Ostra: Leveraging trust to thwart unwanted...

75
Ostra: Leveraging trust to thwart unwanted communication Alan Mislove †‡ Ansley Post †‡ Peter Druschel Krishna Gummadi MPI-SWS Rice University NSDI 2008

Transcript of Ostra: Leveraging trust to thwart unwanted...

Page 1: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

Ostra: Leveraging trust to thwart

unwanted communication

Alan Mislove†‡ Ansley Post†‡ Peter Druschel† Krishna Gummadi†

†MPI-SWS ‡Rice University

NSDI 2008

Page 2: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Digital communication

Electronic systems provide low-cost communicationEmailVoIPBlogsIMContent-sharing

Democratized content publication Can make content available to (millions of) users

2

Page 3: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Unwanted communication

Low cost abused to send unwanted communicationSpamUnwanted Skype invitations

Affecting content-sharing sites Mislabeled content on YouTube

Users are not accountableBanned users can create new identity

3

Page 4: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

Filter based on contentHard for rich media (videos, photos)

16.04.2008 NSDI’08 Alan Mislove

Previous approaches

4

VIAGRA

Page 5: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

Filter based on contentHard for rich media (videos, photos)

16.04.2008 NSDI’08 Alan Mislove

Previous approaches

4

Charge money to sendRequires micropayment infrastructure

VIAGRA

Page 6: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

Filter based on contentHard for rich media (videos, photos)

16.04.2008 NSDI’08 Alan Mislove

Previous approaches

4

Charge money to sendRequires micropayment infrastructure

Introduce strong identitiesResisted by users

VIAGRA

Page 7: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Ostra

New approach to preventing unwanted communicationLeverages an (existing) social network

Works in conjunction with existing communication systemNo content filteringNo additional monetary costNo strong identities

Key idea: Exploit cost of maintaining social relationshipsInspired by trust in offline world

5

Page 8: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Outline

Inspiration: Hawala

Ostra in detail

Evaluation

Related work

Conclusion

6

Page 9: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

Inspiration: Hawala

Page 10: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

System for transferring moneyOriginated in India, centuries old

Give money to a hawala dealerOften someone you know alreadyTransfered via hawala dealer social network

Hawala dealers only exchange notesSettle up in the future

Comparable to debt between banksBut trust is only pairwise

16.04.2008 NSDI’08 Alan Mislove

Hawala

8

India

$

Page 11: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

System for transferring moneyOriginated in India, centuries old

Give money to a hawala dealerOften someone you know alreadyTransfered via hawala dealer social network

Hawala dealers only exchange notesSettle up in the future

Comparable to debt between banksBut trust is only pairwise

16.04.2008 NSDI’08 Alan Mislove

Hawala

8

Hawala dealers

India

$

Page 12: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

System for transferring moneyOriginated in India, centuries old

Give money to a hawala dealerOften someone you know alreadyTransfered via hawala dealer social network

Hawala dealers only exchange notesSettle up in the future

Comparable to debt between banksBut trust is only pairwise

16.04.2008 NSDI’08 Alan Mislove

Hawala

8

Hawala dealers

India

$

Page 13: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

System for transferring moneyOriginated in India, centuries old

Give money to a hawala dealerOften someone you know alreadyTransfered via hawala dealer social network

Hawala dealers only exchange notesSettle up in the future

Comparable to debt between banksBut trust is only pairwise

16.04.2008 NSDI’08 Alan Mislove

Hawala

8

Hawala dealers

India

$

Page 14: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Why does hawala work?

9

Page 15: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Why does hawala work?

Links take effort to form/maintainCan’t get new links easily

9

Page 16: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Why does hawala work?

Links take effort to form/maintainCan’t get new links easily

Misbehavior results in being ostracizedShort-term gain vs. long-term loss

9

Page 17: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Why does hawala work?

Links take effort to form/maintainCan’t get new links easily

Misbehavior results in being ostracizedShort-term gain vs. long-term loss

Result: Social network used to transfer money

9

Page 18: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

Ostra

Page 19: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Ostra

Uses social network to prevent unwanted communicationSame mechanism as hawala

Ostra does not need a high level of trustCost of failure in hawala is high → high level of trust neededFar less at stake in Ostra

Can be applied toMessaging (email, IM, VoIP)Group communication (mailing lists)Content sharing (YouTube, Flickr)

11

Page 20: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Ostra’s social network

Most communication systems embed social networkEmail contacts IM buddiesSocial network friends

Can be explicit or implicit

AssumptionsLinks take some effort to form and maintainTrusted site maintains social network

12

Page 21: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Recipients classify messagesCan be implicit (e.g., deleting or responding to a message)

Messages are sent directly

Page 22: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Recipients classify messagesCan be implicit (e.g., deleting or responding to a message)

Messages are sent directly

Page 23: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Destination

Source

Recipients classify messagesCan be implicit (e.g., deleting or responding to a message)

Messages are sent directly

Page 24: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Destination

Source

Recipients classify messagesCan be implicit (e.g., deleting or responding to a message)

Messages are sent directly

Page 25: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Destination

Source

Recipients classify messagesCan be implicit (e.g., deleting or responding to a message)

Messages are sent directly

Page 26: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

xDestination

Source

Recipients classify messagesCan be implicit (e.g., deleting or responding to a message)

Messages are sent directly

Page 27: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Source

Destination

Recipients classify messagesCan be implicit (e.g., deleting or responding to a message)

Messages are sent directly

Page 28: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Source

Destination

Recipients classify messagesCan be implicit (e.g., deleting or responding to a message)

Messages are sent directly

Page 29: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Source

Destination

Recipients classify messagesCan be implicit (e.g., deleting or responding to a message)

Messages are sent directly

Page 30: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Source

Destination

Recipients classify messagesCan be implicit (e.g., deleting or responding to a message)

Messages are sent directly

Page 31: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Source

Destination

x

Recipients classify messagesCan be implicit (e.g., deleting or responding to a message)

Messages are sent directly

Page 32: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Link accounting

14

B

0

Page 33: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Link accounting

Each link has a credit balance BHow much one user is “in debt” with the other

14

B

0

Page 34: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Link accounting

Each link has a credit balance BHow much one user is “in debt” with the other

Link also has credit bounds [L,U]Maximal debt each user is willing to accept (L ≤ B ≤ U)

14

B

L U0

Page 35: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

-5 +5

16.04.2008 NSDI’08 Alan Mislove

Link accounting

Each link has a credit balance BHow much one user is “in debt” with the other

Link also has credit bounds [L,U]Maximal debt each user is willing to accept (L ≤ B ≤ U)

14

-1

0

Page 36: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Sending a message

15

When message is sent, lower bound is temporarily adjustedReset once message classifiedIf adjustment cannot be made, message is delayed

If recipient marks message unwanted, balance is adjusted

0

Page 37: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Sending a message

15

When message is sent, lower bound is temporarily adjustedReset once message classifiedIf adjustment cannot be made, message is delayed

If recipient marks message unwanted, balance is adjusted

0

Page 38: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Sending a message

15

When message is sent, lower bound is temporarily adjustedReset once message classifiedIf adjustment cannot be made, message is delayed

If recipient marks message unwanted, balance is adjusted

0

Page 39: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Sending a message

15

When message is sent, lower bound is temporarily adjustedReset once message classifiedIf adjustment cannot be made, message is delayed

If recipient marks message unwanted, balance is adjusted

0

Page 40: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Sending a message

15

When message is sent, lower bound is temporarily adjustedReset once message classifiedIf adjustment cannot be made, message is delayed

If recipient marks message unwanted, balance is adjusted

0

Page 41: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Sending to non-friends

16

Process iterates for sending to non-friendsFind any path from source to destination

Intermediate users indifferent to outcomeIn either case, total credit is the same

Page 42: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Sending to non-friends

16

Process iterates for sending to non-friendsFind any path from source to destination

Intermediate users indifferent to outcomeIn either case, total credit is the same

Page 43: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Sending to non-friends

16

Process iterates for sending to non-friendsFind any path from source to destination

Intermediate users indifferent to outcomeIn either case, total credit is the same

Page 44: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

S

16.04.2008 NSDI’08 Alan Mislove

Guarantees

17

Received spam

What is the per-user bound on sending spam?

Page 45: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

S

16.04.2008 NSDI’08 Alan Mislove

Guarantees

17

Received spam

What is the per-user bound on sending spam?

Lower bound

|L| +

Page 46: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

S

16.04.2008 NSDI’08 Alan Mislove

Guarantees

17

Received spam

What is the per-user bound on sending spam?

N !Number of links

Lower bound

|L| +

Page 47: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Guarantees for groups

Analysis is same for any subgraphConservation of credit: Credit can neither be created nor destroyed

Result: Collusion doesn’t help attackers

18

N ! |L| + S

Page 48: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Guarantees for groups

Analysis is same for any subgraphConservation of credit: Credit can neither be created nor destroyed

Result: Collusion doesn’t help attackers

18

N

N ! |L| + S

Page 49: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Adjustments

An average user will occasionallyReceive an unwanted message (receive credit)Send mail marked as unwanted (lose credit)

May cause user’s balance to hit boundsIf (B = L), cannot sendIf (B = U), cannot receive

Introduce credit decay dOutstanding balance (+ or −) decays (e.g., d=10% per day)

Preserves conservation of credit

19

Page 50: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Adjustments (cont.)

Offline users may cause credit reservationBounds adjusted until message classified

Introduce classification timeout T Message treated as “wanted” if unclassified after T

Also offers plausible deniability of receipt

20

Page 51: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Applying Ostra to content-sharing

Create “virtual” identity for content-sharing siteUploads are message to this identity

Site uses existing mechanisms to determine if unwanted

21

Page 52: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Ostra security

Can conspiring users “create” credit?

Could Ostra reach starvation?

What about users with multiple identities?

Can attackers disconnect the network?

22

Page 53: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Ostra security

Can conspiring users “create” credit?

Could Ostra reach starvation?

What about users with multiple identities?

Can attackers disconnect the network?

22

} In paper

Page 54: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

What about multiple identities?

23

Page 55: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

What about multiple identities?

23

{MultipleIdentities

Page 56: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

What about multiple identities?

23

{MultipleIdentities

Page 57: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

What about multiple identities?

23

{MultipleIdentities

Page 58: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Can attackers target vital links?

Social networks tend to have dense core [IMC’07]

Min-cut is almost always at source or destination (see paper)

24

Page 59: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Can attackers target vital links?

Social networks tend to have dense core [IMC’07]

Min-cut is almost always at source or destination (see paper)

24

Page 60: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Evaluation

Is Ostra effective in blocking unwanted communication?

Does Ostra delay message delivery?

What is the complexity of finding paths?

How do parameter settings affect performance?

Does incorrect message classification break Ostra?

Are there vulnerable links in social networks?

25

Page 61: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Evaluation

Is Ostra effective in blocking unwanted communication?

Does Ostra delay message delivery?

What is the complexity of finding paths?

How do parameter settings affect performance?

Does incorrect message classification break Ostra?

Are there vulnerable links in social networks?

25

} In paper

Page 62: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Simulating Ostra

Need a social network and a message traceSocial network trace from YouTube (446K users, 1.7M links)Email trace from MPI (150 users for 3 months, 13K messages)

Simulated Ostra in three scenariosMessaging with random trafficMessaging with proximity-biased trafficCentralized content-sharing site

Simulation parametersSelected random attacking usersBounds of [-3,3] and d=10% per day

26

Page 63: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Does Ostra block spammers?

Ostra limits amount of unwanted communicationEven with 20% attackers, only 4 messages/good user/week

27

0.1

0.01

0.001

0.0001

10.10.010.001

Un

wa

nte

d m

es

sa

ge

s r

ec

eiv

ed

(me

ss

ag

es

/us

er/

we

ek

)

Proportion of attackers (%)

Expected

RandomProximityYouTube

Page 64: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Do messages get delayed?

Very few messages get delayed

28

Classification delay (h) Fraction delayed Average delivery delay (h)

2 1.3% 4.1

6 1.3% 16.6

Page 65: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Related work

Preventing unwanted communicationContent filtering: DSPAM, SpamAssassinWhitelisting: LinkedIn, RE: [NSDI’06]

Using social networksPGP Web of TrustSybilGuard [SIGCOMM’06]

SybilLimit [Oakland’08]

29

Page 66: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Conclusion

Ostra: a new approach to preventing unwanted communicationInspired by offline trust

Leverages social network that often already exists

Desirable propertiesDoes not require global user identitiesDoes not rely on automatic content classificationRespects recipient’s notion of unwanted communication

Can be applied to messaging, as well as content sharing

30

Page 67: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Questions?

31

Page 68: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove 32

Page 69: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

Bound on amount of spam becomes bound on rate of spam

d ! N ! |L| + S

16.04.2008 NSDI’08 Alan Mislove

Updated guarantees

33

System decay

Rate of incoming spamNumber of links

Lower bound

Page 70: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

What’s up with U and L?

Link balance B and bounds [L,U] are from one user’s perspectiveLink can be viewed from from other’s perspective, too

For link X ↔ Y, all values symmetric

BX = −BY

LX = −UY

UX = −LY

34

=

Page 71: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Why can’t I receive when B=U?

When B=U on a linkFor other user, B=L

Thus, other user can’t sendSo you can’t receive

35

=

Page 72: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Full decentralization

So far, assumed a centralized siteKeeps link stateFinds paths

In paper, sketch of decentralized designRouting using techniques from MANETsLink state is kept decentralized

Work in progress

36

Page 73: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Can attackers target users?

Can attackers prevent users from receiving messages?Send victim lots of unwanted communicationVictim has too much credit to receive

But, victim has simple way outCan “donate” credit to friendsAnd attackers quickly run out of credit

37

Page 74: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

Who do people talk to?

Users communicate with close usersReduces path computation complexity

38

0 0.2 0.4 0.6 0.8

1

1 2 3 4 5 6 7

CDF

Distance between source and destination (hops)

Observed

Random Destination Selection

Page 75: Ostra: Leveraging trust to thwart unwanted communicationamislove/slides/Ostra-NSDI-slides.pdf16.04.2008 NSDI’08 Alan Mislove Unwanted communication Low cost abused to send unwanted

16.04.2008 NSDI’08 Alan Mislove

More on content sharing

Why don’t links in the YouTube graph run out of credit?

39