SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
escuela técnica superior
                                       de ingeniería informática




PolarityTrust: measuring Trust and
  Reputation in Social Networks
                                  F. Javier Ortega
                                  javierortega@us.es
                                   José A. Troyano
                                     troyano@us.es
                                    Fermín L. Cruz
                                       fcruz@us.es
                           Fernando Enríquez de Salamanca
                                      fenros@us.es



             Departamento de
             Lenguajes y Sistemas Informáticos
Motivation

♦ Example: on-line marketplaces
Motivation
Motivation

                    How can I make the most from these
                    transactions?

                    Selling more products but cheaper?
                    Selling rare (and maybe expensive) articles?
                    Free shipping?




   How can I choose the best seller?

   The one with highest amount of sales?
   The one with most positive opinions?
   The cheapest one?
Motivation

             ♦ Δ Reputation => Δ Sales

             ♦ Gaining high reputation:

              ●
                  Obtain (false) positive opinions from
                  other accounts (not neccesarily
                  other users).
              ●
                  Sell some bargains to obtain high
                  reputation from the buyers.
              ●
                  Give negative opinions for sellers that
                  can be competitors.
Motivation


♦ Goals:
  ●
      Compute a ranking of users according to their
      trustworthiness

  ●
      Process a network with positive and negative links
      (opinions) between the nodes (users)

  ●
      Avoid the effects of the actions performed by malicious
      users in order to increase their reputation
Roadmap


♦ Introduction

♦ PolarityTrust

♦ Evaluation

♦ Conclusions
Introduction


♦ Trust and Reputation Systems (TRS) manage
  trustworthiness of users in social networks.

♦ Common mechanisms:
  ●
      Moderators (on-line forums)
  ●
      Votes from users to users (eBay)
  ●
      Karma (Slashdot, Meneame)
  ●
      Graph-based ranking algorithms (EigenTrust)
Introduction

♦ Users feedback needed!

♦ Problems:
  ●
      Positive bias
  ●
      Incentives for users feedback
  ●
      Cold-start problem
  ●
      Exit problem
  ●
      Duplicity of identities
Introduction

♦ Malicious users strategies to gain high reputation:
            ♦ Orchestrated attacks: Obtaining positive
              opinions from other accounts (not neccesarily
              other users).

            ♦ Camouflage behind good behavior: selling
              some bargains to obtain high reputation from
              the buyers.

            ♦ Malicious spies: using a honest account to
              provide positive opinions to a malicious user.

            ♦ Camouflage behind judgments: giving
              negative opinions from seller that can be
              competitors.
Introduction

♦ Malicious users strategies to gain high reputation:
            ♦ Orchestrated attacks: Obtaining positive
              opinions from other accounts (not neccesarily
              other users).



                                                     6
                       1                     7
                           2

               0                   3
                                                         9

                               5                 8
                   4
Introduction

♦ Malicious users strategies to gain high reputation:
            ♦ Camouflage behind good behavior: selling
              some bargains to obtain high reputation from
              the buyers.



                                                     6
                       1                    7
                           2

               0                   3
                                                         9

                               5                 8
                   4
Introduction

♦ Malicious users strategies to gain high reputation:
            ♦ Malicious spies: using a honest account to
              provide positive opinions to a malicious user.




                                                        6
                       1                       7
                           2

               0               3
                                                            9

                                                    8
                   4                 5
Introduction

♦ Malicious users strategies to gain high reputation:
            ♦ Camouflage behind judgments: giving
              negative opinions from seller that can be
              competitors.



                                                     6
                      1                     7
                          2

              0                   3
                                                          9

                              5                  8
                  4
PolarityTrust

♦ Graph-based ranking algorithm

♦ Two scores for each node: PT⁺ and PT⁻

♦ Propagation of trust and distrust over the network

♦ PT⁺ and PT⁻ influence each other depending on the
  polarity of the links between a node and its
  neighbours.
PolarityTrust

♦ Propagation mechanism:
  ●
      Given a set of trustworthy users
  ●
      Their PT⁺ and PT⁻ scores are propagated to their
      neighbours, and so on.



                                                 6
                  1                     7
                      2

          0                   3
                                                     9

                          5                  8
              4
PolarityTrust

♦ Propagation rules:
  ●
      Positive opinions => direct relation between scores
  ●
      Negative opinions => cross relation between scores

♦ Non-negative Propagation extension:
  ●
      Avoid the propagation of negative opinions from negative
      users

                      b                           b

           a                            a

                      c                           c
Evaluation

♦ Baselines:
  ●
      EigenTrust
  ●
      Fans Minus Freaks


♦ Dataset:
  ●
      Randomly generated graphs: Barabasi and Albert model.
  ●
      Malicious users added in order to perform common attacks


♦ Evaluation metrics:
  ●
      Number of inversions: bad users in good positions
  ●
      Incremental number of bad nodes
Evaluation

♦ Performance against common attacks:

 Models   ET    FmF   PT    PT+NN        Models      ET     FmF   PT   PT+NN

   A      50     0    0        0            A        50      0    0      0

   B      197   36    0        0            B        197    36    0      0

   C      63    207   94      94           B+C       155    873   27    27

   D      86     9    9        9         B+C+D       169    871   26    26

   E      74     4    0        0        B+C+D+E      183    849   38    36



                      A: No attacks
                      B: Orchestrated attacks
                      C: Camouflage behind good behaviour
                      D: Malicious Spies
                      E: Camouflage behind judgments
Evaluation

♦ Performance against incremental number of malicious users:
Conclusions

♦ Something

Contenu connexe

En vedette

Non sanità elettronica, solamente sanità migliore: to do list
Non sanità elettronica, solamente sanità migliore: to do listNon sanità elettronica, solamente sanità migliore: to do list
Non sanità elettronica, solamente sanità migliore: to do listSergio Pillon
 
Relative pronouns
Relative pronounsRelative pronouns
Relative pronounsafandi45
 
Clubstrozdemo
ClubstrozdemoClubstrozdemo
Clubstrozdemorandtke
 
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSN
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSNLa telemedicina nelle ferite difficili: un servizio attivi da anni nel SSN
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSNSergio Pillon
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
Security and Trust in social media networks
Security and Trust in social media networksSecurity and Trust in social media networks
Security and Trust in social media networksTouradj Ebrahimi
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Social networks and security
Social networks and securitySocial networks and security
Social networks and securityARICT
 
Cyber security on social networks
Cyber security on social networksCyber security on social networks
Cyber security on social networksDev Nair
 
Invited talk at Future Networked Technologies / FIT-IT research calls opening...
Invited talk at Future Networked Technologies / FIT-IT research calls opening...Invited talk at Future Networked Technologies / FIT-IT research calls opening...
Invited talk at Future Networked Technologies / FIT-IT research calls opening...Paolo Massa
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
How to Build Trust in Social Networks - The 4 As
How to Build Trust in Social Networks - The 4 AsHow to Build Trust in Social Networks - The 4 As
How to Build Trust in Social Networks - The 4 AsGavin Heaton
 
Ankit kansara portfolio 2011
Ankit kansara   portfolio 2011Ankit kansara   portfolio 2011
Ankit kansara portfolio 2011AnkitKansara
 
Security on social networks AVAST
Security on social networks AVASTSecurity on social networks AVAST
Security on social networks AVASTJulia Szymańska
 
PhD Thesis presentation
PhD Thesis presentationPhD Thesis presentation
PhD Thesis presentationJavier Ortega
 
Human Security
Human SecurityHuman Security
Human Securityotter1984
 
Security Aspects of Social Networks at Campus Party 2010
Security Aspects of Social Networks at Campus Party 2010Security Aspects of Social Networks at Campus Party 2010
Security Aspects of Social Networks at Campus Party 2010Anchises Moraes
 

En vedette (20)

Non sanità elettronica, solamente sanità migliore: to do list
Non sanità elettronica, solamente sanità migliore: to do listNon sanità elettronica, solamente sanità migliore: to do list
Non sanità elettronica, solamente sanità migliore: to do list
 
Lista empleados
Lista empleadosLista empleados
Lista empleados
 
Tugas 2 tik
Tugas 2 tikTugas 2 tik
Tugas 2 tik
 
Relative pronouns
Relative pronounsRelative pronouns
Relative pronouns
 
Clubstrozdemo
ClubstrozdemoClubstrozdemo
Clubstrozdemo
 
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSN
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSNLa telemedicina nelle ferite difficili: un servizio attivi da anni nel SSN
La telemedicina nelle ferite difficili: un servizio attivi da anni nel SSN
 
Telemedicina 2012
Telemedicina 2012Telemedicina 2012
Telemedicina 2012
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Security and Trust in social media networks
Security and Trust in social media networksSecurity and Trust in social media networks
Security and Trust in social media networks
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Social networks and security
Social networks and securitySocial networks and security
Social networks and security
 
Cyber security on social networks
Cyber security on social networksCyber security on social networks
Cyber security on social networks
 
Invited talk at Future Networked Technologies / FIT-IT research calls opening...
Invited talk at Future Networked Technologies / FIT-IT research calls opening...Invited talk at Future Networked Technologies / FIT-IT research calls opening...
Invited talk at Future Networked Technologies / FIT-IT research calls opening...
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
How to Build Trust in Social Networks - The 4 As
How to Build Trust in Social Networks - The 4 AsHow to Build Trust in Social Networks - The 4 As
How to Build Trust in Social Networks - The 4 As
 
Ankit kansara portfolio 2011
Ankit kansara   portfolio 2011Ankit kansara   portfolio 2011
Ankit kansara portfolio 2011
 
Security on social networks AVAST
Security on social networks AVASTSecurity on social networks AVAST
Security on social networks AVAST
 
PhD Thesis presentation
PhD Thesis presentationPhD Thesis presentation
PhD Thesis presentation
 
Human Security
Human SecurityHuman Security
Human Security
 
Security Aspects of Social Networks at Campus Party 2010
Security Aspects of Social Networks at Campus Party 2010Security Aspects of Social Networks at Campus Party 2010
Security Aspects of Social Networks at Campus Party 2010
 

Similaire à PolarityTrust: measuring Trust and Reputation in Social Networks

Alnemr tm symp-slides
Alnemr tm symp-slidesAlnemr tm symp-slides
Alnemr tm symp-slidesRehab Alnemr
 
Collusion Detection using Spark on YARN
Collusion Detection using Spark on YARNCollusion Detection using Spark on YARN
Collusion Detection using Spark on YARNDataWorks Summit
 
comScore Asia Pacific @ Web Wednesday Singapore
comScore Asia Pacific @ Web Wednesday SingaporecomScore Asia Pacific @ Web Wednesday Singapore
comScore Asia Pacific @ Web Wednesday SingaporeJoe Nguyen
 
Blockchain Concept Development by Shakur Brooks
Blockchain Concept Development by Shakur BrooksBlockchain Concept Development by Shakur Brooks
Blockchain Concept Development by Shakur Brooksblockchaininsider
 
Anomaly detection Workshop slides
Anomaly detection Workshop slidesAnomaly detection Workshop slides
Anomaly detection Workshop slidesQuantUniversity
 
Mint.com Pre-Launch Pitch Deck
Mint.com Pre-Launch Pitch DeckMint.com Pre-Launch Pitch Deck
Mint.com Pre-Launch Pitch DeckHiten Shah
 
Who Or What Is Your Competition – And What
Who Or What Is Your Competition – And WhatWho Or What Is Your Competition – And What
Who Or What Is Your Competition – And WhatSRMS
 
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...Bonnie Aumann
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxYury Leonychev
 
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?Aggregage
 
Mobile - the next wave of opportunities and challenges
Mobile - the next wave of opportunities and challengesMobile - the next wave of opportunities and challenges
Mobile - the next wave of opportunities and challengesAnuradha Weeraman
 
Ruputation managment.pptx
Ruputation managment.pptxRuputation managment.pptx
Ruputation managment.pptxpoovendhirannv1
 
SEO Attribution for Dummies - Webmarketing123 webinar slides
SEO Attribution for Dummies - Webmarketing123 webinar slidesSEO Attribution for Dummies - Webmarketing123 webinar slides
SEO Attribution for Dummies - Webmarketing123 webinar slidesDemandWave
 
Digital Marketing Strategy Seminar- Presentation
Digital Marketing Strategy Seminar- PresentationDigital Marketing Strategy Seminar- Presentation
Digital Marketing Strategy Seminar- PresentationRico Buraga
 
ReviewPro ITB Berlin 2013
ReviewPro ITB Berlin 2013ReviewPro ITB Berlin 2013
ReviewPro ITB Berlin 2013ReviewPro
 
Effective Enterprise Markets: What makes them work and why
Effective Enterprise Markets: What makes them work and whyEffective Enterprise Markets: What makes them work and why
Effective Enterprise Markets: What makes them work and whyLisa Beckers
 
Practical dos and don'ts of enterprise prediction markets
Practical dos and don'ts of enterprise prediction marketsPractical dos and don'ts of enterprise prediction markets
Practical dos and don'ts of enterprise prediction marketsKM Chicago
 
Netvibes for Financial Services
Netvibes for Financial ServicesNetvibes for Financial Services
Netvibes for Financial ServicesNetvibes
 
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' Data
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' DataSuper-Boring, Crazy-Important: PCI and Protecting Your Donors' Data
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' DataGreater Giving
 

Similaire à PolarityTrust: measuring Trust and Reputation in Social Networks (20)

Alnemr tm symp-slides
Alnemr tm symp-slidesAlnemr tm symp-slides
Alnemr tm symp-slides
 
Zombie Usability
Zombie UsabilityZombie Usability
Zombie Usability
 
Collusion Detection using Spark on YARN
Collusion Detection using Spark on YARNCollusion Detection using Spark on YARN
Collusion Detection using Spark on YARN
 
comScore Asia Pacific @ Web Wednesday Singapore
comScore Asia Pacific @ Web Wednesday SingaporecomScore Asia Pacific @ Web Wednesday Singapore
comScore Asia Pacific @ Web Wednesday Singapore
 
Blockchain Concept Development by Shakur Brooks
Blockchain Concept Development by Shakur BrooksBlockchain Concept Development by Shakur Brooks
Blockchain Concept Development by Shakur Brooks
 
Anomaly detection Workshop slides
Anomaly detection Workshop slidesAnomaly detection Workshop slides
Anomaly detection Workshop slides
 
Mint.com Pre-Launch Pitch Deck
Mint.com Pre-Launch Pitch DeckMint.com Pre-Launch Pitch Deck
Mint.com Pre-Launch Pitch Deck
 
Who Or What Is Your Competition – And What
Who Or What Is Your Competition – And WhatWho Or What Is Your Competition – And What
Who Or What Is Your Competition – And What
 
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...
Philly ETE - Are Your Developers Bull$h!tt!ng You? And why that's the wrong q...
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptx
 
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?
Negative Reviews & Online Feedback Happens - But Where Do You Go From Here?
 
Mobile - the next wave of opportunities and challenges
Mobile - the next wave of opportunities and challengesMobile - the next wave of opportunities and challenges
Mobile - the next wave of opportunities and challenges
 
Ruputation managment.pptx
Ruputation managment.pptxRuputation managment.pptx
Ruputation managment.pptx
 
SEO Attribution for Dummies - Webmarketing123 webinar slides
SEO Attribution for Dummies - Webmarketing123 webinar slidesSEO Attribution for Dummies - Webmarketing123 webinar slides
SEO Attribution for Dummies - Webmarketing123 webinar slides
 
Digital Marketing Strategy Seminar- Presentation
Digital Marketing Strategy Seminar- PresentationDigital Marketing Strategy Seminar- Presentation
Digital Marketing Strategy Seminar- Presentation
 
ReviewPro ITB Berlin 2013
ReviewPro ITB Berlin 2013ReviewPro ITB Berlin 2013
ReviewPro ITB Berlin 2013
 
Effective Enterprise Markets: What makes them work and why
Effective Enterprise Markets: What makes them work and whyEffective Enterprise Markets: What makes them work and why
Effective Enterprise Markets: What makes them work and why
 
Practical dos and don'ts of enterprise prediction markets
Practical dos and don'ts of enterprise prediction marketsPractical dos and don'ts of enterprise prediction markets
Practical dos and don'ts of enterprise prediction markets
 
Netvibes for Financial Services
Netvibes for Financial ServicesNetvibes for Financial Services
Netvibes for Financial Services
 
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' Data
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' DataSuper-Boring, Crazy-Important: PCI and Protecting Your Donors' Data
Super-Boring, Crazy-Important: PCI and Protecting Your Donors' Data
 

Dernier

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Dernier (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

PolarityTrust: measuring Trust and Reputation in Social Networks

  • 1. escuela técnica superior de ingeniería informática PolarityTrust: measuring Trust and Reputation in Social Networks F. Javier Ortega javierortega@us.es José A. Troyano troyano@us.es Fermín L. Cruz fcruz@us.es Fernando Enríquez de Salamanca fenros@us.es Departamento de Lenguajes y Sistemas Informáticos
  • 4. Motivation How can I make the most from these transactions? Selling more products but cheaper? Selling rare (and maybe expensive) articles? Free shipping? How can I choose the best seller? The one with highest amount of sales? The one with most positive opinions? The cheapest one?
  • 5. Motivation ♦ Δ Reputation => Δ Sales ♦ Gaining high reputation: ● Obtain (false) positive opinions from other accounts (not neccesarily other users). ● Sell some bargains to obtain high reputation from the buyers. ● Give negative opinions for sellers that can be competitors.
  • 6. Motivation ♦ Goals: ● Compute a ranking of users according to their trustworthiness ● Process a network with positive and negative links (opinions) between the nodes (users) ● Avoid the effects of the actions performed by malicious users in order to increase their reputation
  • 8. Introduction ♦ Trust and Reputation Systems (TRS) manage trustworthiness of users in social networks. ♦ Common mechanisms: ● Moderators (on-line forums) ● Votes from users to users (eBay) ● Karma (Slashdot, Meneame) ● Graph-based ranking algorithms (EigenTrust)
  • 9. Introduction ♦ Users feedback needed! ♦ Problems: ● Positive bias ● Incentives for users feedback ● Cold-start problem ● Exit problem ● Duplicity of identities
  • 10. Introduction ♦ Malicious users strategies to gain high reputation: ♦ Orchestrated attacks: Obtaining positive opinions from other accounts (not neccesarily other users). ♦ Camouflage behind good behavior: selling some bargains to obtain high reputation from the buyers. ♦ Malicious spies: using a honest account to provide positive opinions to a malicious user. ♦ Camouflage behind judgments: giving negative opinions from seller that can be competitors.
  • 11. Introduction ♦ Malicious users strategies to gain high reputation: ♦ Orchestrated attacks: Obtaining positive opinions from other accounts (not neccesarily other users). 6 1 7 2 0 3 9 5 8 4
  • 12. Introduction ♦ Malicious users strategies to gain high reputation: ♦ Camouflage behind good behavior: selling some bargains to obtain high reputation from the buyers. 6 1 7 2 0 3 9 5 8 4
  • 13. Introduction ♦ Malicious users strategies to gain high reputation: ♦ Malicious spies: using a honest account to provide positive opinions to a malicious user. 6 1 7 2 0 3 9 8 4 5
  • 14. Introduction ♦ Malicious users strategies to gain high reputation: ♦ Camouflage behind judgments: giving negative opinions from seller that can be competitors. 6 1 7 2 0 3 9 5 8 4
  • 15. PolarityTrust ♦ Graph-based ranking algorithm ♦ Two scores for each node: PT⁺ and PT⁻ ♦ Propagation of trust and distrust over the network ♦ PT⁺ and PT⁻ influence each other depending on the polarity of the links between a node and its neighbours.
  • 16. PolarityTrust ♦ Propagation mechanism: ● Given a set of trustworthy users ● Their PT⁺ and PT⁻ scores are propagated to their neighbours, and so on. 6 1 7 2 0 3 9 5 8 4
  • 17. PolarityTrust ♦ Propagation rules: ● Positive opinions => direct relation between scores ● Negative opinions => cross relation between scores ♦ Non-negative Propagation extension: ● Avoid the propagation of negative opinions from negative users b b a a c c
  • 18. Evaluation ♦ Baselines: ● EigenTrust ● Fans Minus Freaks ♦ Dataset: ● Randomly generated graphs: Barabasi and Albert model. ● Malicious users added in order to perform common attacks ♦ Evaluation metrics: ● Number of inversions: bad users in good positions ● Incremental number of bad nodes
  • 19. Evaluation ♦ Performance against common attacks: Models ET FmF PT PT+NN Models ET FmF PT PT+NN A 50 0 0 0 A 50 0 0 0 B 197 36 0 0 B 197 36 0 0 C 63 207 94 94 B+C 155 873 27 27 D 86 9 9 9 B+C+D 169 871 26 26 E 74 4 0 0 B+C+D+E 183 849 38 36 A: No attacks B: Orchestrated attacks C: Camouflage behind good behaviour D: Malicious Spies E: Camouflage behind judgments
  • 20. Evaluation ♦ Performance against incremental number of malicious users: