Title: Davis Social Links
1Davis Social Links
S. Felix Wu Computer Science Department University
of California, Davis wu_at_cs.ucdavis.edu http//ww
w.cs.ucdavis.edu/wu/
2SMTP
3Internet
SMTP
Applications with Tests
4Internet Architecture Routing
SMTP
- Any identity (email address, IP, url) can
communicate with any one else. - Email, web, bittorrent, warcraft, skype
5Social-Control Routing
SMTP
Applications with Tests
3
2
1
6Urgent! Please contact me!
FROMMR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho
Branch 171 Shaukiwan Road Hong Kong. Please
contact me on my personal box puicheungcheungpui_at_
yahoo.com Let me start by introducing myself. I
am Mr. Cheung Pui, director of operations of the
Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a
obscured business suggestion for you. Before the
U.S and Iraqi war our client Major Fadi Basem who
was with the Iraqi forces and also business man
made a numbered fixed deposit for 18
calendar months, with a value of Twenty Four
millions Five Hundred Thousand United State
Dollars only in my branch. Upon maturity several
notice was sent to him,
7http//www.ebolamonkeyman.com/cheung.htm
8Pick your favor Spam Filter(s)
9This was considered a spam!
10This was considered a spam!
Sometimes, the cost of False Positive may be very
high
11The Implication of FPs
- Spam-filters have to be conservative
- We will have some false negatives in our own
inboxes. - We will use our own time to further filter..
- For me, 12 seconds per email
12The emails I received typically
13You have about 1 second to decide
14(No Transcript)
15(No Transcript)
16(No Transcript)
17Social Spams
- They might not be spams as we often overlooked
the social values of them!
18SMTP
19SMTP
20SMTP
Lerone
Felix
21(No Transcript)
22The value of the Network
- Social Network has its own unique value in
facilitating human communication - A concern about a network losing its value
- while we are unsure about how to quantify the
true value
23Dont worry about the language
24(No Transcript)
25(No Transcript)
26(No Transcript)
27Real Facebook identifier
28Social Network Games
29Fighters Club
- A Coalition game like Warcraft
- Team members who are Facebook friends receive
higher fighting powers - 1400 new friendships established daily
- 10 of users with gt95 friendships purely based
on this game.
30Open Issues
- What is the value of this social network?
- How would this value be distributed and
allocated to each individual peers? - MySpace, Facebook, LinkedIn didnt define the
game for network formation and value
allocation. - But, it is important to design the game such that
the OSN will eventually converge to a state to
best support the communities.
31Activities, Knowledge Sharing, and Social
Relationship
Scalability, Privacy, Trust, Robustness, Performan
ce
32Facebook versus Personal Web Site
- WWW everybody can see it
- Facebook a selected set of people on your social
network can see it - But, that differential value
33SMTP
Lerone
Felix
34SMTP
Lerone
Felix
Facebook
35SMTP
Lerone
Felix
Social Context
DSL Kernel
Policy/Reputation-based Route discovery
Facebook
36SMTP
Lerone
Felix
Social Context
DSL Kernel
Policy/Reputation-based Route discovery
Facebook
37(No Transcript)
38Just a couple issues
- How to establish the social route?
- How would A know about D (or Ds identity)
? - How to maintain this reputation network?
- MessageReaper A Feed-back Trust Control System
(Spear/Lang/Lu)
39Who is Salma?
40Who is Salma?
41My message to Salma
42The Social Path(s)
43More Examples
44A,D social context
??
B
D
A
C
A has to explicitly declare if there is any
social context under this communication activity
with D! But, D only cares if it is from C
or not!
45Search on OSN
- How to get to from ?
- The Small world model
- 6 degree separation (Milgram, 1967)
- existence of a short path
- How to find the short path? (Kleinberg, 2000)
46Social Route Discovery for A2D
??
B
D
A
C
Lets assume A doesnt have Ds routable
identity Or, D doesnt have a global unique
identity! Then, how can we do A2D?
47Finding
??
B
D
A
C
A2D, while D is McDonalds! D would like
customers to find the right route. idea
keyword propagation e.g., McDonalds
48(No Transcript)
49Announcing
B
D
K McDonalds
A
C
Hop-by-hop keyword propagation
50Announcing
B
D
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation
51Announcing
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation
52Announcing
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation And, I know I am
doing FLOODING!!
53Now Finding
Q McDonalds
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
- Search Keyword McDonalds
- A might know Ds keyword via two channels
- (1) Somebody else (2) From its friends
- Questions does D need an identity? Scalable?
54Application Tests
- Example 1 credential-oriented
- PKI certificate as the keyword
- If you can sign or decrypt the message, you are
the ONE! - Example 2 service-oriented
- Service/protocol/bandwidth support
- Example 3 offer-oriented
- Please send me your coupons/promotions!
55Routable Identity
- Application identity Mgt Network identity
- Network identity Rgt Network identity
- Network identity Mgt Application identity
56App/Route Identity
- Application identity Mgt Network identity
- Network identity Rgt Network identity
- Network identity Mgt Application identity
- Keywords (MF-R)gt Multiple Paths
- Application identity selection
- Network route selection
57SMTP
Lerone
Felix
Social Context
DSL Kernel
Policy/Reputation-based Route discovery
Facebook
58SMTP
Wrapper
Lerone
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Policy/Reputation-based Route discovery
Facebook
59Finding
Application Test
Q McDonalds
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Search Keyword McDonalds Questions is this
the right Felix Wus? How to avoid/control
flooding??
60Scalability - Avoid the Flooding
- As it is, every keyword will need to be
propagated to all the nodes/links (but the same
keyword will be propagated through the same link
once possibly with different policies). - The issue who should receive my keywords?
61in Community of Davis
??
B
D
A
C
Who should receive the keyword announcement for
McDonalds?
62 as the Social Peer
- Attributes
- McDonalds Express, 640 W Covell Blvd, D,
Davis, (530) 756-8886, Davis Senior High School,
Community Park, North Davis
63Per-Keyword Policy
- For each keyword, we will associate it with a
propagation policy T, N, A - T Trust Value Threshold
- N Hop counts left to propagate (-1 each step)
- A Community Attributes
- Examples
- gt0.66, 4, Davis K via L1
- gt0, , K via L2
64Scalability Controllability
- McDonalds doesnt want to flood the whole
network - It only wants to multicast to the Target set of
customers - And, it only wants this target set of users being
able to use that particular keyword to contact. - Receiver/owner controllability
65Social/Community Attributes
??
B
D
A
C
Who should receive the keyword announcement for
McDonalds? Answer
66Community
??
B
D
A
C
67Community
- A connected graph of social nodes sharing a set
of community attributes
68Community
??
B
D
A
C
69Social/Community Attributes
??
B
D
A
C
Who should receive the keyword announcement for
McDonalds? Answer but not ALL
70Community
??
B
D
A
C
71Network Formation
??
B
D
A
C
72Network Formation
??
B
D
A
C
Both A C why would A C be willing to
establish a direct friendship?
73Open Issues
- What is the value of this social network?
- How would this value be distributed and
allocated to each individual peers?
74Reputation
- Adding Trust as another consideration in
routing - Per-packet Reputation Update
- Fast Stabilization
- Mobility without per-hop authenticated
Global/Unique Network layer Identities
75Reputation on Feed-back
??
B
D
A
C
D is the one to decide whether the message from
A/B/C is good or bad!
76One Route path from A to D
Pktagtd
A
B
C
D
End2End Trust is this really from
A? RoutePath Trust Should this path be used?
77Basic Assumption about the Link
Pktagtd
A
B
C
D
B C have a way to decide whether they should
establish a link between them, and they can
authenticate each other Secure MAC
authentication Social Links in
OSN Reputation-based Authentication Sybil
Attack robustness
78The Attack Model
- Does the receiver really like this packet being
delivered to me over a route path of links - Corrupted information
- Spam
- An incorrectly E2E-Authenticated packet
- Malware
- Assumption the receiver has its own security
policy to determine whether it like the
packet/message or not!
79D decides, and rewards/punishes
Pktcgtd
A
B
C
D
Trust(DgtC)
Trust(CgtB)
Trust(BgtA)
Pktbcd
Pktabc
Pktab
80Trust Structure
We want to stabilize these decentralized values
such that they can be used to effectively choose
the best route.
81Game Theory Analysis
Pktcgtd
A
B
C
D
Trust(DgtC)
Trust(CgtB)
Trust(BgtA)
Pktbcd
Pktabc
Pktab
Value Allocation if a bad message is delivered,
how should we distribute the damage along the
route path?
82Trust Structure as the Utility
We want to stabilize these decentralized values
such that they can be used to effectively choose
the best route.
83Three Trust Values per Relationship
u
v
- Ta(u,v) u is directly connected to v. How much u
trusts v? - Ainit v, as the initiator, sends a packet to u.
- Afwd v forwards a packet to u . I.e., v is not
the initiator of the packet. - Art sends a packet to, and, v forwards that
packet to one of its other neighbors. And, the
packet eventually reaches the destination.
84Example
85(No Transcript)
86Routing with Trust
87(No Transcript)
881000 nodes, 20 bad
891000 nodes, 10/40 bad
90Increasing the Spammers
91Orkut (15329 nodes)
92(No Transcript)
93(No Transcript)
94SMTP
Divert
Existing Applications
Native DSL Applications and Games
Wrapper
Lerone
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Name-ID resolution
Policy/Reputation-based Route discovery
Facebook
DSLoFB
95DSL, Facebook, AL-BGP and GENI
http//www.geni.net/DSLport
AL-BGP over GENI/PlanetLab
Each DSL/FB user should select a closer GENI
entrance as www.geni.net. In other words, we
might need to set up DNS records correctly.
Facebook
96Social-Control Routing
Applications with Tests
3
2
1
97DSL is an old idea!
A
B
- We, as human, have been using similar
communication principles. Maybe it is a good
opportunity to re-think about our cyber
communication system. - Identity is a per-application, context-oriented,
and sometime relative issue. - Forming cyber communities of interests for
application.
F
A
B
F
F
98Easy to Send Receive
- Easy for both the good users and the spammers.
(fair simplicity) - The spammers abuse the sending right, while the
good users have very limited options to counter
back. - how easy can we change our email address?
- how often do we need to do that?
- A receiver or the owner of the identity
should have some control. - But, that means also burden to the users.
99Easy to Send Receive
- Easy for both the good users and the spammers.
(fair simplicity) - The spammers abuse the sending right, while the
good users have very limited options to counter
back. - how easy can we change our email address?
- how often do we need to do that?
- A receiver or the owner of the identity
should have some control. - But, that means also burden to the users.
100Davis Social Links
- Peer-to-Peer System (P2P)
- How human socially communicate?
- Online Social Network (OSN)
- How to utilize OSN to enhance communication?
- How to have a securer OSN?
- Autonomous Community (AC)
- How to build/develop more effective
community-based social networks?
101Acknowledgement
A
B
F
A
B
F
F