skip to main content
10.1145/1879141.1879191acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Measuring the mixing time of social graphs

Published:01 November 2010Publication History

ABSTRACT

Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networks are fast mixing, and many recently proposed designs of such systems make crucial use of this property. However, whether real-world social networks are really fast mixing is not verified before, and this could potentially affect the performance of such systems based on the fast mixing property. To address this problem, we measure the mixing time of several social graphs, the time that it takes a random walk on the graph to approach the stationary distribution of that graph, using two techniques. First, we use the second largest eigenvalue modulus which bounds the mixing time. Second, we sample initial distributions and compute the random walk length required to achieve probability distributions close to the stationary distribution. Our findings show that the mixing time of social graphs is much larger than anticipated, and being used in literature, and this implies that either the current security systems based on fast mixing have weaker utility guarantees or have to be less efficient, with less security guarantees, in order to compensate for the slower mixing.

References

  1. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW '09: Proceedings of the 18th international conference on World wide web, pages 551--560, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. M. Daly and M. Haahr. Social network analysis for routing in disconnected delay-tolerant manets. In MobiHoc'07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, pages 32--40, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. Danezis and P. Mittal. SybilInfer: Detecting sybil nodes using social networks. In The 16th Annual Network & Distributed System Security Conference, 2009.Google ScholarGoogle Scholar
  4. J. R. Douceur. The sybil attack. In IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pages 251--260, London, UK, 2002. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Dwyer, S. Hiltz, and K. Passerini. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of AMCIS, 2007.Google ScholarGoogle Scholar
  6. M. Jerrum and A. Sinclair. Conductance and the rapid mixing property for markov chains: the approximation of the permanent resolved (preliminary version). In STOC, pages 235--244. ACM, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. A. Kautz, B. Selman, and M. A. Shah. Referral web: Combining social networks and collaborative filtering. Commun. ACM, 40(3):63--65, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Leskovec, D. P. Huttenlocher, and J. M. Kleinberg. Predicting positive and negative links in online social networks. In M. Rappa, P. Jones, J. Freire, and S. Chakrabarti, editors, WWW, pages 641--650. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over time: densification laws, shrinking diameters and possible explanations. In KDD '05: Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, pages 177--187, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. CoRR,abs/0810.1355, 2008.Google ScholarGoogle Scholar
  11. C. Lesniewski-Laas. A Sybil-proof one-hop DHT. In Proceedings of the 1st workshop on Social network systems, pages 19--24. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Lesniewski-Lass and M. F. Kaashoek. Whanau: A sybil-proof distributed hash table. In 7th USENIX Symposium on Network Design and Implementation, pages 3--17, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Ley. The DBLP computer science bibliography: Evolution, research issues, perspectives. In String Processing and Information Retrieval, pages 481--486. Springer, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Mislove, M. Marcon, P. K. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In Internet Measurement Comference, pages 29--42, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Mohaisen, N. Hopper, and Y. Kim. Designs to account for trust in social network-based sybil defenses. In 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Mohaisen, N. Hopper, and Y. Kim. Keep your friends close: Incorporating trust in social network-based Sybil defenses. Technical report, University of Minnesota, 2010.Google ScholarGoogle Scholar
  17. A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. Technical report, University of Minnesota, 2010.Google ScholarGoogle Scholar
  18. S. Nagaraja. Anonymity in the wild: Mixes on unstructured networks. In N. Borisov and P. Golle, editors, Privacy Enhancing Technologies, volume 4776 of Lecture Notes in Computer Science, pages 254--271. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. D. Quercia and S. Hailes. Sybil attacks against mobile users: friends and foes to the rescue. In INFOCOM'10: Proceedings of the 29th conference on Information communications, pages 336--340, Piscataway, NJ, USA, 2010. IEEE Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Richardson, R. Agrawal, and P. Domingos. Trust management for the semantic web. In D. Fensel, K. P. Sycara, and J. Mylopoulos, editors, International Semantic Web Conference, volume 2870 of Lecture Notes in Computer Science, pages 351--368. Springer, 2003.Google ScholarGoogle Scholar
  21. A. Sinclair. Improved bounds for mixing rates of markov chains and multicommodity flow. Combinatorics, Probability & Computing, 1:351--370, 1992.Google ScholarGoogle ScholarCross RefCross Ref
  22. N. Tran, J. Li, L. Subramanian, and S. S. M. Chow. Brief announcement: improving social-network-based Sybil-resilient node admission control. In A. W. Richa and R. Guerraoui, editors, PODC, pages 241--242. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. N. Tran, B. Min, J. Li, and L. Subramanian. Sybil-resilient online content voting. In USENIX NSDI, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. E. Vasserman. Towards freedom of speech on the Internet: Censorship-resistant communication and storage. PhD thesis, UNIVERSITY OF MINNESOTA, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. E. Vasserman, R. Jansen, J. Tyra, N. Hopper, and Y. Kim. Membership-concealing overlay networks. In Proceedings of the 16th ACM conference on Computer and communications security, pages 390--399. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM SIGCOMM Workshop on Social Networks (WOSN'09), August 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An analysis of social network-based sybil defenses. In SIGCOMM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao. User interactions in social networks and their implications. In EuroSys '09: Proceedings of the 4th ACM European conference on Computer systems, pages 205--218, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Xu, X. Li, and P. Parker. Exploiting social networks for threshold signing: attack-resilience vs. availability. In ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security, pages 325--336, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A near-optimal social network defense against sybil attacks. In IEEE Symposium on Security and Privacy, pages 3--17, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: defending against sybil attacks via social networks. In SIGCOMM, pages 267--278, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman. SybilGuard: defending against sybil attacks via social networks. IEEE/ACM Trans. Netw., 16(3):576--589, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Measuring the mixing time of social graphs

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IMC '10: Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
        November 2010
        496 pages
        ISBN:9781450304832
        DOI:10.1145/1879141
        • Program Chair:
        • Mark Allman

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 November 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate277of1,083submissions,26%

        Upcoming Conference

        IMC '24
        ACM Internet Measurement Conference
        November 4 - 6, 2024
        Madrid , AA , Spain

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader