Top Banner
Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by: Liang Zhao Northern Virginia Center
25

Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Jan 18, 2016

Download

Documents

Blaise Hoover
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Measuring Behavioral Trust in Social NetworksSibel Adali, et al.

IEEE International Conference on Intelligence and

Security Informatics

Presented by: Liang ZhaoNorthern Virginia Center

Page 2: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

OutlineIntroductionBehavior TrustTwitter dataExperiment ResultsConclusion

Page 3: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

IntroductionTrust vs. Social NetworkEvaluate Trust in Social NetworkAssumptionsPurpose of this paper

Page 4: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Trust vs. Social Network

Trust → Social Network (SN)◦Forms coalitions◦Identifies influential nodes in SN◦Depicts the flow of information

Social Network → Trust◦Communities induce greater

trust◦Information flow enhances trust

Page 5: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Evaluate Trust in Social Network

Our own predisposition to trust.Relationship with others.Our opinions towards others.

Whether we trust others?

Page 6: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

AssumptionsDoes not consider semantic

information.Only consider social tiesTrust is a social tie between

a trustor and trustee.Social ties can be observed

by communication behaviors.

Degree of Trust can change.

Behavior Trust: Measure of trust is based on social behavior.

Social behaviors can conversely enhanceor reduce the trust.

Page 7: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Purpose of this paperMeasure trust based on the

communi-cation behavior of the actors in SN.

Input:◦Communication Stream of Social

Network: {<sender, receiver, time>,…,<sender,

receiver, time>}Output:

◦Behavior trust graph Nodes: actors in SN, e.g., . Edges’ weights: strength of trust, e.g., .

Page 8: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Behavior TrustConversations & PropagationsConversations behavior based

◦Conversations grouping◦Conversation Trust Computation

Propagation behavior based◦Propagation Trust◦Potential Propagations Counting◦Propagation Trust Computation

Page 9: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Conversations & PropagationsThis paper considers two kinds of

behavior:◦ Conversations: Two nodes converse means

they are more likely to trust each other.

◦ Propagations: A propagates info from B indicates A trust B.

undirected directed

Page 10: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Conversations groupingThe set of messages exchanged

between A and B is: .

Average time between messages is:

Rule: two consecutive messages ,

are in the same conversation if .

𝑡1 𝑡 2 𝑡 3 𝑡 4 𝑡5 𝑡 6 𝑡7

Page 11: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Conversation Trust Computation

Rules:◦ Longer Conversations imply more trust.◦ More Conversations imply more trust.◦ Balanced participation between two

actors imply more trust.Trust (namely Edge’s weight in trust

graph):

Entropy function:

: the fraction sent by one actor; the fraction sent by the other actor.

Page 12: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Propagation Trust

Given communication statistics alone, we cannot definitely determine which messages from B are propagations from A.

So we turn to counting “potential propagations”.

𝐴

details

?

Page 13: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Potential Propagations CountingPotential Propagations must

satisfy the following constraint:

Matching “incoming to B” messages with “outgoing from B” messages:

𝑠1−𝑡1<𝜏𝑚𝑖𝑛𝜏𝑚𝑖𝑛<𝑠2−𝑡 1<𝜏𝑚𝑎𝑥𝑠3−𝑡 2>𝜏𝑚𝑎𝑥𝜏𝑚𝑖𝑛<𝑠3− 𝑡3<𝜏𝑚𝑎𝑥

No cross

Page 14: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Propagation Trust ComputationNotations:

◦ the number of propagations by B.◦ the number of potential

propagations.◦the number of messages A sent to B.

Strategy 1: Strategy 2:

The fraction of B’s energy spent on propagating A’ messages.

The fraction of A’s messages worthy to be propagated by B.

Page 15: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Twitter DataData Volume:

◦2M users (1.9M senders).◦230K tweets per day.

Data format:◦(sender, receiver, time).

Ground Truth Label of Trust: retweeting◦Directed

◦Broadcast

Page 16: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

ExperimentCompute Conversation &

Propagation Graphs.Overlaps between Conversation &

Propagation Graphs.Validate Conversation &

Propagation Graphs using retweets.

Page 17: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Computing Conversation & Propagation Graphs

Data:◦15M Directed tweets for conversation

graph.◦34M broadcast tweets for propagation

graph.

Settings:

Page 18: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Computing Conversation & Propagation Graphs (continued)

To achieve comparison between conversation and propagation graphs: treat the undirected edge as two directed ones.

Page 19: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Overlaps between Conversation & Propagation GraphsCluster these two graphs based

on the weighted edges to discover communities:

Overlaps evaluation:

Random set of clusters with same size distribution; repeat 1000 times.

Page 20: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Graph validation using retweets.Assumption:

◦A retweet is a propagation.◦When a user propagates information

from some other user, there must be some element of trust between them.

◦ indicates directed trust: .◦Directed retweet is more determinative

than broadcast retweet in indicating trust.

Page 21: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Graph validation using retweets (contd.)Conversational Trust Graph

Validation:◦Nodes: 20% are also presented in

retweets graph.◦Edges: as follows.

: Random graph, which consists of randomly selected nodes. The edges are communications between the nodes.

: Prominence graph, which consists of most active nodes. The edges are communications between the nodes.

Page 22: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Graph validation using retweets (contd.)Propagation Trust Graph

Validation:◦Nodes: 20% are also presented in

retweets graph.◦Edges: as follows.

Page 23: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

ConclusionMethod advantages:

◦ Propose a measurable behavior trust metric.

◦ Does not need semantic information.◦ Can be applied to dynamic network.◦ The proposed metric reasonably

correlate with retweets.◦ Can be applied to general social

networks other than Twitter.◦ Good scalability due to low

computational cost on statistical communication data.

Page 24: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Future WorksVerify the potentially casual

relationship between conversation and propagation behavior.

The intersection of conversation and propagation graphs would be a more stringent measure of trust.

Improve the purity of trust measurement by considering semantics of messages.

Trust should be dependent on context (e.g., we trust a doctor in medical science, but not necessarily in finance analysis.

Improve the trust measurement by considering the quality and value of messages.

Page 25: Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:

Thank you