SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
escuela técnica superior
                                       de ingeniería informática




PolarityTrust: measuring Trust and
  Reputation in Social Networks
                                  F. Javier Ortega
                                  javierortega@us.es
                                   José A. Troyano
                                     troyano@us.es
                                    Fermín L. Cruz
                                       fcruz@us.es
                           Fernando Enríquez de Salamanca
                                      fenros@us.es



             Departamento de
             Lenguajes y Sistemas Informáticos
Motivation

♦ Example: on-line marketplaces
Motivation
Motivation

                    How can I make the most from these
                    transactions?

                    Selling more products but cheaper?
                    Selling rare (and maybe expensive) articles?
                    Free shipping?




   How can I choose the best seller?

   The one with highest amount of sales?
   The one with most positive opinions?
   The cheapest one?
Motivation

             ♦ Δ Reputation => Δ Sales

             ♦ Gaining high reputation:

              ●
                  Obtain (false) positive opinions from
                  other accounts (not neccesarily
                  other users).
              ●
                  Sell some bargains to obtain high
                  reputation from the buyers.
              ●
                  Give negative opinions for sellers that
                  can be competitors.
Motivation


♦ Goals:
  ●
      Compute a ranking of users according to their
      trustworthiness

  ●
      Process a network with positive and negative links
      (opinions) between the nodes (users)

  ●
      Avoid the effects of the actions performed by malicious
      users in order to increase their reputation
Roadmap


♦ Introduction

♦ PolarityTrust

♦ Evaluation

♦ Conclusions
Introduction


♦ Trust and Reputation Systems (TRS) manage
  trustworthiness of users in social networks.

♦ Common mechanisms:
  ●
      Moderators (on-line forums)
  ●
      Votes from users to users (eBay)
  ●
      Karma (Slashdot, Meneame)
  ●
      Graph-based ranking algorithms (EigenTrust)
Introduction

♦ Users feedback needed!

♦ Problems:
  ●
      Positive bias
  ●
      Incentives for users feedback
  ●
      Cold-start problem
  ●
      Exit problem
  ●
      Duplicity of identities
Introduction

♦ Malicious users strategies to gain high reputation:
            ♦ Orchestrated attacks: Obtaining positive
              opinions from other accounts (not neccesarily
              other users).

            ♦ Camouflage behind good behavior: selling
              some bargains to obtain high reputation from
              the buyers.

            ♦ Malicious spies: using a honest account to
              provide positive opinions to a malicious user.

            ♦ Camouflage behind judgments: giving
              negative opinions from seller that can be
              competitors.
Introduction

♦ Malicious users strategies to gain high reputation:
            ♦ Orchestrated attacks: Obtaining positive
              opinions from other accounts (not neccesarily
              other users).



                                                     6
                       1                     7
                           2

               0                   3
                                                         9

                               5                 8
                   4
Introduction

♦ Malicious users strategies to gain high reputation:
            ♦ Camouflage behind good behavior: selling
              some bargains to obtain high reputation from
              the buyers.



                                                     6
                       1                    7
                           2

               0                   3
                                                         9

                               5                 8
                   4
Introduction

♦ Malicious users strategies to gain high reputation:
            ♦ Malicious spies: using a honest account to
              provide positive opinions to a malicious user.




                                                        6
                       1                       7
                           2

               0               3
                                                            9

                                                    8
                   4                 5
Introduction

♦ Malicious users strategies to gain high reputation:
            ♦ Camouflage behind judgments: giving
              negative opinions from seller that can be
              competitors.



                                                     6
                      1                     7
                          2

              0                   3
                                                          9

                              5                  8
                  4
PolarityTrust

♦ Graph-based ranking algorithm

♦ Two scores for each node: PT⁺ and PT⁻

♦ Propagation of trust and distrust over the network

♦ PT⁺ and PT⁻ influence each other depending on the
  polarity of the links between a node and its
  neighbours.
PolarityTrust

♦ Propagation mechanism:
  ●
      Given a set of trustworthy users
  ●
      Their PT⁺ and PT⁻ scores are propagated to their
      neighbours, and so on.



                                                 6
                  1                     7
                      2

          0                   3
                                                     9

                          5                  8
              4
PolarityTrust

♦ Propagation rules:
  ●
      Positive opinions => direct relation between scores
  ●
      Negative opinions => cross relation between scores

♦ Non-negative Propagation extension:
  ●
      Avoid the propagation of negative opinions from negative
      users

                      b                           b

           a                            a

                      c                           c
Evaluation

♦ Baselines:
  ●
      EigenTrust
  ●
      Fans Minus Freaks


♦ Dataset:
  ●
      Randomly generated graphs: Barabasi and Albert model.
  ●
      Malicious users added in order to perform common attacks


♦ Evaluation metrics:
  ●
      Number of inversions: bad users in good positions
  ●
      Incremental number of bad nodes
Evaluation

♦ Performance against common attacks:

 Models   ET    FmF   PT    PT+NN        Models      ET     FmF   PT   PT+NN

   A      50     0    0        0            A        50      0    0      0

   B      197   36    0        0            B        197    36    0      0

   C      63    207   94      94           B+C       155    873   27    27

   D      86     9    9        9         B+C+D       169    871   26    26

   E      74     4    0        0        B+C+D+E      183    849   38    36



                      A: No attacks
                      B: Orchestrated attacks
                      C: Camouflage behind good behaviour
                      D: Malicious Spies
                      E: Camouflage behind judgments
Evaluation

♦ Performance against incremental number of malicious users:
Conclusions

♦ Something

Weitere ähnliche Inhalte

Andere mochten auch

Non sanità elettronica, solamente sanità migliore: to do list
Non sanità elettronica, solamente sanità migliore: to do listNon sanità elettronica, solamente sanità migliore: to do list
Non sanità elettronica, solamente sanità migliore: to do listSergio Pillon
 
Relative pronouns
Relative pronounsRelative pronouns
Relative pronounsafandi45
 
Clubstrozdemo
ClubstrozdemoClubstrozdemo
Clubstrozdemorandtke
 
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSN
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSNLa telemedicina nelle ferite difficili: un servizio attivi da anni nel SSN
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSNSergio Pillon
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
Security and Trust in social media networks
Security and Trust in social media networksSecurity and Trust in social media networks
Security and Trust in social media networksTouradj Ebrahimi
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Social networks and security
Social networks and securitySocial networks and security
Social networks and securityARICT
 
Cyber security on social networks
Cyber security on social networksCyber security on social networks
Cyber security on social networksDev Nair
 
Invited talk at Future Networked Technologies / FIT-IT research calls opening...
Invited talk at Future Networked Technologies / FIT-IT research calls opening...Invited talk at Future Networked Technologies / FIT-IT research calls opening...
Invited talk at Future Networked Technologies / FIT-IT research calls opening...Paolo Massa
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
How to Build Trust in Social Networks - The 4 As
How to Build Trust in Social Networks - The 4 AsHow to Build Trust in Social Networks - The 4 As
How to Build Trust in Social Networks - The 4 AsGavin Heaton
 
Ankit kansara portfolio 2011
Ankit kansara   portfolio 2011Ankit kansara   portfolio 2011
Ankit kansara portfolio 2011AnkitKansara
 
Security on social networks AVAST
Security on social networks AVASTSecurity on social networks AVAST
Security on social networks AVASTJulia Szymańska
 
PhD Thesis presentation
PhD Thesis presentationPhD Thesis presentation
PhD Thesis presentationJavier Ortega
 
Human Security
Human SecurityHuman Security
Human Securityotter1984
 
Security Aspects of Social Networks at Campus Party 2010
Security Aspects of Social Networks at Campus Party 2010Security Aspects of Social Networks at Campus Party 2010
Security Aspects of Social Networks at Campus Party 2010Anchises Moraes
 

Andere mochten auch (20)

Non sanità elettronica, solamente sanità migliore: to do list
Non sanità elettronica, solamente sanità migliore: to do listNon sanità elettronica, solamente sanità migliore: to do list
Non sanità elettronica, solamente sanità migliore: to do list
 
Lista empleados
Lista empleadosLista empleados
Lista empleados
 
Tugas 2 tik
Tugas 2 tikTugas 2 tik
Tugas 2 tik
 
Relative pronouns
Relative pronounsRelative pronouns
Relative pronouns
 
Clubstrozdemo
ClubstrozdemoClubstrozdemo
Clubstrozdemo
 
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSN
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSNLa telemedicina nelle ferite difficili: un servizio attivi da anni nel SSN
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSN
 
Telemedicina 2012
Telemedicina 2012Telemedicina 2012
Telemedicina 2012
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Security and Trust in social media networks
Security and Trust in social media networksSecurity and Trust in social media networks
Security and Trust in social media networks
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Social networks and security
Social networks and securitySocial networks and security
Social networks and security
 
Cyber security on social networks
Cyber security on social networksCyber security on social networks
Cyber security on social networks
 
Invited talk at Future Networked Technologies / FIT-IT research calls opening...
Invited talk at Future Networked Technologies / FIT-IT research calls opening...Invited talk at Future Networked Technologies / FIT-IT research calls opening...
Invited talk at Future Networked Technologies / FIT-IT research calls opening...
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
How to Build Trust in Social Networks - The 4 As
How to Build Trust in Social Networks - The 4 AsHow to Build Trust in Social Networks - The 4 As
How to Build Trust in Social Networks - The 4 As
 
Ankit kansara portfolio 2011
Ankit kansara   portfolio 2011Ankit kansara   portfolio 2011
Ankit kansara portfolio 2011
 
Security on social networks AVAST
Security on social networks AVASTSecurity on social networks AVAST
Security on social networks AVAST
 
PhD Thesis presentation
PhD Thesis presentationPhD Thesis presentation
PhD Thesis presentation
 
Human Security
Human SecurityHuman Security
Human Security
 
Security Aspects of Social Networks at Campus Party 2010
Security Aspects of Social Networks at Campus Party 2010Security Aspects of Social Networks at Campus Party 2010
Security Aspects of Social Networks at Campus Party 2010
 

Ähnlich wie PolarityTrust: measuring Trust and Reputation in Social Networks

Alnemr tm symp-slides
Alnemr tm symp-slidesAlnemr tm symp-slides
Alnemr tm symp-slidesRehab Alnemr
 
Collusion Detection using Spark on YARN
Collusion Detection using Spark on YARNCollusion Detection using Spark on YARN
Collusion Detection using Spark on YARNDataWorks Summit
 
comScore Asia Pacific @ Web Wednesday Singapore
comScore Asia Pacific @ Web Wednesday SingaporecomScore Asia Pacific @ Web Wednesday Singapore
comScore Asia Pacific @ Web Wednesday SingaporeJoe Nguyen
 
Blockchain Concept Development by Shakur Brooks
Blockchain Concept Development by Shakur BrooksBlockchain Concept Development by Shakur Brooks
Blockchain Concept Development by Shakur Brooksblockchaininsider
 
Anomaly detection Workshop slides
Anomaly detection Workshop slidesAnomaly detection Workshop slides
Anomaly detection Workshop slidesQuantUniversity
 
Mint.com Pre-Launch Pitch Deck
Mint.com Pre-Launch Pitch DeckMint.com Pre-Launch Pitch Deck
Mint.com Pre-Launch Pitch DeckHiten Shah
 
Who Or What Is Your Competition – And What
Who Or What Is Your Competition – And WhatWho Or What Is Your Competition – And What
Who Or What Is Your Competition – And WhatSRMS
 
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...Bonnie Aumann
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxYury Leonychev
 
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?Aggregage
 
Mobile - the next wave of opportunities and challenges
Mobile - the next wave of opportunities and challengesMobile - the next wave of opportunities and challenges
Mobile - the next wave of opportunities and challengesAnuradha Weeraman
 
Ruputation managment.pptx
Ruputation managment.pptxRuputation managment.pptx
Ruputation managment.pptxpoovendhirannv1
 
SEO Attribution for Dummies - Webmarketing123 webinar slides
SEO Attribution for Dummies - Webmarketing123 webinar slidesSEO Attribution for Dummies - Webmarketing123 webinar slides
SEO Attribution for Dummies - Webmarketing123 webinar slidesDemandWave
 
Digital Marketing Strategy Seminar- Presentation
Digital Marketing Strategy Seminar- PresentationDigital Marketing Strategy Seminar- Presentation
Digital Marketing Strategy Seminar- PresentationRico Buraga
 
ReviewPro ITB Berlin 2013
ReviewPro ITB Berlin 2013ReviewPro ITB Berlin 2013
ReviewPro ITB Berlin 2013ReviewPro
 
Effective Enterprise Markets: What makes them work and why
Effective Enterprise Markets: What makes them work and whyEffective Enterprise Markets: What makes them work and why
Effective Enterprise Markets: What makes them work and whyLisa Beckers
 
Practical dos and don'ts of enterprise prediction markets
Practical dos and don'ts of enterprise prediction marketsPractical dos and don'ts of enterprise prediction markets
Practical dos and don'ts of enterprise prediction marketsKM Chicago
 
Netvibes for Financial Services
Netvibes for Financial ServicesNetvibes for Financial Services
Netvibes for Financial ServicesNetvibes
 
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' Data
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' DataSuper-Boring, Crazy-Important: PCI and Protecting Your Donors' Data
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' DataGreater Giving
 

Ähnlich wie PolarityTrust: measuring Trust and Reputation in Social Networks (20)

Alnemr tm symp-slides
Alnemr tm symp-slidesAlnemr tm symp-slides
Alnemr tm symp-slides
 
Zombie Usability
Zombie UsabilityZombie Usability
Zombie Usability
 
Collusion Detection using Spark on YARN
Collusion Detection using Spark on YARNCollusion Detection using Spark on YARN
Collusion Detection using Spark on YARN
 
comScore Asia Pacific @ Web Wednesday Singapore
comScore Asia Pacific @ Web Wednesday SingaporecomScore Asia Pacific @ Web Wednesday Singapore
comScore Asia Pacific @ Web Wednesday Singapore
 
Blockchain Concept Development by Shakur Brooks
Blockchain Concept Development by Shakur BrooksBlockchain Concept Development by Shakur Brooks
Blockchain Concept Development by Shakur Brooks
 
Anomaly detection Workshop slides
Anomaly detection Workshop slidesAnomaly detection Workshop slides
Anomaly detection Workshop slides
 
Mint.com Pre-Launch Pitch Deck
Mint.com Pre-Launch Pitch DeckMint.com Pre-Launch Pitch Deck
Mint.com Pre-Launch Pitch Deck
 
Who Or What Is Your Competition – And What
Who Or What Is Your Competition – And WhatWho Or What Is Your Competition – And What
Who Or What Is Your Competition – And What
 
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptx
 
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?
 
Mobile - the next wave of opportunities and challenges
Mobile - the next wave of opportunities and challengesMobile - the next wave of opportunities and challenges
Mobile - the next wave of opportunities and challenges
 
Ruputation managment.pptx
Ruputation managment.pptxRuputation managment.pptx
Ruputation managment.pptx
 
SEO Attribution for Dummies - Webmarketing123 webinar slides
SEO Attribution for Dummies - Webmarketing123 webinar slidesSEO Attribution for Dummies - Webmarketing123 webinar slides
SEO Attribution for Dummies - Webmarketing123 webinar slides
 
Digital Marketing Strategy Seminar- Presentation
Digital Marketing Strategy Seminar- PresentationDigital Marketing Strategy Seminar- Presentation
Digital Marketing Strategy Seminar- Presentation
 
ReviewPro ITB Berlin 2013
ReviewPro ITB Berlin 2013ReviewPro ITB Berlin 2013
ReviewPro ITB Berlin 2013
 
Effective Enterprise Markets: What makes them work and why
Effective Enterprise Markets: What makes them work and whyEffective Enterprise Markets: What makes them work and why
Effective Enterprise Markets: What makes them work and why
 
Practical dos and don'ts of enterprise prediction markets
Practical dos and don'ts of enterprise prediction marketsPractical dos and don'ts of enterprise prediction markets
Practical dos and don'ts of enterprise prediction markets
 
Netvibes for Financial Services
Netvibes for Financial ServicesNetvibes for Financial Services
Netvibes for Financial Services
 
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' Data
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' DataSuper-Boring, Crazy-Important: PCI and Protecting Your Donors' Data
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' Data
 

Kürzlich hochgeladen

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Kürzlich hochgeladen (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

PolarityTrust: measuring Trust and Reputation in Social Networks

  • 1. escuela técnica superior de ingeniería informática PolarityTrust: measuring Trust and Reputation in Social Networks F. Javier Ortega javierortega@us.es José A. Troyano troyano@us.es Fermín L. Cruz fcruz@us.es Fernando Enríquez de Salamanca fenros@us.es Departamento de Lenguajes y Sistemas Informáticos
  • 4. Motivation How can I make the most from these transactions? Selling more products but cheaper? Selling rare (and maybe expensive) articles? Free shipping? How can I choose the best seller? The one with highest amount of sales? The one with most positive opinions? The cheapest one?
  • 5. Motivation ♦ Δ Reputation => Δ Sales ♦ Gaining high reputation: ● Obtain (false) positive opinions from other accounts (not neccesarily other users). ● Sell some bargains to obtain high reputation from the buyers. ● Give negative opinions for sellers that can be competitors.
  • 6. Motivation ♦ Goals: ● Compute a ranking of users according to their trustworthiness ● Process a network with positive and negative links (opinions) between the nodes (users) ● Avoid the effects of the actions performed by malicious users in order to increase their reputation
  • 8. Introduction ♦ Trust and Reputation Systems (TRS) manage trustworthiness of users in social networks. ♦ Common mechanisms: ● Moderators (on-line forums) ● Votes from users to users (eBay) ● Karma (Slashdot, Meneame) ● Graph-based ranking algorithms (EigenTrust)
  • 9. Introduction ♦ Users feedback needed! ♦ Problems: ● Positive bias ● Incentives for users feedback ● Cold-start problem ● Exit problem ● Duplicity of identities
  • 10. Introduction ♦ Malicious users strategies to gain high reputation: ♦ Orchestrated attacks: Obtaining positive opinions from other accounts (not neccesarily other users). ♦ Camouflage behind good behavior: selling some bargains to obtain high reputation from the buyers. ♦ Malicious spies: using a honest account to provide positive opinions to a malicious user. ♦ Camouflage behind judgments: giving negative opinions from seller that can be competitors.
  • 11. Introduction ♦ Malicious users strategies to gain high reputation: ♦ Orchestrated attacks: Obtaining positive opinions from other accounts (not neccesarily other users). 6 1 7 2 0 3 9 5 8 4
  • 12. Introduction ♦ Malicious users strategies to gain high reputation: ♦ Camouflage behind good behavior: selling some bargains to obtain high reputation from the buyers. 6 1 7 2 0 3 9 5 8 4
  • 13. Introduction ♦ Malicious users strategies to gain high reputation: ♦ Malicious spies: using a honest account to provide positive opinions to a malicious user. 6 1 7 2 0 3 9 8 4 5
  • 14. Introduction ♦ Malicious users strategies to gain high reputation: ♦ Camouflage behind judgments: giving negative opinions from seller that can be competitors. 6 1 7 2 0 3 9 5 8 4
  • 15. PolarityTrust ♦ Graph-based ranking algorithm ♦ Two scores for each node: PT⁺ and PT⁻ ♦ Propagation of trust and distrust over the network ♦ PT⁺ and PT⁻ influence each other depending on the polarity of the links between a node and its neighbours.
  • 16. PolarityTrust ♦ Propagation mechanism: ● Given a set of trustworthy users ● Their PT⁺ and PT⁻ scores are propagated to their neighbours, and so on. 6 1 7 2 0 3 9 5 8 4
  • 17. PolarityTrust ♦ Propagation rules: ● Positive opinions => direct relation between scores ● Negative opinions => cross relation between scores ♦ Non-negative Propagation extension: ● Avoid the propagation of negative opinions from negative users b b a a c c
  • 18. Evaluation ♦ Baselines: ● EigenTrust ● Fans Minus Freaks ♦ Dataset: ● Randomly generated graphs: Barabasi and Albert model. ● Malicious users added in order to perform common attacks ♦ Evaluation metrics: ● Number of inversions: bad users in good positions ● Incremental number of bad nodes
  • 19. Evaluation ♦ Performance against common attacks: Models ET FmF PT PT+NN Models ET FmF PT PT+NN A 50 0 0 0 A 50 0 0 0 B 197 36 0 0 B 197 36 0 0 C 63 207 94 94 B+C 155 873 27 27 D 86 9 9 9 B+C+D 169 871 26 26 E 74 4 0 0 B+C+D+E 183 849 38 36 A: No attacks B: Orchestrated attacks C: Camouflage behind good behaviour D: Malicious Spies E: Camouflage behind judgments
  • 20. Evaluation ♦ Performance against incremental number of malicious users: