Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2019

20.11.2018

QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks

verfasst von: Xinyang Jiang, Qiang Li, Zhen Ma, Mianxiong Dong, Jun Wu, Dong Guo

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Graph-based approaches for fake account detection is one of the important means to fight against fake accounts’ attacks on social networks. With the growth of the scale of social networks, more and more researchers begin to use the graph computing framework to boost their detection algorithms. We make detailed analyses of social networks’ graph data and state-of-the-art graph computing frameworks, and find that some techniques of the current graph computing systems are overgeneralized and suboptimal, which means they only focus on how to design a graph processing framework on general graphs but miss the optimization of social networks graphs. So, in this paper we propose QuickSquad, a graph computing system on a single server which is specific to the optimization of social networks graph structures. QuickSquad uses the method of ”divide and rule” instead of overgeneralization. First, we divide the graph structure data into the heavy set and the light set according to the out-degree of vertices. Then, we 1) store them with different formats, 2) process them with edge-based updating and vertex-based updating appropriately in a two-phase processing model, 3) apply two selective scheduler strategies of different level, i.e. vertex-level and file-level, and 4) provide four cache priorities when the memory is not enough to cache all data. Finally, we implement two detection methods, dSybilRank and dCOLOR, on our system, and the experiments demonstrate that our system can increase the performance up to 5.91X (from 1.14X) compared with the performance of the current graph computing systems, like GridGraph.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
2
we catch these data using crawler at Jan, 2015 in our lab and evaluate the fake account by ourself.
 
Literatur
1.
Zurück zum Zitat Aggarwal A, Vitter J, et al. (1988) The input/output complexity of sorting and related problems. Commun ACM 31(9):1116–1127MathSciNetCrossRef Aggarwal A, Vitter J, et al. (1988) The input/output complexity of sorting and related problems. Commun ACM 31(9):1116–1127MathSciNetCrossRef
2.
Zurück zum Zitat Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Mizanur Rahman Sk Md, Shamim Hossain M (2017) Sybil defense techniques in online social networks A survey. IEEE Access 5:1200–1219CrossRef Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Mizanur Rahman Sk Md, Shamim Hossain M (2017) Sybil defense techniques in online social networks A survey. IEEE Access 5:1200–1219CrossRef
3.
Zurück zum Zitat Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre É (2011) The louvain method for community detection in large networks. J Stat Mech Theory Exper 10:P10008 Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre É (2011) The louvain method for community detection in large networks. J Stat Mech Theory Exper 10:P10008
4.
Zurück zum Zitat Boshmaf Y, Logothetis D, Siganos G, Lería J, Lorenzo J, Ripeanu M, Beznosov K (2015) Integro: Leveraging victim prediction for robust fake account detection in osns. In: NDSS. Citeseer, vol 15, pp 8–11 Boshmaf Y, Logothetis D, Siganos G, Lería J, Lorenzo J, Ripeanu M, Beznosov K (2015) Integro: Leveraging victim prediction for robust fake account detection in osns. In: NDSS. Citeseer, vol 15, pp 8–11
5.
Zurück zum Zitat Cao J, Fu Q, Li Q, Guo D (2017) Discovering hidden suspicious accounts in online social networks. Inform Sci 394-395(Supplement C):123–140CrossRef Cao J, Fu Q, Li Q, Guo D (2017) Discovering hidden suspicious accounts in online social networks. Inform Sci 394-395(Supplement C):123–140CrossRef
6.
Zurück zum Zitat Cao J, Li Q, Ji Y, He Y, Guo D (2016) Detection of forwarding-based malicious urls in online social networks. Int J Parallel Programm 44(1):163–180CrossRef Cao J, Li Q, Ji Y, He Y, Guo D (2016) Detection of forwarding-based malicious urls in online social networks. Int J Parallel Programm 44(1):163–180CrossRef
7.
Zurück zum Zitat Cao Q, Sirivianos M, Yang X, Pregueiro T (2012) Aiding the detection of fake accounts in large scale social online services. In: Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12), pp 197–210 Cao Q, Sirivianos M, Yang X, Pregueiro T (2012) Aiding the detection of fake accounts in large scale social online services. In: Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12), pp 197–210
8.
Zurück zum Zitat Cao Q, Yang X, Yu J, Palow C (2014) Uncovering large groups of active malicious accounts in online social networks. Inproceedings of the 2014 ACM SIGSAC Conference On Computer and Communications Security. . ACMpages 477–488 Cao Q, Yang X, Yu J, Palow C (2014) Uncovering large groups of active malicious accounts in online social networks. Inproceedings of the 2014 ACM SIGSAC Conference On Computer and Communications Security. . ACMpages 477–488
9.
Zurück zum Zitat Cha M, Haddadi H, Benevenuto F, Gummadi KP (2010) Measuring User Influence in Twitter: The Million Follower Fallacy. In: Inproceedings of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM), Washington DC Cha M, Haddadi H, Benevenuto F, Gummadi KP (2010) Measuring User Influence in Twitter: The Million Follower Fallacy. In: Inproceedings of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM), Washington DC
10.
Zurück zum Zitat Cha M, Haddadi H, Benevenuto F, Krishna Gummadi P (2010) Measuring user influence in twitter The million follower fallacy. ICWSM 10(10-17):30 Cha M, Haddadi H, Benevenuto F, Krishna Gummadi P (2010) Measuring user influence in twitter The million follower fallacy. ICWSM 10(10-17):30
11.
Zurück zum Zitat Chen R, Shi J, Chen Y, Chen H (2015) Powerlyra: Differentiated graph computation and partitioning on skewed graphs. In: Proceedings of the Tenth European Conference on Computer Systems. ACM, pp 1 Chen R, Shi J, Chen Y, Chen H (2015) Powerlyra: Differentiated graph computation and partitioning on skewed graphs. In: Proceedings of the Tenth European Conference on Computer Systems. ACM, pp 1
12.
Zurück zum Zitat Cheng J, Liu Q, Li Z, Fan W, Lui JCS, He C (2015) Venus: Vertex-centric streamlined graph computation on a single pc. In: Proceedings of the IEEE 31st International Conference on Data Engineering, ICDE ’15, pp 1131–1142 Cheng J, Liu Q, Li Z, Fan W, Lui JCS, He C (2015) Venus: Vertex-centric streamlined graph computation on a single pc. In: Proceedings of the IEEE 31st International Conference on Data Engineering, ICDE ’15, pp 1131–1142
13.
Zurück zum Zitat Cheng S, Zhang G, Shu J, Hu Q, Zheng W (2016) Fastbfs: Fast breadth-first graph search on a single server. In: 2016 IEEE International Parallel and Distributed Processing Symposium, 2016, Chicago, pp 303–312 Cheng S, Zhang G, Shu J, Hu Q, Zheng W (2016) Fastbfs: Fast breadth-first graph search on a single server. In: 2016 IEEE International Parallel and Distributed Processing Symposium, 2016, Chicago, pp 303–312
14.
Zurück zum Zitat Chi Y, Dai G, Wang Y, Sun G, Li G, Yang H (2016) Nxgraph: an efficient graph processing system on a single machine. In: 2016 IEEE 32nd International Conference on Data Engineering (ICDE). IEEE, pp 409–420 Chi Y, Dai G, Wang Y, Sun G, Li G, Yang H (2016) Nxgraph: an efficient graph processing system on a single machine. In: 2016 IEEE 32nd International Conference on Data Engineering (ICDE). IEEE, pp 409–420
15.
Zurück zum Zitat Danezis G, Mittal P (2009) Sybilinfer: Detecting sybil nodes using social networks. In: NDSS. San Diego Danezis G, Mittal P (2009) Sybilinfer: Detecting sybil nodes using social networks. In: NDSS. San Diego
16.
Zurück zum Zitat Dean J, Ghemawat S (2008) Mapreduce: Simplified data processing on large clusters. Commun ACM 51 (1):107–113CrossRef Dean J, Ghemawat S (2008) Mapreduce: Simplified data processing on large clusters. Commun ACM 51 (1):107–113CrossRef
17.
Zurück zum Zitat Deng X, Li G, Dong M, Ota K (2017) Finding overlapping communities based on markov chain and link clustering. Peer-to-Peer Netw Appl 10(2):411–420CrossRef Deng X, Li G, Dong M, Ota K (2017) Finding overlapping communities based on markov chain and link clustering. Peer-to-Peer Netw Appl 10(2):411–420CrossRef
18.
Zurück zum Zitat Dong M, Ota K, Liu A (2016) Rmer: Reliable and energy-efficient data collection for large-scale wireless sensor networks. IEEE Internet Things J 3(4):511–519CrossRef Dong M, Ota K, Liu A (2016) Rmer: Reliable and energy-efficient data collection for large-scale wireless sensor networks. IEEE Internet Things J 3(4):511–519CrossRef
19.
Zurück zum Zitat Dong M, Ota K, Liu A, Guo M (2016) Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks. IEEE Transactions on Parallel & Distributed Systems 27(1):225–236 Dong M, Ota K, Liu A, Guo M (2016) Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks. IEEE Transactions on Parallel & Distributed Systems 27(1):225–236
20.
Zurück zum Zitat Egele M, Stringhini G, Kruegel C, Vigna G (2013) Compa: Detecting compromised accounts on social networks. In: NDSS Egele M, Stringhini G, Kruegel C, Vigna G (2013) Compa: Detecting compromised accounts on social networks. In: NDSS
21.
Zurück zum Zitat Faloutsos M, Faloutsos P, Faloutsos C (1999) On power-law relationships of the internet topology. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM ’99, p 251–262 Faloutsos M, Faloutsos P, Faloutsos C (1999) On power-law relationships of the internet topology. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM ’99, p 251–262
23.
Zurück zum Zitat Gonzalez J, Low Y, Gu H, Bickson D, Guestrin C (2012) Powergraph: Distributed graph-parallel computation on natural graphs. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI’12, pp 17–30 Gonzalez J, Low Y, Gu H, Bickson D, Guestrin C (2012) Powergraph: Distributed graph-parallel computation on natural graphs. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI’12, pp 17–30
24.
Zurück zum Zitat Gonzalez J, Xin RS, Dave A, Crankshaw D, Franklin MJ, Stoica I (2014) Graphx: Graph processing in a distributed dataflow framework. In: Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, OSDI’14, pp 599–613 Gonzalez J, Xin RS, Dave A, Crankshaw D, Franklin MJ, Stoica I (2014) Graphx: Graph processing in a distributed dataflow framework. In: Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, OSDI’14, pp 599–613
25.
Zurück zum Zitat Gualdron H, Cordeiro R, Rodrigues Jr JF, Chau DHP, Kahng M, Kang U (2015) M-flash: Fast billion-scale graph computation using block partition model. arXiv:1506.01406 Gualdron H, Cordeiro R, Rodrigues Jr JF, Chau DHP, Kahng M, Kang U (2015) M-flash: Fast billion-scale graph computation using block partition model. arXiv:1506.​01406
26.
Zurück zum Zitat Gurajala S, White JS, Hudson B, Voter BR, Matthews JN (2016) Profile characteristics of fake twitter accounts. Big Data Soc 3(2):2053951716674236CrossRef Gurajala S, White JS, Hudson B, Voter BR, Matthews JN (2016) Profile characteristics of fake twitter accounts. Big Data Soc 3(2):2053951716674236CrossRef
27.
Zurück zum Zitat Gyöngyi Z, Garcia-Molina H, Pedersen J (2004) Combating web spam with trustrank. In: Proceedings of the Thirtieth international conference on Very large data bases. VLDB Endowment, Vol 30, pp 576–587 Gyöngyi Z, Garcia-Molina H, Pedersen J (2004) Combating web spam with trustrank. In: Proceedings of the Thirtieth international conference on Very large data bases. VLDB Endowment, Vol 30, pp 576–587
28.
Zurück zum Zitat Höner J, Nakajima S, Bauer A, Müller K-R, Görnitz N (2017) Minimizing trust leaks for robust sybil detection. In: International Conference on Machine Learning, pp 1520–1528 Höner J, Nakajima S, Bauer A, Müller K-R, Görnitz N (2017) Minimizing trust leaks for robust sybil detection. In: International Conference on Machine Learning, pp 1520–1528
29.
Zurück zum Zitat Hu Y, Dong M, Ota K, Liu A, Guo M (2016) Mobile target detection in wireless sensor networks with adjustable sensing frequency. IEEE Syst J 10(3):1160–1171CrossRef Hu Y, Dong M, Ota K, Liu A, Guo M (2016) Mobile target detection in wireless sensor networks with adjustable sensing frequency. IEEE Syst J 10(3):1160–1171CrossRef
30.
Zurück zum Zitat Järvi J, Powell G, Lumsdaine A (2003) The lambda library: unnamed functions in c++. Softw Pract Exper 33(3):259–291CrossRefMATH Järvi J, Powell G, Lumsdaine A (2003) The lambda library: unnamed functions in c++. Softw Pract Exper 33(3):259–291CrossRefMATH
31.
Zurück zum Zitat Ji Y, He Y, Jiang X, Cao J, Li Q (2016) Combating the evasion mechanisms of social bots. Comput Secur 58:230–249CrossRef Ji Y, He Y, Jiang X, Cao J, Li Q (2016) Combating the evasion mechanisms of social bots. Comput Secur 58:230–249CrossRef
32.
Zurück zum Zitat Jia Z, Kwon Y, Shipman G, McCormick P, Erez M, Aiken A (2017) A distributed multi-gpu system for fast graph processing. Proc VLDB Endow 11(3):297–310CrossRef Jia Z, Kwon Y, Shipman G, McCormick P, Erez M, Aiken A (2017) A distributed multi-gpu system for fast graph processing. Proc VLDB Endow 11(3):297–310CrossRef
33.
Zurück zum Zitat Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media?. In: Proceedings of the 19th International Conference on World Wide Web, WWW ’10, pp 591–600 Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media?. In: Proceedings of the 19th International Conference on World Wide Web, WWW ’10, pp 591–600
34.
Zurück zum Zitat Kyrola A, Blelloch G, Guestrin C (2012) Graphchi: Large-scale graph computation on just a pc. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI’12, pp 31–46 Kyrola A, Blelloch G, Guestrin C (2012) Graphchi: Large-scale graph computation on just a pc. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI’12, pp 31–46
36.
Zurück zum Zitat Leskovec J, Kleinberg J, Faloutsos C (2007) Graph evolution: Densification and shrinking diameters. ACM Trans Knowl Discov Data (TKDD) 1(1):2CrossRef Leskovec J, Kleinberg J, Faloutsos C (2007) Graph evolution: Densification and shrinking diameters. ACM Trans Knowl Discov Data (TKDD) 1(1):2CrossRef
37.
Zurück zum Zitat Leskovec J, Lang KJ, Dasgupta A, Mahoney MW (2009) Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Math 6(1):29–123MathSciNetCrossRefMATH Leskovec J, Lang KJ, Dasgupta A, Mahoney MW (2009) Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Math 6(1):29–123MathSciNetCrossRefMATH
38.
Zurück zum Zitat Liu C, Gao P, Wright M, Mittal P (2015) Exploiting temporal dynamics in sybil defenses. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 805–816 Liu C, Gao P, Wright M, Mittal P (2015) Exploiting temporal dynamics in sybil defenses. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 805–816
39.
Zurück zum Zitat Liu H, Howie Huang H (2015) Enterprise: Breadth-first graph traversal on gpus. In: 2015 SC-International Conference for High Performance Computing, Networking, Storage and Analysis. IEEE, pp 1–12 Liu H, Howie Huang H (2015) Enterprise: Breadth-first graph traversal on gpus. In: 2015 SC-International Conference for High Performance Computing, Networking, Storage and Analysis. IEEE, pp 1–12
40.
Zurück zum Zitat Liu H, Howie Huang H (2017) Graphene Fine-grained io management for graph computing. In: FAST, pp 285–300 Liu H, Howie Huang H (2017) Graphene Fine-grained io management for graph computing. In: FAST, pp 285–300
41.
Zurück zum Zitat Liu Y, Ji S, Mittal P (2016) Smartwalk: Enhancing social network security via adaptive random walks. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 492–503 Liu Y, Ji S, Mittal P (2016) Smartwalk: Enhancing social network security via adaptive random walks. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 492–503
42.
Zurück zum Zitat Liu Y, Dong M, Ota K, Liu A (2016) Activetrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensic Secur 11(9):2013–2027CrossRef Liu Y, Dong M, Ota K, Liu A (2016) Activetrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensic Secur 11(9):2013–2027CrossRef
43.
Zurück zum Zitat Low Y, Bickson D, Gonzalez J, Guestrin C, Kyrola A, Hellerstein JM (2012) Distributed graphlab: A framework for machine learning and data mining in the cloud. Proc VLDB Endow 5(8):716– 727CrossRef Low Y, Bickson D, Gonzalez J, Guestrin C, Kyrola A, Hellerstein JM (2012) Distributed graphlab: A framework for machine learning and data mining in the cloud. Proc VLDB Endow 5(8):716– 727CrossRef
44.
Zurück zum Zitat Malewicz G, Austern MH, Bik Aart J, Dehnert JC, Horn I, Leiser N, Czajkowski G (2010) Pregel: A system for large-scale graph processing. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, SIGMOD ’10, pp 135–146 Malewicz G, Austern MH, Bik Aart J, Dehnert JC, Horn I, Leiser N, Czajkowski G (2010) Pregel: A system for large-scale graph processing. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, SIGMOD ’10, pp 135–146
45.
Zurück zum Zitat McCune RR, Weninger T, Madey GR (2015) Thinking like a vertex: a survey of vertex-centric frameworks for distributed graph processing. CoRR, arXiv:1507.04405 McCune RR, Weninger T, Madey GR (2015) Thinking like a vertex: a survey of vertex-centric frameworks for distributed graph processing. CoRR, arXiv:1507.​04405
46.
Zurück zum Zitat Merrill D, Garland M, Grimshaw A (2012) Scalable gpu graph traversal. In ACM SIGPLAN Notices. ACM, vol 47, pp 117–128 Merrill D, Garland M, Grimshaw A (2012) Scalable gpu graph traversal. In ACM SIGPLAN Notices. ACM, vol 47, pp 117–128
47.
Zurück zum Zitat Mohaisen A, Hopper N, Kim Y (2011) Keep your friends close: Incorporating trust into social network-based sybil defenses. In: 2011 Proceedings IEEE INFOCOM. IEEE, pp 1943–1951 Mohaisen A, Hopper N, Kim Y (2011) Keep your friends close: Incorporating trust into social network-based sybil defenses. In: 2011 Proceedings IEEE INFOCOM. IEEE, pp 1943–1951
48.
Zurück zum Zitat Mulamba D, Ray I, Ray I (2016) Sybilradar: A graph-structure based framework for sybil detection in on-line social networks. In: IFIP International Information Security and Privacy Conference. Springer, pp 179–193 Mulamba D, Ray I, Ray I (2016) Sybilradar: A graph-structure based framework for sybil detection in on-line social networks. In: IFIP International Information Security and Privacy Conference. Springer, pp 179–193
50.
Zurück zum Zitat Roy A, Mihailovic I, Zwaenepoel W (2013) X-stream: Edge-centric graph processing using streaming partitions. In: Proceedings of the 24th ACM Symposium on Operating Systems Principles, SOSP ’13, New York, pp 472–488 Roy A, Mihailovic I, Zwaenepoel W (2013) X-stream: Edge-centric graph processing using streaming partitions. In: Proceedings of the 24th ACM Symposium on Operating Systems Principles, SOSP ’13, New York, pp 472–488
51.
Zurück zum Zitat Shi X, Zheng Z, Zhou Y, Jin H, He L, Bo L, Hua Q-S (2018) Graph processing on gpus A survey. ACM Comput Surv (CSUR) 50(6):81CrossRef Shi X, Zheng Z, Zhou Y, Jin H, He L, Bo L, Hua Q-S (2018) Graph processing on gpus A survey. ACM Comput Surv (CSUR) 50(6):81CrossRef
52.
Zurück zum Zitat Tran N, Li J, Subramanian L, Chow SSM (2011) Optimal sybil-resilient node admission control. In: INFOCOM 2011 Proceedings IEEE. IEEE, pp 3218–3226 Tran N, Li J, Subramanian L, Chow SSM (2011) Optimal sybil-resilient node admission control. In: INFOCOM 2011 Proceedings IEEE. IEEE, pp 3218–3226
53.
Zurück zum Zitat Valiant LG (1990) A bridging model for parallel computation. Commun ACM 33(8):103–111CrossRef Valiant LG (1990) A bridging model for parallel computation. Commun ACM 33(8):103–111CrossRef
54.
Zurück zum Zitat Viswanath B, Post A, Gummadi KP, Mislove A (2010) An analysis of social network-based sybil defenses. ACM SIGCOMM Comput Commun Rev 40(4):363–374CrossRef Viswanath B, Post A, Gummadi KP, Mislove A (2010) An analysis of social network-based sybil defenses. ACM SIGCOMM Comput Commun Rev 40(4):363–374CrossRef
55.
Zurück zum Zitat Wang G, Konolige T, Wilson C, Wang X, Zheng H, Zhao BY (2013) You are how you click: Clickstream analysis for sybil detection. In: Proceedings of USENIX Security. Citeseer, pp 1–15 Wang G, Konolige T, Wilson C, Wang X, Zheng H, Zhao BY (2013) You are how you click: Clickstream analysis for sybil detection. In: Proceedings of USENIX Security. Citeseer, pp 1–15
56.
Zurück zum Zitat Xue J, Yang Z, Yang X, Wang X, Chen L, Dai Y (2013) Votetrust: Leveraging friend invitation graph to defend against social network sybils. In: 2013 Proceedings IEEE INFOCOM. IEEE, pp 2400–2408 Xue J, Yang Z, Yang X, Wang X, Chen L, Dai Y (2013) Votetrust: Leveraging friend invitation graph to defend against social network sybils. In: 2013 Proceedings IEEE INFOCOM. IEEE, pp 2400–2408
57.
Zurück zum Zitat Yang J, Leskovec J (2012) Defining and evaluating network communities based on ground-truth. CoRR, arXiv:1205.6233 Yang J, Leskovec J (2012) Defining and evaluating network communities based on ground-truth. CoRR, arXiv:1205.​6233
58.
Zurück zum Zitat Yang Z, Wilson C, Wang X, Gao T, Zhao BY, Dai Y (2014) Uncovering social network sybils in the wild. ACM Trans Knowl Discov Data (TKDD) 8(1):2 Yang Z, Wilson C, Wang X, Gao T, Zhao BY, Dai Y (2014) Uncovering social network sybils in the wild. ACM Trans Knowl Discov Data (TKDD) 8(1):2
59.
Zurück zum Zitat Yu H (2011) Sybil defenses via social networks: a tutorial and survey. ACM SIGACT News 42(3):80–101CrossRef Yu H (2011) Sybil defenses via social networks: a tutorial and survey. ACM SIGACT News 42(3):80–101CrossRef
60.
Zurück zum Zitat Yu H, Gibbons PB, Kaminsky M, Xiao F (2008) Sybillimit: A near-optimal social network defense against sybil attacks. In: 2008. SP 2008. IEEE Symposium on Security and Privacy. IEEE, pp 3–17 Yu H, Gibbons PB, Kaminsky M, Xiao F (2008) Sybillimit: A near-optimal social network defense against sybil attacks. In: 2008. SP 2008. IEEE Symposium on Security and Privacy. IEEE, pp 3–17
61.
Zurück zum Zitat Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006) Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput Commun Rev 36(4):267–278CrossRef Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006) Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput Commun Rev 36(4):267–278CrossRef
62.
Zurück zum Zitat Zhang C, Dong M, Ota K, Guo M (2016) A social-network-optimized taxi-sharing service. IT Prof 18(4):34–40CrossRef Zhang C, Dong M, Ota K, Guo M (2016) A social-network-optimized taxi-sharing service. IT Prof 18(4):34–40CrossRef
63.
Zurück zum Zitat Zhang J, Li Q, Wang X, Feng B, Guo D (Jun 2017) Towards fast and lightweight spam account detection in mobile social networks through fog computing. Peer-to-Peer Networking and Applications Zhang J, Li Q, Wang X, Feng B, Guo D (Jun 2017) Towards fast and lightweight spam account detection in mobile social networks through fog computing. Peer-to-Peer Networking and Applications
64.
Zurück zum Zitat Zheng D, Burns R, Szalay AS (2013) Toward millions of file system iops on lowcost, commodity hardware. In: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, SC’13. ACM, New York, pp 69:1–69:12 Zheng D, Burns R, Szalay AS (2013) Toward millions of file system iops on lowcost, commodity hardware. In: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, SC’13. ACM, New York, pp 69:1–69:12
65.
Zurück zum Zitat Zheng D, Mhembere D, Burns R, Vogelstein J, Priebe CE, Szalay AS (2015) Flashgraph: Processing billion-node graphs on an array of commodity ssds. In: Proceedings of the 13th USENIX Conference on File and Storage Technologies, FAST’15, pp 45–58 Zheng D, Mhembere D, Burns R, Vogelstein J, Priebe CE, Szalay AS (2015) Flashgraph: Processing billion-node graphs on an array of commodity ssds. In: Proceedings of the 13th USENIX Conference on File and Storage Technologies, FAST’15, pp 45–58
66.
Zurück zum Zitat Zhu X, Han W, Chen W (2015) Gridgraph: Large-scale graph processing on a single machine using 2-level hierarchical partitioning. In: 2015 USENIX Annual Technical Conference, USENIX ATC’15, Santa Clara, pp 375–386 Zhu X, Han W, Chen W (2015) Gridgraph: Large-scale graph processing on a single machine using 2-level hierarchical partitioning. In: 2015 USENIX Annual Technical Conference, USENIX ATC’15, Santa Clara, pp 375–386
67.
Zurück zum Zitat Zhu X, Chen W, Zheng W, Ma X (2016) Gemini: A computation-centric distributed graph processing system. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)(Savannah, GA Zhu X, Chen W, Zheng W, Ma X (2016) Gemini: A computation-centric distributed graph processing system. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)(Savannah, GA
Metadaten
Titel
QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks
verfasst von
Xinyang Jiang
Qiang Li
Zhen Ma
Mianxiong Dong
Jun Wu
Dong Guo
Publikationsdatum
20.11.2018
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2019
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-018-0697-2

Weitere Artikel der Ausgabe 5/2019

Peer-to-Peer Networking and Applications 5/2019 Zur Ausgabe

Premium Partner