Friends or Foes: Distributed and Randomized Algorithms to Determine Dishonest Recommenders in Online Social Networks

Viral marketing is becoming important due to the popularity of online social networks (OSNs). Companies may provide incentives (e.g., via free samples of a product) to a small group of users in an OSN, and these users provide recommendations to their friends, which eventually increases the overall sales of a given product. Nevertheless, this also opens a door for malicious behaviors: dishonest users may intentionally give misleading recommendations to their friends so as to distort the normal sales distribution. In this paper, we propose a detection framework to identify dishonest users in the OSNs. In particular, we present a set of fully distributed and randomized algorithms, and also quantify the performance of the algorithms by deriving probability of false positive, probability of false negative, and the distribution of number of detection rounds. Extensive simulations are also carried out to illustrate the impact of misleading recommendations and the effectiveness of our detection algorithms. The methodology we present here will enhance the security level of viral marketing in the OSNs.

[1]  N. Matloff,et al.  Message R eaper : Using Social Behavior to Reduce Malicious Activity in Networks , 2008 .

[2]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[3]  Baochun Li,et al.  Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.

[4]  Vladimiro Sassone,et al.  A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..

[5]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[6]  Matthew Richardson,et al.  Mining knowledge-sharing sites for viral marketing , 2002, KDD.

[7]  Athanasios V. Vasilakos,et al.  BASA: building mobile Ad-Hoc social networks on top of android , 2014, IEEE Network.

[8]  Martin Ester,et al.  A matrix factorization technique with trust propagation for recommendation in social networks , 2010, RecSys '10.

[9]  John S. Baras,et al.  Malicious Users in Unstructured Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[10]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[11]  Jure Leskovec,et al.  Microscopic evolution of social networks , 2008, KDD.

[12]  Ben Y. Zhao,et al.  Multi-scale dynamics in a massive online social network , 2012, Internet Measurement Conference.

[13]  John C. S. Lui,et al.  On Modeling Product Advertisement in Large-Scale Online Social Networks , 2012, IEEE/ACM Transactions on Networking.

[14]  Jon M. Kleinberg,et al.  Feedback effects between similarity and social influence in online communities , 2008, KDD.

[15]  Stephen Weeks,et al.  Understanding trust management systems , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[16]  John Riedl,et al.  Is seeing believing?: how recommender system interfaces affect users' opinions , 2003, CHI '03.

[17]  Donald F. Towsley,et al.  On distinguishing between Internet power law topology generators , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[18]  Jure Leskovec,et al.  The dynamics of viral marketing , 2005, EC '06.

[19]  Daqiang Zhang,et al.  NextCell: Predicting Location Using Social Interplay from Cell Phone Traces , 2015, IEEE Transactions on Computers.

[20]  Mahmudur Rahman,et al.  Turning the Tide: Curbing Deceptive Yelp Behaviors , 2014, SDM.

[21]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[22]  Gediminas Adomavicius,et al.  Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions , 2005, IEEE Transactions on Knowledge and Data Engineering.

[23]  John C. S. Lui,et al.  Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems , 2010, Perform. Evaluation.

[24]  Abhinav Kumar,et al.  Spotting opinion spammers using behavioral footprints , 2013, KDD.

[25]  Arjun Mukherjee,et al.  Exploiting Burstiness in Reviews for Review Spammer Detection , 2021, ICWSM.

[26]  Wolfgang Nejdl,et al.  Preventing shilling attacks in online recommender systems , 2005, WIDM '05.

[27]  Jennifer Golbeck,et al.  The dynamics of Web-based social networks: Membership, relationships, and change , 2007, First Monday.

[28]  John C. S. Lui,et al.  Epidemic Attacks in Network-Coding-Enabled Wireless Mesh Networks: Detection, Identification, and Evaluation , 2013, IEEE Transactions on Mobile Computing.

[29]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.

[30]  John C. S. Lui,et al.  Mathematical Modeling of Advertisement and Influence Spread in Social Networks , 2009 .

[31]  Mogens Nielsen,et al.  Trust structures , 2007, International Journal of Information Security.

[32]  Jacob Goldenberg,et al.  Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .

[33]  Wei Chen,et al.  Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.