GULYÁS, Gábor György, Ph.D.

Social Network De-anonymization

 What? Take me to the explanation!

DIY: test de-anonymization for yourself – in the browser!

Below, you can run de-anonymization attacks and compare results on a scoreboard. Attacks run on two graphs: the grey is the background information of the attacker where user identities are known, and the blue is the anonymized network with sensitive information.

  • Parameter Θ controls the greediness for both algorithms: higher Θ rates will make the algorithms more precautios (less mappings with less error).
  • The #seeds determines the number of initial mappings before the algorithms are run.
  • With parameter δ you can set the sensitiveness of the Blb attack to node degrees. For example, with low δ it will not seriously consider node degree differences, but with high δ the difference between node degrees will play a significant role. We found that it is also a control of greediness, and as a rule of thumb it is good to have it around 0.1-0.5.
  • You can choose between three datasets to play with. The first one is quite small and an easy prey for de-anonymization (the two graphs are identical). It will surely run on older smartphones, though. Datset #2 and #3 are larger ones with varying levels of differences in the background and anonymized graphs.
 

Controls

Algorithm


Start

Params

Θ =
#seeds =
δ =

 

 Click me!

to see the attacks in action – right in your browser!


 
 
Gábor György Gulyás, PhD – © 2025 all rights reserved