Mitigating the Malicious Trust Expansion in Social Network Service

With the growth of Social Network Service(SNS), the trust that plays the role of connecting people brings both good user experience and threat. Trust expansion is not only the means by which the SNS users construct their social network , but also exploited by the attackers to collect victims. Hence, it is desirable to find the differences between malicious and normal behaviors. In this paper we analyze the malicious trust expansion behavior and notice that the behavior feature of the malicious users is their weakness. We present the detailed analysis and propose a creative trust control strategy to restrict the malicious users, which fully exploit the characteristic of SNS. The conclusions are positively supported by simulation and experiment in a real SNS scenario.

[1]  James A. Hendler,et al.  Inferring binary trust relationships in Web-based social networks , 2006, TOIT.

[2]  Morteza Amini,et al.  Trust Inference in Web-Based Social Networks Using Resistive Networks , 2008, 2008 Third International Conference on Internet and Web Applications and Services.

[3]  Georgia Koutrika,et al.  Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges , 2007, IEEE Internet Computing.

[4]  Kevin Borders,et al.  Social networks and context-aware spam , 2008, CSCW.

[5]  Jennifer Golbeck,et al.  Inferring Trust Relationships in Web-Based Social Networks , 2006 .

[6]  Miguel Castro,et al.  Defending against eclipse attacks on overlay networks , 2004, EW 11.

[7]  Anna Cinzia Squicciarini,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Collective Privacy Management in Social Networks , 2022 .

[8]  Mikhail J. Atallah,et al.  Attribute-Based Access Control with Hidden Policies and Hidden Credentials , 2006, IEEE Transactions on Computers.

[9]  Georg Lausen,et al.  Propagation Models for Trust and Distrust in Social Networks , 2005, Inf. Syst. Frontiers.

[10]  Krishna P. Gummadi,et al.  On the evolution of user interaction in Facebook , 2009, WOSN '09.

[11]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[12]  David S. Rosenblum,et al.  What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.

[13]  Yingjiu Li,et al.  An attribute-based access matrix model , 2005, SAC '05.

[14]  Calton Pu,et al.  Social Honeypots: Making Friends With A Spammer Near You , 2008, CEAS.

[15]  Atul Singh,et al.  Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.