Guard your connections: infiltration of a trust/reputation based network

  • Authors:
  • Malik Magdon-Ismail;Brian Orecchio

  • Affiliations:
  • Rensselaer Polytechnic Institute, Troy, NY;Rensselaer Polytechnic Institute, Troy, NY

  • Venue:
  • Proceedings of the 3rd Annual ACM Web Science Conference
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

We study infiltration of a trust/reputation based network. At every time step, the agent solicits a connection request (friend request). The goal of the agent is to amass as many such connections as possible to further its goals. Our model for such an infiltration of a network relies on two properties of the actors in the network. They desire more links (an ego effect); they are more likely to connect to trusted or credible nodes (the trust by reference effect). We demonstrate the following proporties of this infiltration. (i) The trust by reference effect is critical. If agents are not trusting enough, then the network is robust to infiltration; however, with logarithmically more trust, the process phase transitions to significant infiltration. (ii) The network structure is important. If the trust effect is small, then well clustered networks (typical social networks) are easier to infiltrate; when the trust effect is larger, then networks with large expansion (for example Erdös-Rényi random graphs) are easier to infiltrate. (iii) The algorithm used by the agent plays a significant role in success of the infiltration. Random connection requests are much less successful than even simple greedy strategies, even if those greedy strategies are restricted to only using local information.