MPI-SWS

Assessing Trust and Controlling Abuse in Crowdsourcing Systems

One of the key security threats plaguing crowdsourcing systems (e.g., Online networking sites like Facebook or Twitter) is abuse of services. Service abuse takes many forms — e.g., users are flooded with spam messages for the purpose of promoting businesses or for spreading malware, and crowd-sourced content rating services are tampered by fake or Sybil accounts to manipulate ratings. Such attacks severely degrade the quality of service provided by such crowdsourcing systems, e.g., social networking websites. One key reason that makes this type of abuse possible is: the ease of creating identities in such systems which results in variable level of reputation and trust across the identities in social systems. Our work tries to asses trust of identities in crowdsourcing systems and propose novel techniques to build robust and practical systems to control service abuse.

Trust assessment and fraud detection

Due to ease of creating identities in most of the current crowdsourcing systems, today spammers and service abusers create multiple identities. However intuitively these identities (which are often used for abusing services, e.g., inflating reputation scores of a restaurant) should not be trusted. One of the main research directions for our group is to develop methodologies to asses trust of identities in crowdsourcing systems. Moreover we further build technologies to detect fraudulent activities in order to control abuse in these crowdsourcing systems.

-> http://socialnetworks.mpi-sws.org/security_trust.html

Understanding spammer infiltration in social networks and defending against collusion attacks

Like the Web, Twitter has presently become a target for link farming, where users, especially spammers, try to acquire large numbers of follower links in the social network. Acquiring followers not only increases the size of a user's direct audience, but also contributes to the perceived influence of the user, which in turn impacts the ranking of the user's tweets by search engines. To address this problem we investigated link farming in the Twitter social network and then explored mechanisms to discourage the activity.

-> http://socialnetworks.mpi-sws.org/linkfarming.html

Limiting service abuse by Sybil identities

Multiple identity, or Sybil attacks pose a fundamental problem in OSNs. In a Sybil attack, a malicious user creates multiple (Sybil) identities and takes advantage of the combined privileges associated with these identities to abuse the system by spamming, rating manipulation etc. To that end we build Sybil tolerant systems to defend against email spammers, frauds in online markets and large scale crawlers in crowdsourcing systems.

-> http://socialnetworks.mpi-sws.org/sybil_tolerance.html

 

People

Faculty   Student / Post doc  
* Krishna P. Gummadi
* Peter Druschel
  * Muhammad Ahmad Bashir
* Oana Goga
* Mainack Mondal
* Giridhari Venkadri
* Bimal Viswanath

 

Imprint | Data Protection