Conductance and the rapid mixing property for Markov chains: the approximation of permanent resolved
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Referral Web: combining social networks and collaborative filtering
Communications of the ACM
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The DBLP Computer Science Bibliography: Evolution, Research Issues, Perspectives
SPIRE 2002 Proceedings of the 9th International Symposium on String Processing and Information Retrieval
Graphs over time: densification laws, shrinking diameters and possible explanations
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Social network analysis for routing in disconnected delay-tolerant MANETs
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Exploiting social networks for threshold signing: attack-resilience vs. availability
Proceedings of the 2008 ACM symposium on Information, computer and communications security
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
SybilGuard: defending against sybil attacks via social networks
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 1st Workshop on Social Network Systems
User interactions in social networks and their implications
Proceedings of the 4th ACM European conference on Computer systems
All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
Sybil-resilient online content voting
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
On the evolution of user interaction in Facebook
Proceedings of the 2nd ACM workshop on Online social networks
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
Predicting positive and negative links in online social networks
Proceedings of the 19th international conference on World wide web
Anonymity in the wild: mixes on unstructured networks
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Sybil attacks against mobile users: friends and foes to the rescue
INFOCOM'10 Proceedings of the 29th conference on Information communications
Brief announcement: improving social-network-based sybil-resilient node admission control
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
An analysis of social network-based Sybil defenses
Proceedings of the ACM SIGCOMM 2010 conference
Whanau: a sybil-proof distributed hash table
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Designs to account for trust in social network-based sybil defenses
Proceedings of the 17th ACM conference on Computer and communications security
Towards freedom of speech on the internet: censorship-resistant communication and storage
Towards freedom of speech on the internet: censorship-resistant communication and storage
Designs to account for trust in social network-based sybil defenses
Proceedings of the 17th ACM conference on Computer and communications security
Walking on a graph with a magnifying glass: stratified sampling via weighted random walks
Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
Walking on a graph with a magnifying glass: stratified sampling via weighted random walks
ACM SIGMETRICS Performance Evaluation Review - Performance evaluation review
Sybil defenses via social networks: a tutorial and survey
ACM SIGACT News
Uncovering social network sybils in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Canal: scaling social network-based Sybil tolerance schemes
Proceedings of the 7th ACM european conference on Computer Systems
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Innocent by association: early recognition of legitimate users
Proceedings of the 2012 ACM conference on Computer and communications security
SybilControl: practical sybil defense with computational puzzles
Proceedings of the seventh ACM workshop on Scalable trusted computing
Beyond Social Graphs: User Interactions in Online Social Networks and their Implications
ACM Transactions on the Web (TWEB)
Defending against large-scale crawls in online social networks
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Proceedings of the sixth ACM international conference on Web search and data mining
Persea: a sybil-resistant social DHT
Proceedings of the third ACM conference on Data and application security and privacy
SocialWatch: detection of online service abuse via large-scale social graphs
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Dynamix: anonymity on dynamic social structures
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Estimating clustering coefficients and size of social networks via random walk
Proceedings of the 22nd international conference on World Wide Web
Iolaus: securing online content rating systems
Proceedings of the 22nd international conference on World Wide Web
Graph-based Sybil detection in social and information systems
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
UNIK: unsupervised social network spam detection
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Understanding latent interactions in online social networks
ACM Transactions on the Web (TWEB)
You are how you click: clickstream analysis for Sybil detection
SEC'13 Proceedings of the 22nd USENIX conference on Security
Uncovering social network Sybils in the wild
ACM Transactions on Knowledge Discovery from Data (TKDD) - Casin special issue
Hi-index | 0.00 |
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networks are fast mixing, and many recently proposed designs of such systems make crucial use of this property. However, whether real-world social networks are really fast mixing is not verified before, and this could potentially affect the performance of such systems based on the fast mixing property. To address this problem, we measure the mixing time of several social graphs, the time that it takes a random walk on the graph to approach the stationary distribution of that graph, using two techniques. First, we use the second largest eigenvalue modulus which bounds the mixing time. Second, we sample initial distributions and compute the random walk length required to achieve probability distributions close to the stationary distribution. Our findings show that the mixing time of social graphs is much larger than anticipated, and being used in literature, and this implies that either the current security systems based on fast mixing have weaker utility guarantees or have to be less efficient, with less security guarantees, in order to compensate for the slower mixing.