor (2/2)
Notation:
    ¯: reputation score for posts
    r
    ¯ ¯
    a, h: authority and hub scores for bloggers
    P, E: provision and evaluation matrices




                                                  16 / 22
EigenRumor (2/2)
Notation:
    ¯: reputation score for posts
    r
    ¯ ¯
    a, h: authority and hub scores for bloggers
    P, E: provision and evaluation matrices

                      ¯
¯ = αPT a + (1 − α)ET h
r       ¯
          ¯
a = P¯, h = E¯
¯    r         r




                                                  16 / 22
EigenRumor (2/2)
Notation:
    ¯: reputation score for posts
    r
    ¯ ¯
    a, h: authority and hub scores for bloggers
    P, E: provision and evaluation matrices

                      ¯
¯ = αPT a + (1 − α)ET h
r       ¯
          ¯
a = P¯, h = E¯
¯    r         r

Solution: iterative algorithm for ¯:
                                  r
       T             T
¯ = (αP P + (1 − α)E E)¯
r                       r

                                                  16 / 22
3
Reputations For Fighting Spam




                                17 / 22
Combining Two Scores
  Hyperlink graph




                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes




                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes




                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner




                                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards




                                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards
  Compute spam scores a-la PageRank




                                       18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards
  Compute spam scores a-la PageRank
  Reweight hyperlink graph and pre-trusted
  nodes

                                         18 / 22
Combining Two Scores
  Hyperlink graph
  Pre-trusted nodes
  Spam nodes
  Reputation propagates in a forward
  manner
  Spam score propagates backwards
  Compute spam scores a-la PageRank
  Reweight hyperlink graph and pre-trusted
  nodes
  Compute reputations a-la PageRank      18 / 22
4
Conclusions




              19 / 22
Challenges
  Measurable objectives?
  Model for input data?
  Dynamic aspects of reputations?
  Digg-style ranking?
  Price of attack?
  Ranking in social networks?
  Ranking in RDF data?
  Billion dollar question: how to avoid arms
  race?
                                           20 / 22
References
  K. Fujimura, T. Inoue, M. Sugisaki
  The EigenRumor Algorithm for Ranking Blogs

  A. Kritikopoulos, M. Sideri, I. Varlamis
  BlogRank: ranking weblogs based on connectivity and similarity features

  M.A. Tayebi, S.M. Hashemi, A. Mohades
  B2Rank: An Algorithm for Ranking Blogs Based on Behavioral Features

  A. Cheng, E. Friedman
  Sybilproof reputation mechanisms

  H. Yu, M. Kaminsky, P.B. Gibbons, A, Flaxman
  SybilGuard: defending against sybil attacks via social networks

  P.A. Chirita, J. Diederich, W. Nejdl
  MailRank: using ranking for spam detection

  Z. Gyongyi, H. Garcia-Molina, J. Pedersen
  Combating web spam with TrustRank

  M. Dalal
  Spam and popularity ratings for combating link spam
                                                                            21 / 22
http://yury.name
http://yury.name/reputation.html
Ongoing project: http://businessconsumer.net




                                               22 / 22
http://yury.name
http://yury.name/reputation.html
Ongoing project: http://businessconsumer.net


    Thanks for your attention!
           Questions?



                                               22 / 22

Weitere ähnliche Inhalte

Andere mochten auch

Business-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury LifshitsBusiness-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury LifshitsYury Lifshits
 
Data Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! ResearchData Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! ResearchYury Lifshits
 
Osh — Curiosity Learning on Mobile
Osh — Curiosity Learning on MobileOsh — Curiosity Learning on Mobile
Osh — Curiosity Learning on MobileYury Lifshits
 
Reputation Systems I
Reputation Systems IReputation Systems I
Reputation Systems IYury Lifshits
 
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010Yury Lifshits
 

Andere mochten auch (7)

Business-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury LifshitsBusiness-Consumer Networks. Project Proposal by Yury Lifshits
Business-Consumer Networks. Project Proposal by Yury Lifshits
 
Social Design
Social DesignSocial Design
Social Design
 
FaceBook MeetYourFriends Presentation
FaceBook MeetYourFriends PresentationFaceBook MeetYourFriends Presentation
FaceBook MeetYourFriends Presentation
 
Data Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! ResearchData Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! Research
 
Osh — Curiosity Learning on Mobile
Osh — Curiosity Learning on MobileOsh — Curiosity Learning on Mobile
Osh — Curiosity Learning on Mobile
 
Reputation Systems I
Reputation Systems IReputation Systems I
Reputation Systems I
 
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010Evolution of  Two Sided Markets - Yury Lifshits - WSDM 2010
Evolution of Two Sided Markets - Yury Lifshits - WSDM 2010
 

Ähnlich wie Reputation Systems II

Ranking systems
Ranking systemsRanking systems
Ranking systemsMafer
 
Ranking systems
Ranking systemsRanking systems
Ranking systemsJoyce
 
Dr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graphDr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graphCarlos Castillo (ChaTo)
 
Ranking systems
Ranking systemsRanking systems
Ranking systemscristian L
 
Markov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdfMarkov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdfrayyverma
 
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16MLconf
 

Ähnlich wie Reputation Systems II (7)

Link Analysis
Link AnalysisLink Analysis
Link Analysis
 
Ranking systems
Ranking systemsRanking systems
Ranking systems
 
Ranking systems
Ranking systemsRanking systems
Ranking systems
 
Dr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graphDr. Searcher and Mr. Browser: A unified hyperlink-click graph
Dr. Searcher and Mr. Browser: A unified hyperlink-click graph
 
Ranking systems
Ranking systemsRanking systems
Ranking systems
 
Markov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdfMarkov chains and page rankGraphs.pdf
Markov chains and page rankGraphs.pdf
 
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
Yael Elmatad, Senior Data Scientist, Tapad at MLconf NYC - 4/15/16
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Kürzlich hochgeladen (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Reputation Systems II

  • 1. Reputation Systems II Sybil Attack, BlogRank, B2Rank, EigenRumor, MailRank, TrustRunk Yury Lifshits Caltech http://yury.name Caltech CMI Seminar March 4, 2008 1 / 22
  • 2. Outline 1 Sybil Attack 2 Ranking Blogs 3 Reputations For Fighting Spam 4 Conclusions 2 / 22
  • 4. Sybil Attack Graph of trust-weighted edges n honest nodes + adversary overall trust value on attack edges (honest-malicious) is limited 4 / 22
  • 5. Sybil Attack Graph of trust-weighted edges n honest nodes + adversary overall trust value on attack edges (honest-malicious) is limited Question: whether splitting adversarial node into many is beneficial for acquiring higher reputation (rank)? 4 / 22
  • 6. Negative Result Assume reputation scores remain the same under isomorphism. Is it sybilproof? 5 / 22
  • 7. Negative Result Assume reputation scores remain the same under isomorphism. Is it sybilproof? Unfortunately, no. Attack strategy? 5 / 22
  • 8. Negative Result Assume reputation scores remain the same under isomorphism. Is it sybilproof? Unfortunately, no. Attack strategy? Answer: double the graph. 5 / 22
  • 9. Positive Results (1/3) General form of trust flow reputations: r(x) = max trust(p) Ptx p∈Ptx Notation: t is pre-trusted node Pxy is a family of disjoint paths from t to x 6 / 22
  • 10. Positive Results (2/3) Assumptions: 1 Extending path nonincreases the trust(p) 2 and trust are monotone to number of paths and edges values, respectively 3 Splitting a path into two does not increase value 7 / 22
  • 11. Positive Results (2/3) Assumptions: 1 Extending path nonincreases the trust(p) 2 and trust are monotone to number of paths and edges values, respectively 3 Splitting a path into two does not increase value 4 = max 7 / 22
  • 12. Positive Results (3/3) Under assumptions (1-3) sybil attack does not increase adversary’s reputation 8 / 22
  • 13. Positive Results (3/3) Under assumptions (1-3) sybil attack does not increase adversary’s reputation Under assumptions (1-4) sybil attack does not increase adversary’s rank 8 / 22
  • 14. Positive Results (3/3) Under assumptions (1-3) sybil attack does not increase adversary’s reputation Under assumptions (1-4) sybil attack does not increase adversary’s rank Proof? 8 / 22
  • 15. SybilGuard (1/2) Assume number of attack edges is A = o( n/ log n) System is distributed, honest nodes follow the same protocol Can an honest node t identify (w.h.p.) 2A + 1 nodes in such a way that at most A of them are powered by adversary? 9 / 22
  • 16. SybilGuard (2/2) For every node fix a bijective mapping from in-edges to out-edges Take a walk from t of length at most n log n using bijection routing At some point make a random switch, than continue another n log n steps using backwalk routing Report a point. Repeat, until 2A + 1 points are collected 10 / 22
  • 17. SybilGuard (2/2) For every node fix a bijective mapping from in-edges to out-edges Take a walk from t of length at most n log n using bijection routing At some point make a random switch, than continue another n log n steps using backwalk routing Report a point. Repeat, until 2A + 1 points are collected Claim w.h.p. at most A reported nodes are malicious 10 / 22
  • 18. 2 Ranking Blogs 11 / 22
  • 19. Ranking Blogs: Factors Entities: blogs, posts, communities, comments, brand names, external websites Frineds, blogroll, subscriptions, hyperlinks, visitors, clicks, votes Time Tags 12 / 22
  • 20. BlogRank Any ideas how to rank blogs? 13 / 22
  • 21. BlogRank Any ideas how to rank blogs? Why not just PageRank? 13 / 22
  • 22. BlogRank Any ideas how to rank blogs? Why not just PageRank? Wait a minute, for which graph? 13 / 22
  • 23. BlogRank Any ideas how to rank blogs? Why not just PageRank? Wait a minute, for which graph? Linked blogs: Hyperlinks, blogrolls Common commentors/authors, tags, co-references to news 13 / 22
  • 24. B2Rank B2Rank(x) = BlogReputation × PostQuality 14 / 22
  • 25. B2Rank B2Rank(x) = BlogReputation × PostQuality BlogReputation is computed in PageRank style for blogroll graph with one change: Blogroll links are weighted by activity level (frequency of blogging and commenting) 14 / 22
  • 26. B2Rank B2Rank(x) = BlogReputation × PostQuality BlogReputation is computed in PageRank style for blogroll graph with one change: Blogroll links are weighted by activity level (frequency of blogging and commenting) PostQuality is average for PageRank-style score of blog posts Post-to-post links are weighted by referring post activity and time difference 14 / 22
  • 27. EigenRumor (1/2) Picture from “The EigenRumor Algorithm for Ranking Blogs” paper 15 / 22
  • 28. EigenRumor (2/2) Notation: ¯: reputation score for posts r ¯ ¯ a, h: authority and hub scores for bloggers P, E: provision and evaluation matrices 16 / 22
  • 29. EigenRumor (2/2) Notation: ¯: reputation score for posts r ¯ ¯ a, h: authority and hub scores for bloggers P, E: provision and evaluation matrices ¯ ¯ = αPT a + (1 − α)ET h r ¯ ¯ a = P¯, h = E¯ ¯ r r 16 / 22
  • 30. EigenRumor (2/2) Notation: ¯: reputation score for posts r ¯ ¯ a, h: authority and hub scores for bloggers P, E: provision and evaluation matrices ¯ ¯ = αPT a + (1 − α)ET h r ¯ ¯ a = P¯, h = E¯ ¯ r r Solution: iterative algorithm for ¯: r T T ¯ = (αP P + (1 − α)E E)¯ r r 16 / 22
  • 32. Combining Two Scores Hyperlink graph 18 / 22
  • 33. Combining Two Scores Hyperlink graph Pre-trusted nodes 18 / 22
  • 34. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes 18 / 22
  • 35. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner 18 / 22
  • 36. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards 18 / 22
  • 37. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards Compute spam scores a-la PageRank 18 / 22
  • 38. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards Compute spam scores a-la PageRank Reweight hyperlink graph and pre-trusted nodes 18 / 22
  • 39. Combining Two Scores Hyperlink graph Pre-trusted nodes Spam nodes Reputation propagates in a forward manner Spam score propagates backwards Compute spam scores a-la PageRank Reweight hyperlink graph and pre-trusted nodes Compute reputations a-la PageRank 18 / 22
  • 40. 4 Conclusions 19 / 22
  • 41. Challenges Measurable objectives? Model for input data? Dynamic aspects of reputations? Digg-style ranking? Price of attack? Ranking in social networks? Ranking in RDF data? Billion dollar question: how to avoid arms race? 20 / 22
  • 42. References K. Fujimura, T. Inoue, M. Sugisaki The EigenRumor Algorithm for Ranking Blogs A. Kritikopoulos, M. Sideri, I. Varlamis BlogRank: ranking weblogs based on connectivity and similarity features M.A. Tayebi, S.M. Hashemi, A. Mohades B2Rank: An Algorithm for Ranking Blogs Based on Behavioral Features A. Cheng, E. Friedman Sybilproof reputation mechanisms H. Yu, M. Kaminsky, P.B. Gibbons, A, Flaxman SybilGuard: defending against sybil attacks via social networks P.A. Chirita, J. Diederich, W. Nejdl MailRank: using ranking for spam detection Z. Gyongyi, H. Garcia-Molina, J. Pedersen Combating web spam with TrustRank M. Dalal Spam and popularity ratings for combating link spam 21 / 22