Ostra: Leveraging Trust to Thwart Unwanted Communication

نویسندگان

  • Alan Mislove
  • Ansley Post
  • Peter Druschel
  • Krishna P. Gummadi
چکیده

Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at near zero marginal cost. This property enables information to be exchanged freely: anyone with Internet access can publish content. Unfortunately, the same property opens the door to unwanted communication, marketing, and propaganda. Examples include email spam, Web search engine spam, inappropriately labeled content on YouTube, and unwanted contact invitations in Skype. Unwanted communication wastes one of the most valuable resources in the information age: human attention. In this paper, we explore the use of trust relationships, such as social links, to thwart unwanted communication. Such relationships already exist in many application settings today. Our system, Ostra, bounds the total amount of unwanted communication a user can produce based on the number of trust relationships the user has, and relies on the fact that it is difficult for a user to create arbitrarily many trust relationships. Ostra is applicable to both messaging systems such as email and content-sharing systems such as YouTube. It does not rely on automatic classification of content, does not require global user authentication, respects each recipient’s idea of unwanted communication, and permits legitimate communication among parties who have not had prior contact. An evaluation based on data gathered from an online social networking site shows that Ostra effectively thwarts unwanted communication while not impeding legitimate communication.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introducing Social Trust to Collaborative Spam Mitigation

We propose SocialFilter, a trust-aware collaborative spam mitigation system. SocialFilter enables nodes with no email classification functionality to query the network on whether a host is a spammer. It employs Sybil-resilient trust inference to weigh the reports concerning spamming hosts that collaborating spam-detecting nodes (reporters) submit to the system. It weighs the spam reports accord...

متن کامل

A Light Weight Trust Based Authentication Mechanism to Thwart Black Hole Attack in Manet

Providing secure routing in MANET environment is a difficult task due to its distinct nature. In MANET, routing protocols are designed to cope with the network operations but in nature they are affecting by both internal and external attacks. Black hole attack is one kind of internal attack that affects routing operation by retaining all incoming packets. This type of attack is very hard to pre...

متن کامل

Blowing the Whistle

Leniency clauses, offering cartelists legal immunity if they blow the whistle on each other, is a recent anti-trust innovation. The authorities wish to thwart cartels and promote competition. This effect is not evident, however; whistle-blowing may enforce trust and collusion by providing a tool for cartelists to punish each other. We examine the impact of leniency law, and other rules, theoret...

متن کامل

cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks

In a Cyclic Mobile Ad Hoc Network (CMANET) where nodes move cyclically, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggregation issues. Unlike trust management in conventional peer-to-peer (P2P) systems, trust management in MANETs is based on simple neighbor trust relationships and also location and time dependent. In this paper, we foc...

متن کامل

Social-Based Trust Mechanisms in Mobile Opportunistic Networks

The fundamental challenge in opportunistic networking, regardless of the application, is enabling node cooperation to forward a message. While node cooperation is considered as a fundamental property in such networks, ensuring such a property between two devices in mobile opportunistic networks remains largely unexplored. In this paper, we investigate the potential impact of the lack of trust o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008