Davis Social Links Social Network Kernel for Future Internet Design - PowerPoint PPT Presentation

1 / 96
About This Presentation
Title:

Davis Social Links Social Network Kernel for Future Internet Design

Description:

Before the U.S and Iraqi war our client Major Fadi Basem who was with the Iraqi ... with 95% friendships purely based on this game. 22. Friendship requested ... – PowerPoint PPT presentation

Number of Views:32
Avg rating:3.0/5.0
Slides: 97
Provided by: cyrusCs
Category:

less

Transcript and Presenter's Notes

Title: Davis Social Links Social Network Kernel for Future Internet Design


1
Davis Social LinksSocial Network Kernel for
Future Internet Design
Lerone Banks, Prantik Bhattachayya, Matt Spear,
S. Felix Wu, Computer Science, University of
California, Davis http//www.facebook.com/people/
sfelixwu/
2
Internet
SMTP
3
Routable Identity
SMTP
  • Any identity (email address, IP, url) can
    communicate with any one else.
  • Email, web, bittorrent, warcraft, skype

4
FROMMR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho
Branch 171 Shaukiwan Road Hong Kong. Please
contact me on my personal box puicheungcheungpui_at_
yahoo.com Let me start by introducing myself. I
am Mr. Cheung Pui, director of operations of the
Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a
obscured business suggestion for you. Before the
U.S and Iraqi war our client Major Fadi Basem who
was with the Iraqi forces and also business man
made a numbered fixed deposit for 18
calendar months, with a value of Twenty Four
millions Five Hundred Thousand United State
Dollars only in my branch. Upon maturity several
notice was sent to him,
5
(No Transcript)
6
Cost of False Positives
  • Spam-filters have to be conservative
  • We will have some false negatives in our own
    inboxes.
  • We will use our own time to further filter..
  • For me, 12 seconds per email

7
The emails I received typically
8
You have a few seconds to decide
9
To me personally, this is a typical social spam.
10
Oops
11
(No Transcript)
12
11/27 /2007
12/10 /2007
Spammed?
Memoryless For Felix Wu
11/16 /2007
11/26 /2007
In my office
13
SMTP
14
SMTP
15
SMTP
Lerone
Felix
16
Social-Control Routing
SMTP
Internet Applications
3
2
1
17
Social-Control Routing
SMTP
3
2
1
18
Social Network has its potential value in
communication!!
19
Value of the Social Network
  • While Social Network has its own unique value in
    facilitating human communication,
  • A major concern about losing this value
  • while we are unsure about how to quantify the
    true value

20
(No Transcript)
21
Fighters Club
  • A couple millions users
  • A Coalition game like Warcraft
  • Team members who are Facebook friends receive
    higher fighting powers
  • 1400 new friendships established daily
  • 10 of users with gt95 friendships purely based
    on this game.

22
Friendship requested
BTW, this guy stole 24 millions dollars from me
during my DSL demo to Prof. George Kesides from
Penn Stat!
23
Open Issues
  • What is the value of this social network?
  • How would this value be distributed and
    allocated to each individual peers?
  • MySpace, Facebook, LinkedIn didnt define the
    game for network formation and value
    allocation.
  • But, it is important to design the game such that
    the OSN will eventually converge to a state to
    best support the communities.

24
Value of OSN
  • How to leverage the value of Online Social
    Network in Communication?
  • How to architect the Social Network itself such
    that its value can be protected?

25
In this talk
  • We will focus on the centralized architecture
    based on Facebook as the social context provider.

26
SMTP
Lerone
Felix
27
SMTP
Lerone
Felix
Facebook
28
SMTP
Lerone
Felix
Social Context
DSL Kernel
Policy/Reputation-based Route discovery
Facebook
29
SMTP
Lerone
Felix
Social Context
DSL Kernel
Policy/Reputation-based Route discovery
Facebook
30
(No Transcript)
31
SMTP
Wrapper
Lerone
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Policy/Reputation-based Route discovery
Facebook
32
(No Transcript)
33
SMTP
Divert
Existing Applications
Native DSL Applications and Games
Wrapper
Lerone
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Name-ID resolution
Policy/Reputation-based Route discovery
Facebook
DSLoFB
34
SMTP
Divert
Wrapper
Lerone
Felix
Social Context
DSL Kernel
35
A couple issues
  • How to establish the social route?
  • How would A know about D (or Ds identity)
    ?
  • How to maintain this reputation network?
  • KarmaNet A Feed-back Trust Control System

36
Who is Salma?
37
My message to Salma
38
The Social Path(s)
39
Finding
??
B
D
A
C
A2D, while D is McDonalds! D would like
customers to find the right route. idea
keyword propagation e.g., McDonalds
40
(No Transcript)
41
Announcing
B
D
K McDonalds
A
C
Hop-by-hop keyword propagation
42
Announcing
B
D
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation
43
Announcing
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation
44
Announcing
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation And, I know I am
doing FLOODING!!
45
Now Finding
Q McDonalds
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
  • Search Keyword McDonalds
  • A might know Ds keyword via two channels
  • (1) Somebody else (2) From its friends
  • Questions does D need an identity? Scalable?

46
Application Tests
  • Example 1 credential-oriented
  • PKI certificate as the keyword
  • If you can sign or decrypt the message, you are
    the ONE!
  • Example 2 service-oriented
  • Service/protocol/bandwidth support
  • Example 3 offer-oriented
  • Please send me your coupons/promotions!

47
Routable Identity
  • Application identity Mgt Network identity
  • Network identity Rgt Network identity
  • Network identity Mgt Application identity

48
App/Route Identity
  • Application identity Mgt Network identity
  • Network identity Rgt Network identity
  • Network identity Mgt Application identity
  • Keywords (MF-R)gt Multiple Paths
  • Application identity selection
  • Network route selection

49
Scalability - Avoid the Flooding
  • As it is, every keyword will need to be
    propagated to all the nodes/links (but the same
    keyword will be propagated through the same link
    once possibly with different policies).
  • The issue who should receive my keywords?

50
in Community of Davis
??
B
D
A
C
Who should receive the keyword announcement for
McDonalds?
51
as the Social Peer
  • Attributes
  • McDonalds Express, 640 W Covell Blvd, D,
    Davis, (530) 756-8886, Davis Senior High School,
    Community Park, North Davis

52
Per-Keyword Policy
  • For each keyword, we will associate it with a
    propagation policy T, N, A
  • T Trust Value Threshold
  • N Hop counts left to propagate (-1 each step)
  • A Community Attributes
  • Examples
  • gt0.66, 4, Davis K via L1
  • gt0, , K via L2

53
Scalability Controllability
  • McDonalds doesnt want to flood the whole
    network
  • It only wants to multicast to the Target set of
    customers
  • And, it only wants this target set of users being
    able to use that particular keyword to contact.
  • Receiver/owner controllability

54
Social/Community Attributes
??
B
D
A
C
Who should receive the keyword announcement for
McDonalds? Answer
55
Community
??
B
D
A
C
56
Community
  • A connected graph of social nodes sharing a set
    of community attributes

57
Community
??
B
D
A
C
58
Social/Community Attributes
??
B
D
A
C
Who should receive the keyword announcement for
McDonalds? Answer but not ALL
59
Community
??
B
D
A
C
60
Network Formation
??
B
D
A
C
61
Network Formation
??
B
D
A
C
Both A C why would A C be willing to
establish a direct friendship?
62
http
Roughly your friends (or friend2s)
Anybody with an IP address
63
http
Roughly your friends (or friend2s)
Quality of the Friendship may have been out of
control
Anybody with an IP address
64
http
Roughly your friends (or friend2s)
Anybody with an IP address
65
Per-Keyword Policy
  • For each keyword, we will associate it with a
    propagation policy T, N, A
  • T Trust Value Threshold
  • N Hop counts left to propagate (-1 each step)
  • A Community Attributes
  • Examples
  • gt0.66, 4, Davis K via L1
  • gt0, , K via L2

66
One Route path from A to D
Pktagtd
A
B
C
D
End2End Trust is this really from
A? RoutePath Trust Should this path be used?
67
Basic Assumption about the Link
Pktagtd
A
B
C
D
B C have a way to decide whether they should
establish a link between them, and they can
authenticate each other Secure MAC
authentication Social Links in
OSN Reputation-based Authentication Sybil
Attack robustness
68
The Attack Model
  • Does the receiver really like this packet being
    delivered to me over a route path of links
  • Corrupted information
  • Spam
  • An incorrectly E2E-Authenticated packet
  • Malware
  • Assumption the receiver has its own security
    policy to determine whether it like the
    packet/message or not!

69
D decides, and rewards/punishes
Pktcgtd
A
B
C
D
Trust(DgtC)
Trust(CgtB)
Trust(BgtA)
Pktbcd
Pktabc
Pktab
70
Beholder
71
Trust Structure
We want to stabilize these decentralized values
such that they can be used to effectively choose
the best route.
72
Three Trust Values per Relationship
u
v
  • Ta(u,v) u is directly connected to v. How much u
    trusts v?
  • Ainit v, as the initiator, sends a packet to u.
  • Afwd v forwards a packet to u . I.e., v is not
    the initiator of the packet.
  • Art sends a packet to, and, v forwards that
    packet to one of its other neighbors. And, the
    packet eventually reaches the destination.

73
Example
74
(No Transcript)
75
Routing with Trust
76
(No Transcript)
77
Simulation study of 100K nodes
78
1000 nodes, 20 bad
79
1000 nodes, 10/40 bad
80
Increasing the Spammers
81
Problems with this Simple Approach
  • If the attacking node already has a lot of good
    packets (I.e., the value of m is large).
  • If a node was compromised for only a short period
    of time, it might get cut-off from the network
    (I.e., the value of n is large).
  • And, it is not that easy to produce a large
    number of good packets in a short period of time,
    plus the Prob is smaller!

82
Issues on Trust
  • Can we avoid an out-of-band reset?
  • such as Credit-reset
  • The behavior of the network nodes might be very
    dynamic (partially good and bad).
  • There is a trade-off here
  • When the behavior is bad, how fast can our
    reputation system react and response?
  • When the behavior is turning good, how fast can
    we recover its reputation? (or should we?)

83
Random versus Deterministic Cut-off
A
B
Trust(BgtA)
Pktab
84
Four Schemes
  • Counter-based (CB)
  • Credit-based (CR)
  • Forgeting/Aging Factor (FF)
  • Our enhanced version (KarmaNet)

85
Pairwise 1-way Trust
86
(No Transcript)
87
KarmaNet
88
Unbounded Malicious Messages
89
(No Transcript)
90
Model for Trust/Reputation Systems
  • performance and responsiveness to dynamics (of
    trust and reputation)
  • Assuming no oracle or human reset (and we might
    not have ground truth in real-time anyway).
  • operations and management
  • Bounded/unbounded for life-time expected attack
    instances
  • Versus bounded for a fix period of time
  • Probabilistic versus Deterministic

91
DSL is an old idea!
A
B
And, I certainly dont have the answer yet
  • We, as human, have been using similar social
    communication principles. Maybe it is a good
    opportunity to re-think about our cyber
    communication system.
  • Identity is a per-application, context-oriented,
    and sometime relative issue.
  • Forming cyber communities of interests for
    application.

F
A
B
F
F
92
FIND
  • Involving End users
  • Should we move away the traditional model (I.e.,
    the end users have relative little control toward
    the core, even for his/her own traffic)?
  • If yes, how much and what?
  • DSL
  • Decentralized Social Network
  • Community/Keyword oriented
  • Trust/Reputation

93
DSL, Facebook, AL-BGP and GENI
http//www.geni.net/DSLport
AL-BGP over ProtoGENI
Each DSL/FB user should select a closer GENI
entrance as www.geni.net. In other words, we
might need to set up DNS records correctly.
Facebook
94
SMTP
Internet old/new Applications
Social Context
Community Oriented Keywords
Name-ID resolution
DSL Kernel
Policy/Reputation-based Route discovery
3
2
1
95
ISP SCSP(Social Community Service Provider)
SMTP
Internet old/new Applications
3
2
1
96
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com