[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks

Published: 01 December 2013 Publication History

Abstract

Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of the system. This paper presents SybilDefender, a sybil defense mechanism that leverages the network topologies to defend against sybil attacks in social networks. Based on performing a limited number of random walks within the social graphs, SybilDefender is efficient and scalable to large social networks. Our experiments on two 3,000,000 node real-world social topologies show that SybilDefender outperforms the state of the art by more than 10 times in both accuracy and running time. SybilDefender can effectively identify the sybil nodes and detect the sybil community around a sybil node, even when the number of sybil nodes introduced by each attack edge is close to the theoretically detectable lower bound. Besides, we propose two approaches to limiting the number of attack edges in online social networks. The survey results of our Facebook application show that the assumption made by previous work that all the relationships in social networks are trusted does not apply to online social networks, and it is feasible to limit the number of attack edges in online social networks by relationship rating.

Cited By

View all
  • (2024)Coupled-Space Attacks Against Random-Walk-Based Anomaly DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.346815619(9315-9329)Online publication date: 1-Jan-2024
  • (2020)Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep LearningProceedings of the 15th ACM Asia Conference on Computer and Communications Security10.1145/3320269.3384770(708-718)Online publication date: 5-Oct-2020
  • (2020)TrustGCNProceedings of the 12th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1109/ASONAM49781.2020.9381325(42-49)Online publication date: 7-Dec-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Parallel and Distributed Systems
IEEE Transactions on Parallel and Distributed Systems  Volume 24, Issue 12
December 2013
216 pages

Publisher

IEEE Press

Publication History

Published: 01 December 2013

Author Tags

  1. Sybil attack
  2. random walk
  3. social network

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Coupled-Space Attacks Against Random-Walk-Based Anomaly DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.346815619(9315-9329)Online publication date: 1-Jan-2024
  • (2020)Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep LearningProceedings of the 15th ACM Asia Conference on Computer and Communications Security10.1145/3320269.3384770(708-718)Online publication date: 5-Oct-2020
  • (2020)TrustGCNProceedings of the 12th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1109/ASONAM49781.2020.9381325(42-49)Online publication date: 7-Dec-2020
  • (2020)Resource Burning for Permissionless Systems (Invited Paper)Structural Information and Communication Complexity10.1007/978-3-030-54921-3_2(19-44)Online publication date: 29-Jun-2020
  • (2019)A Blockchain-based Solution to Fake Check-ins in Location-Based Social NetworksProceedings of the 3rd ACM SIGSPATIAL International Workshop on Analytics for Local Events and News10.1145/3356473.3365191(1-4)Online publication date: 5-Nov-2019
  • (2019)N2TM: A New Node to Trust Matrix Method for Spam Worker Defense in Crowdsourcing EnvironmentsService-Oriented Computing10.1007/978-3-030-33702-5_10(119-134)Online publication date: 28-Oct-2019
  • (2018)Proof of Work Without All the WorkProceedings of the 19th International Conference on Distributed Computing and Networking10.1145/3154273.3154333(1-10)Online publication date: 4-Jan-2018
  • (2016)Review on Detection and Mitigation of Sybil Attack in the NetworkProcedia Computer Science10.1016/j.procs.2016.02.08078:C(395-401)Online publication date: 1-Mar-2016
  • (2016)Stalk and lie-The cost of Sybil attacks in opportunistic networksComputer Communications10.1016/j.comcom.2015.04.00773:PA(66-79)Online publication date: 1-Jan-2016
  • (2014)Stalk me if you canProceedings of the 9th ACM MobiCom workshop on Challenged networks10.1145/2645672.2645673(37-42)Online publication date: 7-Sep-2014

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media