首页> 外文学位 >Influence Modeling and Malicious Users Identification in Interactive Networks.
【24h】

Influence Modeling and Malicious Users Identification in Interactive Networks.

机译:交互网络中的影响建模和恶意用户识别。

获取原文
获取原文并翻译 | 示例

摘要

Due to the large population in online social networks and the epidemic spreading of word-of-mouth effect, targeted advertisement which use a small fraction of buyers to attract a large population of buyers is very efficient in viral marketing, for example, companies can provide incentives (e.g., via free samples of a product) to a small group of users in an online social network, and these users can provide recommendations to their friends so as to increase the overall sales of the product. In particular, we consider the following advertisement problem in online social networks: given a fixed advertisement investment, e.g., a number of free samples, a company needs to determine the probability that users in the online social network will eventually purchase the product. To address this problem, we model online social networks as scale-free graphs with/without high clustering coefficient. We employ various influence mechanisms that govern the influence spreading in such large scale networks and use the local mean field technique to analyze them wherein states of nodes can be changed by various influence mechanisms. We carry out extensive simulations to validate our models which can provide insight on designing efficient advertising strategies in online social networks.;Although epidemic spreading of word-of-mouth effect can increase the sales of a product efficiently in viral marketing, it also opens doors for "malicious behaviors": dishonest users may intentionally give wrong recommendations to their friends so as to distort the normal sales distribution. To address this problem, we propose a general detection framework and develop a set of fully distributed detection algorithms to discover dishonest users in online social networks by applying the general detection framework. We consider both cases when dishonest users adopt (1) baseline strategy, and (2) intelligent strategy. We quantify the performance of the detection algorithms by deriving probability of false positive, probability of false negative and distribution function of time needed to detect dishonest users. Extensive simulations are carried out to illustrate the impact of dishonest recommendations and the effectiveness of the detection algorithms.;We also apply the general detection framework to address the problem of pollution attack in wireless mesh networks (WMNs) and peer-to-peer (P2P) streaming networks. Epidemic attack is a severe security problem in network-coding enabled wireless mesh networks, and malicious nodes can easily launch such form of attack to create an epidemic spreading of polluted packets and deplete network resources. The general detection framework can also be applied to address such security problem. Specifically, we employ the time-based checksum and batch verification to determine the existence of polluted packets, then propose a set of fully distributed detection algorithms. We also allow the presence of "smart" attackers, i.e., they can pretend to be legitimate nodes to probabilistically transmit valid packets so as to reduce the chance of being detected. To address the case when attackers cooperatively inject polluted packets and speed up the detection, an enhanced detection algorithm is also developed. Furthermore, we provide formal analysis to quantify the performance of the detection algorithms. At last, simulations and system prototyping are also carried out to validate the theoretic analysis and show the effectiveness and efficiency of the detection algorithms.;To address the problem of pollution attack in P2P streaming networks, which is known to have a disastrous effect on existing P2P infrastructures, e.g., it can reduce the number of legitimate users by as much as 85%, we also propose distributed detection algorithms to identify pollution attackers by applying the general framework. Moreover, we provide theoretical analysis to quantify the performance of the detection algorithms so as to show their effectiveness and efficiency.
机译:由于在线社交网络上的人口众多以及口碑效应的流行,使用少量购买者吸引大量购买者的定向广告在病毒式营销中非常有效,例如,公司可以提供鼓励(例如,通过产品的免费样品)在线社交网络中的一小群用户,这些用户可以向其朋友提供推荐,以增加产品的整体销量。特别地,我们考虑在线社交网络中的以下广告问题:给定固定的广告投资,例如,大量免费样本,公司需要确定在线社交网络中的用户最终将购买产品的概率。为了解决这个问题,我们将在线社交网络建模为具有/不具有高聚类系数的无标度图。我们采用各种影响机制来控制在如此大规模的网络中传播的影响,并使用局部平均场技术对其进行分析,其中节点的状态可以通过各种影响机制进行更改。我们进行了广泛的仿真以验证我们的模型,该模型可以为设计在线社交网络中的有效广告策略提供见识。;尽管口碑效应的流行传播可以在病毒性营销中有效地提高产品的销量,但也为人们打开了大门对于“恶意行为”:不诚实的用户可能会故意向其朋友提供错误的建议,从而扭曲正常的销售分布。为了解决这个问题,我们提出了一个通用的检测框架,并开发了一套完全分布式的检测算法,以通过应用通用的检测框架来发现在线社交网络中的不诚实用户。我们考虑不诚实用户采用(1)基准策略和(2)智能策略的两种情况。我们通过推导误报率,误报率和检测不诚实用户所需的时间分布函数来量化检测算法的性能。进行了广泛的仿真,以说明不诚实建议的影响和检测算法的有效性。;我们还将通用检测框架应用于无线网状网络(WMN)和对等(P2P)中的污染攻击问题)流网络。在启用了网络编码的无线网状网络中,流行病攻击是一个严重的安全问题,恶意节点可以轻松地发起这种形式的攻击,从而在流行的情况下传播受污染的数据包并耗尽网络资源。通用检测框架也可以用于解决此类安全问题。具体来说,我们采用基于时间的校验和和批量验证来确定污染数据包的存在,然后提出一套完全分布式的检测算法。我们还允许存在“智能”攻击者,即他们可以假装为合法节点,以概率方式传输有效数据包,从而减少被检测到的机会。为了解决攻击者协作注入受污染的数据包并加快检测速度的情况,还开发了一种增强的检测算法。此外,我们提供形式分析以量化检测算法的性能。最后,通过仿真和系统原型验证了理论分析的有效性,证明了检测算法的有效性和有效性。解决P2P流网络中污染攻击的问题P2P基础设施,例如,它可以减少多达85%的合法用户,我们还提出了分布式检测算法,通过应用通用框架来识别污染攻击者。此外,我们提供了理论分析以量化检测算法的性能,以显示其有效性和效率。

著录项

  • 作者

    Li, Yongkun.;

  • 作者单位

    The Chinese University of Hong Kong (Hong Kong).;

  • 授予单位 The Chinese University of Hong Kong (Hong Kong).;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 174 p.
  • 总页数 174
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号