Trust exploitation and attention competition: A game theoretical model

The proliferation of Social Network Sites (SNSs) has greatly reformed the way of information dissemination, but also provided a new venue for hosts with impure motivations to disseminate malicious information. Social trust is the basis for information dissemination in SNSs. Malicious nodes judiciously and dynamically make the balance between maintaining its social trust and selfishly maximizing its malicious gain over a long time-span. Studying the optimal response strategies for each malicious node could assist to design the best system maneuver so as to achieve the targeted level of overall malicious activities. In this paper, we propose an interaction-based social trust model, and formulate the maximization of long-term malicious gains of multiple competing nodes as a non-cooperative differential game. Through rigorous analysis, optimal response strategies are identified and the best system maneuver mechanism is presented. Extensive numerical studies further verify the analytical results.

[1]  S. Jørgensen A survey of some differential games in advertising , 1982 .

[2]  Kim C. Border,et al.  Fixed point theorems with applications to economics and game theory: Fixed point theorems for correspondences , 1985 .

[3]  Luca Lambertini,et al.  A differential oligopoly game with differentiated goods and sticky prices , 2007, Eur. J. Oper. Res..

[4]  Piet Van Mieghem,et al.  Protecting Against Network Infections: A Game Theoretic Perspective , 2009, IEEE INFOCOM 2009.

[5]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[6]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[7]  Dawn Xiaodong Song,et al.  Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.

[8]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[9]  Konstantin Beznosov,et al.  The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.

[10]  Quanyan Zhu,et al.  Game-theoretic analysis of node capture and cloning attack with multiple attackers in wireless sensor networks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[11]  Donald F. Towsley,et al.  How to Optimally allocate your budget of attention in social networks , 2013, 2013 Proceedings IEEE INFOCOM.

[12]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.

[13]  Cécile Paris,et al.  A survey of trust in social networks , 2013, CSUR.

[14]  Prasant Mohapatra,et al.  Provenance logic: Enabling multi-event based trust in mobile sensing , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[15]  Prasant Mohapatra,et al.  Dynamic defense strategy against advanced persistent threat with insiders , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[16]  Prasant Mohapatra,et al.  Stealthy attacks meets insider threats: A three-player game model , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[17]  Ananthram Swami,et al.  Stealthy attacks with insider information: A game theoretic model with asymmetric feedback , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.