Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network

Link prediction is one of the fundamental research problems in network analysis. Intuitively, it involves identifying the edges that are most likely to be added to a given network, or the edges that appear to be missing from the network when in fact they are present. Various algorithms have been pro...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Waniek, Marcin, Zhou, Kai, Vorobeychik, Yevgeniy, Moro, Esteban, Michalak, Tomasz P, Rahwan, Talal
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Waniek, Marcin
Zhou, Kai
Vorobeychik, Yevgeniy
Moro, Esteban
Michalak, Tomasz P
Rahwan, Talal
description Link prediction is one of the fundamental research problems in network analysis. Intuitively, it involves identifying the edges that are most likely to be added to a given network, or the edges that appear to be missing from the network when in fact they are present. Various algorithms have been proposed to solve this problem over the past decades. For all their benefits, such algorithms raise serious privacy concerns, as they could be used to expose a connection between two individuals who wish to keep their relationship private. With this in mind, we investigate the ability of such individuals to evade link prediction algorithms. More precisely, we study their ability to strategically alter their connections so as to increase the probability that some of their connections remain unidentified by link prediction algorithms. We formalize this question as an optimization problem, and prove that finding an optimal solution is NP-complete. Despite this hardness, we show that the situation is not bleak in practice. In particular, we propose two heuristics that can easily be applied by members of the general public on existing social media. We demonstrate the effectiveness of those heuristics on a wide variety of networks and against a plethora of link prediction algorithms.
doi_str_mv 10.48550/arxiv.1809.00152
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1809_00152</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1809_00152</sourcerecordid><originalsourceid>FETCH-LOGICAL-a672-209d8919204c0d5ca4f90b5b002f04f2c8ce4334eeb87645fd2b173541e984d83</originalsourceid><addsrcrecordid>eNotz71OwzAYhWEvDKhwAUx8N5Dw2bEbmy2qgCBFBUEWFiLHP2AljZETKNw9amE6y6sjPYRcUMy5FAKvdPoOXzmVqHJEKtgpea2WRZsB2ji6pCfjIHpowjTAY3I2mCXECarxLaawvO_ma6jjHpYIdbAOXuJngic36kM1Q5hAw3M0QY-wdcs-puGMnHg9zu78f1ekvb1pN3XWPNzdb6om0-uSZQyVlYoqhtygFUZzr7AXPSLzyD0z0jheFNy5XpZrLrxlPS0LwalTkltZrMjl3-0R2H2ksNPppztAuyO0-AVVJk0u</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network</title><source>arXiv.org</source><creator>Waniek, Marcin ; Zhou, Kai ; Vorobeychik, Yevgeniy ; Moro, Esteban ; Michalak, Tomasz P ; Rahwan, Talal</creator><creatorcontrib>Waniek, Marcin ; Zhou, Kai ; Vorobeychik, Yevgeniy ; Moro, Esteban ; Michalak, Tomasz P ; Rahwan, Talal</creatorcontrib><description>Link prediction is one of the fundamental research problems in network analysis. Intuitively, it involves identifying the edges that are most likely to be added to a given network, or the edges that appear to be missing from the network when in fact they are present. Various algorithms have been proposed to solve this problem over the past decades. For all their benefits, such algorithms raise serious privacy concerns, as they could be used to expose a connection between two individuals who wish to keep their relationship private. With this in mind, we investigate the ability of such individuals to evade link prediction algorithms. More precisely, we study their ability to strategically alter their connections so as to increase the probability that some of their connections remain unidentified by link prediction algorithms. We formalize this question as an optimization problem, and prove that finding an optimal solution is NP-complete. Despite this hardness, we show that the situation is not bleak in practice. In particular, we propose two heuristics that can easily be applied by members of the general public on existing social media. We demonstrate the effectiveness of those heuristics on a wide variety of networks and against a plethora of link prediction algorithms.</description><identifier>DOI: 10.48550/arxiv.1809.00152</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Social and Information Networks</subject><creationdate>2018-09</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,777,882</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1809.00152$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1809.00152$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Waniek, Marcin</creatorcontrib><creatorcontrib>Zhou, Kai</creatorcontrib><creatorcontrib>Vorobeychik, Yevgeniy</creatorcontrib><creatorcontrib>Moro, Esteban</creatorcontrib><creatorcontrib>Michalak, Tomasz P</creatorcontrib><creatorcontrib>Rahwan, Talal</creatorcontrib><title>Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network</title><description>Link prediction is one of the fundamental research problems in network analysis. Intuitively, it involves identifying the edges that are most likely to be added to a given network, or the edges that appear to be missing from the network when in fact they are present. Various algorithms have been proposed to solve this problem over the past decades. For all their benefits, such algorithms raise serious privacy concerns, as they could be used to expose a connection between two individuals who wish to keep their relationship private. With this in mind, we investigate the ability of such individuals to evade link prediction algorithms. More precisely, we study their ability to strategically alter their connections so as to increase the probability that some of their connections remain unidentified by link prediction algorithms. We formalize this question as an optimization problem, and prove that finding an optimal solution is NP-complete. Despite this hardness, we show that the situation is not bleak in practice. In particular, we propose two heuristics that can easily be applied by members of the general public on existing social media. We demonstrate the effectiveness of those heuristics on a wide variety of networks and against a plethora of link prediction algorithms.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Social and Information Networks</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz71OwzAYhWEvDKhwAUx8N5Dw2bEbmy2qgCBFBUEWFiLHP2AljZETKNw9amE6y6sjPYRcUMy5FAKvdPoOXzmVqHJEKtgpea2WRZsB2ji6pCfjIHpowjTAY3I2mCXECarxLaawvO_ma6jjHpYIdbAOXuJngic36kM1Q5hAw3M0QY-wdcs-puGMnHg9zu78f1ekvb1pN3XWPNzdb6om0-uSZQyVlYoqhtygFUZzr7AXPSLzyD0z0jheFNy5XpZrLrxlPS0LwalTkltZrMjl3-0R2H2ksNPppztAuyO0-AVVJk0u</recordid><startdate>20180901</startdate><enddate>20180901</enddate><creator>Waniek, Marcin</creator><creator>Zhou, Kai</creator><creator>Vorobeychik, Yevgeniy</creator><creator>Moro, Esteban</creator><creator>Michalak, Tomasz P</creator><creator>Rahwan, Talal</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20180901</creationdate><title>Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network</title><author>Waniek, Marcin ; Zhou, Kai ; Vorobeychik, Yevgeniy ; Moro, Esteban ; Michalak, Tomasz P ; Rahwan, Talal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a672-209d8919204c0d5ca4f90b5b002f04f2c8ce4334eeb87645fd2b173541e984d83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Social and Information Networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Waniek, Marcin</creatorcontrib><creatorcontrib>Zhou, Kai</creatorcontrib><creatorcontrib>Vorobeychik, Yevgeniy</creatorcontrib><creatorcontrib>Moro, Esteban</creatorcontrib><creatorcontrib>Michalak, Tomasz P</creatorcontrib><creatorcontrib>Rahwan, Talal</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Waniek, Marcin</au><au>Zhou, Kai</au><au>Vorobeychik, Yevgeniy</au><au>Moro, Esteban</au><au>Michalak, Tomasz P</au><au>Rahwan, Talal</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network</atitle><date>2018-09-01</date><risdate>2018</risdate><abstract>Link prediction is one of the fundamental research problems in network analysis. Intuitively, it involves identifying the edges that are most likely to be added to a given network, or the edges that appear to be missing from the network when in fact they are present. Various algorithms have been proposed to solve this problem over the past decades. For all their benefits, such algorithms raise serious privacy concerns, as they could be used to expose a connection between two individuals who wish to keep their relationship private. With this in mind, we investigate the ability of such individuals to evade link prediction algorithms. More precisely, we study their ability to strategically alter their connections so as to increase the probability that some of their connections remain unidentified by link prediction algorithms. We formalize this question as an optimization problem, and prove that finding an optimal solution is NP-complete. Despite this hardness, we show that the situation is not bleak in practice. In particular, we propose two heuristics that can easily be applied by members of the general public on existing social media. We demonstrate the effectiveness of those heuristics on a wide variety of networks and against a plethora of link prediction algorithms.</abstract><doi>10.48550/arxiv.1809.00152</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1809.00152
ispartof
issn
language eng
recordid cdi_arxiv_primary_1809_00152
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Social and Information Networks
title Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T22%3A35%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Attack%20Tolerance%20of%20Link%20Prediction%20Algorithms:%20How%20to%20Hide%20Your%20Relations%20in%20a%20Social%20Network&rft.au=Waniek,%20Marcin&rft.date=2018-09-01&rft_id=info:doi/10.48550/arxiv.1809.00152&rft_dat=%3Carxiv_GOX%3E1809_00152%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true