Defense Against Sybil Attacks in Directed Social Networks

被引:0
|
作者
Liu, Pengfei [1 ,2 ]
Wang, Xiaohan [1 ]
Che, Xiangqian [1 ]
Chen, Zhaoqun [1 ]
Gu, Yuantao [1 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, Tsinghua Natl Lab Informat Sci & Technol, State Key Lab Microwave & Digital Commun, Beijing 100084, Peoples R China
[2] Natl Def Informat Acad, Wuhan 430010, Peoples R China
关键词
security; social networks; directed networks; spam; sybil attack; set of measures; modularity;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we attempt to solve the problem of defense against sybil attacks in directed social networks. We propose a set of measures for the quality of network partitions, with modularity as a special case. We present an algorithm based on the set of measures and iterative optimization to detect the sybil region. The algorithm is evaluated using a subset of real-world social topology and is confirmed to be efficient for solving the problem. Moreover, a comparison between the proposed algorithm and SybilDefender is provided, which shows that the proposed algorithm is superior for the sybil region detection problem in directed social networks.
引用
收藏
页码:239 / 243
页数:5
相关论文
共 50 条
  • [21] Predictable Model for Detecting Sybil Attacks in Mobile Social Networks
    Lyu, Chen
    Huang, Dongmei
    Jia, Qingyao
    Han, Xiao
    Zhang, Xiaomei
    Chi, Chi-Hung
    Xu, Yang
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [22] Defeating against sybil-attacks in peer-to-peer networks
    Xiang, Xu
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1218 - 1222
  • [23] Defending Against sybil-attacks in Peer-to-Peer Networks
    Xu Xiang
    Lu Huijuan
    Chen Lianna
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 329 - 340
  • [24] Location verification based defense against sybil attack in sensor networks
    Mukhopadhyay, Debapriyay
    Saha, Indranil
    DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2006, 4308 : 509 - 521
  • [25] Defense against Sybil attacks and authentication for anonymous location-based routing in MANET
    Kumari, S. Vadhana
    Paramasivan, B.
    WIRELESS NETWORKS, 2017, 23 (03) : 715 - 726
  • [26] SybilHP: Sybil Detection in Directed Social Networks with Adaptive Homophily Prediction
    Lu, Haoyu
    Gong, Daofu
    Li, Zhenyu
    Liu, Feng
    Liu, Fenlin
    APPLIED SCIENCES-BASEL, 2023, 13 (09):
  • [27] Robust and Secure Time-Synchronization Against Sybil Attacks for Sensor Networks
    Dong, Wei
    Liu, Xiaojin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (06) : 1482 - 1491
  • [28] Towards Efficient Detection of Sybil Attacks in Location-based Social Networks
    Xu, Zhiwei
    Chen, Bo
    Meng, Xuying
    Liu, Limin
    2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2017, : 741 - 747
  • [29] Identification of Sybil attacks on social networks using a framework based on user interactions
    Asadian, Hooman
    Javadi, Hamid Haj Seyed
    SECURITY AND PRIVACY, 2018, 1 (02):
  • [30] Defense against packet collusion attacks in opportunistic networks
    Alajeely, Majeed
    Doss, Robin
    Ahmad, Asma'a
    Mak-Hau, Vicky
    COMPUTERS & SECURITY, 2017, 65 : 269 - 282