Leveraging node properties in random walks for robust reputations in decentralized networks

Reputation systems are essential to establish trust and to provide incentives for cooperation among users in decentralized networks. In these systems, the most widely used algorithms for computing reputations are based on random walks. However, in decentralized networks where nodes have only a partial view of the system, random walk-based algorithms can be easily exploited by uncooperative and malicious nodes. Traditionally, a random walk only uses information about the adjacency of nodes, and ignores their structural and temporal properties. Nevertheless, the properties of nodes indicate their reliability, and so, random walks using much richer information about the nodes than simple adjacency may achieve higher robustness against malicious exploitations. In this paper, we introduce the properties of nodes that are indicative of their reliability, and we propose a scheme to integrate these properties into the traditional random walks. Particularly, we consider two common malicious exploitations of random walks in decentralized networks, uncooperative nodes and Sybil attacks, and we show that integrating node properties into random walks results in much more robust reputation systems. Our experimental evaluation in synthetic graphs and graphs derived from real-world networks covering a significant number of users, shows the effectiveness of the resulting biased random walks.

[1]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[2]  Nitin Chiluka,et al.  Personalizing EigenTrust in the Face of Communities and Centrality Attack , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[3]  Hector Garcia-Molina,et al.  Combating Web Spam with TrustRank , 2004, VLDB.

[4]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[5]  Nazareno Andrade,et al.  Improving Accuracy and Coverage in an Internet-Deployed Reputation Mechanism , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).

[6]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[7]  Jianquan Liu,et al.  Link prediction: the power of maximal entropy random walk , 2011, CIKM '11.

[8]  Gourab Ghoshal,et al.  Ranking stability and super-stable nodes in complex networks. , 2011, Nature communications.

[9]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..

[10]  Aziz Mohaisen,et al.  Keep your friends close: Incorporating trust into social network-based Sybil defenses , 2011, 2011 Proceedings IEEE INFOCOM.

[11]  Krishna P. Gummadi,et al.  An analysis of social network-based Sybil defenses , 2010, SIGCOMM 2010.

[12]  Daniele Quercia,et al.  Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue , 2010, 2010 Proceedings IEEE INFOCOM.

[13]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[14]  Ítalo S. Cunha,et al.  Using Centrality Metrics to Predict Peer Cooperation in Live Streaming Applications , 2012, Networking.

[15]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[16]  Jure Leskovec,et al.  Supervised random walks: predicting and recommending links in social networks , 2010, WSDM '11.

[17]  John E. Hopcroft,et al.  Manipulation-Resistant Reputations Using Hitting Time , 2007, WAW.

[18]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[19]  Emin Gün Sirer,et al.  Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.

[20]  Thomas E. Anderson,et al.  One Hop Reputations for Peer to Peer File Sharing Workloads , 2008, NSDI.

[21]  Eric J. Friedman,et al.  Manipulability of PageRank under Sybil Strategies , 2006 .

[22]  H E Stanley,et al.  Classes of small-world networks. , 2000, Proceedings of the National Academy of Sciences of the United States of America.

[23]  Vern Paxson,et al.  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.

[24]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[25]  Christos Faloutsos,et al.  Fast Random Walk with Restart and Its Applications , 2006, Sixth International Conference on Data Mining (ICDM'06).

[26]  Nitin Chiluka,et al.  Reducing the History in Decentralized Interaction-Based Reputation Systems , 2012, Networking.

[27]  Jun Wang,et al.  TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.

[28]  Luca de Alfaro,et al.  A content-driven reputation system for the wikipedia , 2007, WWW '07.

[29]  Sulabh Agarwal,et al.  MoB: a mobile bazaar for wide-area wireless services , 2005, MobiCom '05.

[30]  Martin Everett,et al.  Ego network betweenness , 2005, Soc. Networks.

[31]  Christos Gkantsidis,et al.  Hybrid search schemes for unstructured peer-to-peer networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[32]  Krishna P. Gummadi,et al.  On the evolution of user interaction in Facebook , 2009, WOSN '09.

[33]  Lada A. Adamic,et al.  Friends and neighbors on the Web , 2003, Soc. Networks.

[34]  Hector Garcia-Molina,et al.  Web Spam Taxonomy , 2005, AIRWeb.

[35]  Mohammad Reza Pakravan,et al.  An Enhanced Random-walk Method for Content Locating in P2P Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).