Defense Against Sybil Attacks in Directed Social Networks

被引:0
|
作者
Liu, Pengfei [1 ,2 ]
Wang, Xiaohan [1 ]
Che, Xiangqian [1 ]
Chen, Zhaoqun [1 ]
Gu, Yuantao [1 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, Tsinghua Natl Lab Informat Sci & Technol, State Key Lab Microwave & Digital Commun, Beijing 100084, Peoples R China
[2] Natl Def Informat Acad, Wuhan 430010, Peoples R China
关键词
security; social networks; directed networks; spam; sybil attack; set of measures; modularity;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we attempt to solve the problem of defense against sybil attacks in directed social networks. We propose a set of measures for the quality of network partitions, with modularity as a special case. We present an algorithm based on the set of measures and iterative optimization to detect the sybil region. The algorithm is evaluated using a subset of real-world social topology and is confirmed to be efficient for solving the problem. Moreover, a comparison between the proposed algorithm and SybilDefender is provided, which shows that the proposed algorithm is superior for the sybil region detection problem in directed social networks.
引用
收藏
页码:239 / 243
页数:5
相关论文
共 50 条
  • [41] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks
    de Asis Lopez-Fuentes, Francisco
    Balleza-Gallegos, Salvador
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1262 - 1267
  • [42] Communities, Random Walks, and Social Sybil Defense
    Alvisi, Lorenzo
    Clement, Allen
    Epasto, Alessandro
    Lattanzi, Silvio
    Panconesi, Alessandro
    INTERNET MATHEMATICS, 2014, 10 (3-4) : 360 - 420
  • [43] Sybil-resist: A new protocol for Sybil attack defense in social network
    Ma, Wei
    Hu, Sen-Zhe
    Dai, Qiong
    Wang, Ting-Ting
    Huang, Yin-Fei
    Communications in Computer and Information Science, 2014, 490 : 219 - 230
  • [44] Sybil-Resist: A New Protocol for Sybil Attack Defense in Social Network
    Ma, Wei
    Hu, Sen-Zhe
    Dai, Qiong
    Wang, Ting-Ting
    Huang, Yin-Fei
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 219 - 230
  • [45] TCPL: A Defense against wormhole attacks in wireless sensor networks
    Kumar, K. E. Naresh
    Waheed, Mohd. Abdul
    Basappa, K. Kari
    INTERNATIONAL CONFERENCE ON MODELING, OPTIMIZATION, AND COMPUTING, 2010, 1298 : 633 - +
  • [46] Packet leashes: A defense against wormhole attacks in wireless networks
    Hu, YC
    Perrig, A
    Johnson, DB
    IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, : 1976 - 1986
  • [47] Defense Against Objective Function Attacks in Cognitive Radio Networks
    Pei Qingqi
    Li Hongning
    Ma Jianfeng
    Fan Kefeng
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (01): : 138 - 142
  • [48] Sybil attacks as a mitigation strategy against the Storm botnet
    Davis, Carlton R.
    Fernandez, Jose M.
    Neville, Stephen
    McHught, John
    MALWARE 2008: PROCEEDINGS OF THE 2008 3RD INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2008, : 37 - +
  • [49] Sequential defense against random and intentional attacks in complex networks
    Chen, Pin-Yu
    Cheng, Shin-Ming
    PHYSICAL REVIEW E, 2015, 91 (02)
  • [50] Defense against PUEA and SSDF Attacks in Cognitive Radio Networks
    Chaitanya, D. L.
    Chari, K. Manjunatha
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,