Max-Planck-Institut für Informatik
max planck institut
informatik
mpii logo Minerva of the Max Planck Society
 

MPI-INF or MPI-SWS or Local Campus Event Calendar

<< Previous Entry Next Entry >> New Event Entry Edit this Entry Login to DB (to update, delete)
What and Who
Title:Towards Trustworthy Social Computing Systems
Speaker:Bimal Viswanath
coming from:Max Planck Institute for Software Systems
Speakers Bio:
Event Type:SWS Student Defense Talks - Thesis Defense
Visibility:SWS
We use this to send out email in the morning.
Level:Public Audience
Language:English
Date, Time and Location
Date:Thursday, 28 April 2016
Time:09:00
Duration:90 Minutes
Location:Saarbr├╝cken
Building:E1 5
Room:002
Abstract
The rising popularity of social computing systems has managed to attract rampant forms

of service abuse that negatively affects the sustainability of these systems and degrades the
quality of service experienced by their users. The main factor that enables service abuse
is the weak identity infrastructure used by most sites, where identities are easy to create
with no verification by a trusted authority. Attackers are exploiting this infrastructure to
launch Sybil attacks, where they create multiple fake (Sybil) identities to take advantage of
the combined privileges associated with the identities to abuse the system.
In this thesis, we present techniques to mitigate service abuse by designing and building
defense schemes that are robust and practical. We use two broad defense strategies: (1)
Leveraging the social network: We first analyze existing social network-based Sybil detection
schemes and present their practical limitations when applied on real world social networks.
Next, we present an approach called Sybil Tolerance that bounds the impact an attacker
can gain from using multiple identities; (2) Leveraging activity history of identities: We
present two approaches, one that applies anomaly detection on user social behavior to detect
individual misbehaving identities, and a second approach called Stamper that focuses on
detecting a group of Sybil identities. We show that both approaches in this category raise
the bar for defense against adaptive attackers.

Contact
Name(s):
Video Broadcast
Video Broadcast:YesTo Location:Kaiserslautern
To Building:G26To Room:111
Tags, Category, Keywords and additional notes
Note:
Attachments, File(s):

Created by:Maria-Louise Albrecht/MPI-KLSB, 04/11/2016 10:51 AMLast modified by:Uwe Brahm/MPII/DE, 11/24/2016 04:14 PM
  • Maria-Louise Albrecht, 04/13/2016 04:58 PM
  • Maria-Louise Albrecht, 04/11/2016 11:02 AM -- Created document.