Exploiting Trust and Distrust Information to Combat Sybil Attack in Online Social Networks
نویسندگان
چکیده
Due to open and anonymous nature, online social networks are particularly vulnerable to the Sybil attack, in which a malicious user can fabricate many dummy identities to attack the systems. Recently, there is a flurry of interests to leverage social network structure for Sybil defense. However, most of graph-based approaches pay little attention to the distrust information, which is an important factor for uncovering more Sybils. In this paper, we propose an unified ranking mechanism by leveraging trust and distrust in social networks against such kind of attacks based on a variant of the PageRank-like model. Specifically, we first use existing topological anti-Sybil algorithms as a subroutine to produce reliable Sybil seeds. To enhance the robustness of these approaches against target attacks, we then also introduce an effective similaritybased graph pruning technique utilizing local structure similarity. Experiments show that our approach outperforms existing competitive methods for Sybil detection in social networks.
منابع مشابه
Improving Sybil Detection via Graph Pruning and Regularization Techniques
Due to their open and anonymous nature, online social networks are particularly vulnerable to Sybil attacks. In recent years, there has been a rising interest in leveraging social network topological structures to combat Sybil attacks. Unfortunately, due to their strong dependency on unrealistic assumptions, existing graph-based Sybil defense mechanisms suffer from high false detection rates. I...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملSybil-Resilient Online Content Rating
Obtaining user feedback (using votes) is essential in ranking user-generated online content. However, any online voting system is susceptible to the Sybil attack where adversaries can out-vote real users by creating several Sybil identities. In this paper, we present SumUp, a Sybilresilient online content rating system that leverages trust networks among users to defend against Sybil attacks wi...
متن کاملInterpersonal Trust in Online Scientific Social Networks: Causes and Results
Background and Aim: This study tends to investigate the reasons of interpersonal trust and the results of trust in online scientific social networks. Methods: The applied Research has been used cluster sampling to collect data. The study population consisted of Shiraz university and Persian Gulf university faculties. A sampling of 269 person was determined by Morgan table according to whole pop...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کامل