SlideShare a Scribd company logo
1 of 13
Sei gradi di separazione
A cura di :
Antoniazzi Francesco Andrea
Ragazzo Alessio
La teoria
La teoria dei sei gradi di separazione afferma che
qualunque persona è collegata a qualunque altra
persona attraverso una catena di conoscenze con
non più di 5 intermediari.
1 2 3 4 5 6
Esempio con Attori
4 degree of separation
http://oracleofbacon.org
Un po’ di Storia
• Teoria proposta nel 1929 dallo scrittore ungherese
Frigyes Karinthy, nel suo racconto “Catene”.
• Nel 1967 il sociologo americano Stanley Milgram testa
la “teoria del mondo piccolo".
• Nel 2001 Duncan Watts, professore della Columbia
University, ricrea l'esperimento di Milgram su Internet.
• I gradi di separazione si riducono a quattro, la
scoperta dei ricercatori della Statale di Milano
(25 nov 2011).
Samy’s worm
• Codice “malevolo” su MySpace
• Chi visualizza la pagina di Samy si trova scritto in
bacheca “Samy is my Hero”
• Modifica allo script : chi visualizza una pagina
infettata visualizza lo stesso messaggio e si infetta a
sua volta
• Infetta 1 milione di account in appena 18 ore
• Viene processato e gli viene vietato l’accesso ad
internet per tre anni
but most of all, Samy is my hero
Metodi di verifica per la struttura facebook
• L’architettura facebook può essere visualizzata
come un grafo G = ( Utenti, Amicizie )
• Per ogni coppia di utenti si vuole calcolare la
lunghezza del cammino minimo che li collega
• Algoritmo di Floyd-Warshall
• Problema :
Tempo di esecuzione = n3
Spazio necessario = n2
Dove n = numero di utenti
n > 1.6 miliardi !!!
Facebook network
• Algoritmo statistico per ovviare al problema della
quantità di tempo necessaria al processo
• FB dichiara che in media gli utenti registrati sono
collegati da 3.57 gradi di separazione
Ma possiamo per questo affermare dimostrata la teoria ?
Assolutamente no
Ogni utente ha amicizie fittizie, le quali falsano
completamente il risultato
Poiché (come in seguito dimostrato) poche
relazioni casuali portano ad avere la stessa
connettività ma con un grado molto minore di
separazione fra gli utenti !
https://github.com/luckyunlock/SeiGradiDiSeparazione.git
https://github.com/luckyunlock/SeiGradiDiSeparazione.git
“I read somewhere that everybody on this planet is
separated by only six other people.
Six degrees of separation.
Between us and everybody else on this planet.
The president of the United States. A gondolier in Venice.
Fill in the names. . . .
How every person is a new door, opening up into other
worlds. Six degrees of separation between me and everyone
else on this planet.
But to find the right six people . . .” – John Guare,
Six Degrees of Separation (1990)
What a small world !
Antoniazzi Francesco Andrea
Ragazzo Alessio
Grazie per l’attenzione
Wikipedia
https://en.wikipedia.org/wiki/Six_degrees_of_separation
Facebook Research
https://research.fb.com/three-and-a-half-degrees-of-separation/
Sammy’s Worm
https://en.wikipedia.org/wiki/Samy_(computer_worm)
Artist degrees of Separation
http://oracleofbacon.org/
Youtube video about six degrees of Separation
https://www.youtube.com/watch?v=TcxZSmzPw8k
Repository github (Sei gradi di separazione)
https://github.com/luckyunlock/SeiGradiDiSeparazione.git
Small world experiment
https://en.wikipedia.org/wiki/Small-world_experiment
Bibliografia

More Related Content

What's hot

Damn Vulnerable Chemical Process
Damn Vulnerable Chemical ProcessDamn Vulnerable Chemical Process
Damn Vulnerable Chemical ProcessPositive Hack Days
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to MetasploitHossein Yavari
 
Mitre Attack - Credential Dumping - updated.pptx
Mitre Attack - Credential Dumping - updated.pptxMitre Attack - Credential Dumping - updated.pptx
Mitre Attack - Credential Dumping - updated.pptxwaizuq
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Mastering Microservices 2022 - Debugging distributed systems
Mastering Microservices 2022 - Debugging distributed systemsMastering Microservices 2022 - Debugging distributed systems
Mastering Microservices 2022 - Debugging distributed systemsBert Jan Schrijver
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
 
Sql injection with sqlmap
Sql injection with sqlmapSql injection with sqlmap
Sql injection with sqlmapHerman Duarte
 
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingPowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingNikhil Mittal
 
An Actionable Framework for Understanding and Improving Developer Experience
An Actionable Framework for Understanding and Improving Developer ExperienceAn Actionable Framework for Understanding and Improving Developer Experience
An Actionable Framework for Understanding and Improving Developer ExperienceMargaret-Anne Storey
 
Web (dis)assembly
Web (dis)assemblyWeb (dis)assembly
Web (dis)assemblyShakacon
 
The AI Revolution - Into the Age of Imagination - Tony Aubé at WAQ 23
The AI Revolution - Into the Age of Imagination - Tony Aubé at WAQ 23The AI Revolution - Into the Age of Imagination - Tony Aubé at WAQ 23
The AI Revolution - Into the Age of Imagination - Tony Aubé at WAQ 23Tony Aubé
 
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...Chris Gates
 
PurpleSharp BlackHat Arsenal Asia
PurpleSharp BlackHat Arsenal AsiaPurpleSharp BlackHat Arsenal Asia
PurpleSharp BlackHat Arsenal AsiaMauricio Velazco
 
Secure Code Warrior - Os command injection
Secure Code Warrior - Os command injectionSecure Code Warrior - Os command injection
Secure Code Warrior - Os command injectionSecure Code Warrior
 
Windows attacks - AT is the new black
Windows attacks - AT is the new blackWindows attacks - AT is the new black
Windows attacks - AT is the new blackChris Gates
 
Claroty Support L1 - Architecture components and terms.pptx
Claroty Support L1 - Architecture components and terms.pptxClaroty Support L1 - Architecture components and terms.pptx
Claroty Support L1 - Architecture components and terms.pptxLeninHernnCortsLlang
 
SEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill ChainSEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill ChainErik Van Buggenhout
 

What's hot (20)

Damn Vulnerable Chemical Process
Damn Vulnerable Chemical ProcessDamn Vulnerable Chemical Process
Damn Vulnerable Chemical Process
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
 
Mitre Attack - Credential Dumping - updated.pptx
Mitre Attack - Credential Dumping - updated.pptxMitre Attack - Credential Dumping - updated.pptx
Mitre Attack - Credential Dumping - updated.pptx
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
System Design
System DesignSystem Design
System Design
 
Mastering Microservices 2022 - Debugging distributed systems
Mastering Microservices 2022 - Debugging distributed systemsMastering Microservices 2022 - Debugging distributed systems
Mastering Microservices 2022 - Debugging distributed systems
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Sql injection with sqlmap
Sql injection with sqlmapSql injection with sqlmap
Sql injection with sqlmap
 
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingPowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
 
An Actionable Framework for Understanding and Improving Developer Experience
An Actionable Framework for Understanding and Improving Developer ExperienceAn Actionable Framework for Understanding and Improving Developer Experience
An Actionable Framework for Understanding and Improving Developer Experience
 
FAST Agile
FAST AgileFAST Agile
FAST Agile
 
Web (dis)assembly
Web (dis)assemblyWeb (dis)assembly
Web (dis)assembly
 
Introduction to threat_modeling
Introduction to threat_modelingIntroduction to threat_modeling
Introduction to threat_modeling
 
The AI Revolution - Into the Age of Imagination - Tony Aubé at WAQ 23
The AI Revolution - Into the Age of Imagination - Tony Aubé at WAQ 23The AI Revolution - Into the Age of Imagination - Tony Aubé at WAQ 23
The AI Revolution - Into the Age of Imagination - Tony Aubé at WAQ 23
 
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
 
PurpleSharp BlackHat Arsenal Asia
PurpleSharp BlackHat Arsenal AsiaPurpleSharp BlackHat Arsenal Asia
PurpleSharp BlackHat Arsenal Asia
 
Secure Code Warrior - Os command injection
Secure Code Warrior - Os command injectionSecure Code Warrior - Os command injection
Secure Code Warrior - Os command injection
 
Windows attacks - AT is the new black
Windows attacks - AT is the new blackWindows attacks - AT is the new black
Windows attacks - AT is the new black
 
Claroty Support L1 - Architecture components and terms.pptx
Claroty Support L1 - Architecture components and terms.pptxClaroty Support L1 - Architecture components and terms.pptx
Claroty Support L1 - Architecture components and terms.pptx
 
SEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill ChainSEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill Chain
 

Viewers also liked

Viewers also liked (20)

Social media
Social mediaSocial media
Social media
 
YouTube
YouTubeYouTube
YouTube
 
Project Work Federica Trevisan
Project Work Federica TrevisanProject Work Federica Trevisan
Project Work Federica Trevisan
 
Google Cloud Computing & Project Work
Google Cloud Computing & Project WorkGoogle Cloud Computing & Project Work
Google Cloud Computing & Project Work
 
SEO
SEOSEO
SEO
 
Big Data Social Media & Smart Apps
Big Data Social Media & Smart AppsBig Data Social Media & Smart Apps
Big Data Social Media & Smart Apps
 
Smart life
Smart lifeSmart life
Smart life
 
Petra Giada
Petra GiadaPetra Giada
Petra Giada
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Data driven storytelling
Data driven storytellingData driven storytelling
Data driven storytelling
 
Multimedia streaming e content curation
Multimedia streaming e content curationMultimedia streaming e content curation
Multimedia streaming e content curation
 
Sell&Buy coupons
Sell&Buy couponsSell&Buy coupons
Sell&Buy coupons
 
OpenData_CollectiveKnowledge
OpenData_CollectiveKnowledge OpenData_CollectiveKnowledge
OpenData_CollectiveKnowledge
 
Personal branding
Personal brandingPersonal branding
Personal branding
 
Progressive Web Apps
Progressive Web AppsProgressive Web Apps
Progressive Web Apps
 
Big Data
Big DataBig Data
Big Data
 
Personal branding
Personal brandingPersonal branding
Personal branding
 
Open Data
Open DataOpen Data
Open Data
 
Big data
Big dataBig data
Big data
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Similar to Sei gradi di separazione

Similar to Sei gradi di separazione (6)

MCS Sissa - New Media - 01 Reti e individui
MCS Sissa - New Media - 01 Reti e individuiMCS Sissa - New Media - 01 Reti e individui
MCS Sissa - New Media - 01 Reti e individui
 
Come e perchè costruire un siti internet
Come e perchè costruire un siti internetCome e perchè costruire un siti internet
Come e perchè costruire un siti internet
 
Informatica umanistica 2016-3
Informatica umanistica   2016-3Informatica umanistica   2016-3
Informatica umanistica 2016-3
 
12 - I Social Media - 16/17
12 - I Social Media - 16/1712 - I Social Media - 16/17
12 - I Social Media - 16/17
 
12 - Social media
12 - Social media12 - Social media
12 - Social media
 
I social media
I social mediaI social media
I social media
 

Sei gradi di separazione

  • 1. Sei gradi di separazione A cura di : Antoniazzi Francesco Andrea Ragazzo Alessio
  • 2. La teoria La teoria dei sei gradi di separazione afferma che qualunque persona è collegata a qualunque altra persona attraverso una catena di conoscenze con non più di 5 intermediari. 1 2 3 4 5 6
  • 3. Esempio con Attori 4 degree of separation http://oracleofbacon.org
  • 4. Un po’ di Storia • Teoria proposta nel 1929 dallo scrittore ungherese Frigyes Karinthy, nel suo racconto “Catene”. • Nel 1967 il sociologo americano Stanley Milgram testa la “teoria del mondo piccolo". • Nel 2001 Duncan Watts, professore della Columbia University, ricrea l'esperimento di Milgram su Internet. • I gradi di separazione si riducono a quattro, la scoperta dei ricercatori della Statale di Milano (25 nov 2011).
  • 5. Samy’s worm • Codice “malevolo” su MySpace • Chi visualizza la pagina di Samy si trova scritto in bacheca “Samy is my Hero” • Modifica allo script : chi visualizza una pagina infettata visualizza lo stesso messaggio e si infetta a sua volta • Infetta 1 milione di account in appena 18 ore • Viene processato e gli viene vietato l’accesso ad internet per tre anni but most of all, Samy is my hero
  • 6. Metodi di verifica per la struttura facebook • L’architettura facebook può essere visualizzata come un grafo G = ( Utenti, Amicizie ) • Per ogni coppia di utenti si vuole calcolare la lunghezza del cammino minimo che li collega • Algoritmo di Floyd-Warshall • Problema : Tempo di esecuzione = n3 Spazio necessario = n2 Dove n = numero di utenti n > 1.6 miliardi !!!
  • 7. Facebook network • Algoritmo statistico per ovviare al problema della quantità di tempo necessaria al processo • FB dichiara che in media gli utenti registrati sono collegati da 3.57 gradi di separazione Ma possiamo per questo affermare dimostrata la teoria ?
  • 8. Assolutamente no Ogni utente ha amicizie fittizie, le quali falsano completamente il risultato Poiché (come in seguito dimostrato) poche relazioni casuali portano ad avere la stessa connettività ma con un grado molto minore di separazione fra gli utenti !
  • 11. “I read somewhere that everybody on this planet is separated by only six other people. Six degrees of separation. Between us and everybody else on this planet. The president of the United States. A gondolier in Venice. Fill in the names. . . . How every person is a new door, opening up into other worlds. Six degrees of separation between me and everyone else on this planet. But to find the right six people . . .” – John Guare, Six Degrees of Separation (1990) What a small world !
  • 12. Antoniazzi Francesco Andrea Ragazzo Alessio Grazie per l’attenzione
  • 13. Wikipedia https://en.wikipedia.org/wiki/Six_degrees_of_separation Facebook Research https://research.fb.com/three-and-a-half-degrees-of-separation/ Sammy’s Worm https://en.wikipedia.org/wiki/Samy_(computer_worm) Artist degrees of Separation http://oracleofbacon.org/ Youtube video about six degrees of Separation https://www.youtube.com/watch?v=TcxZSmzPw8k Repository github (Sei gradi di separazione) https://github.com/luckyunlock/SeiGradiDiSeparazione.git Small world experiment https://en.wikipedia.org/wiki/Small-world_experiment Bibliografia