Detecting Sybil Nodes in Static and Dynamic Networks

被引:0
|
作者
Cardenas-Haro, Jose Antonio [1 ]
Konjevod, Goran [1 ]
机构
[1] Arizona State Univ, Sch Comp Informat & Decis Syst Engn, Tempe, AZ 85287 USA
关键词
Distributed Systems; Sybil attack; Network security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, we use here a reputation system for every node, built through observing its interactions with its peers. The construction makes every node a part of a distributed authority that keeps records on the reputation and behavior of the nodes. Records of interactions between nodes are broadcast by the interacting nodes and honest reporting proves to be a Nash Equilibrium for correct (non-Sybil) nodes. We argue that in realistic communication schedule scenarios, simple graph-theoretic queries help in exposing those nodes most likely to be Sybil.
引用
收藏
页码:894 / 917
页数:24
相关论文
共 50 条
  • [41] TSD: Detecting Sybil Accounts in Twitter
    Alsaleh, Mansour
    Alarifi, Abdulrahman
    Al-Salman, AbdulMalik
    AlFayez, Mohammed
    Almuhaysin, Abdulmajeed
    2014 13TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2014, : 463 - 469
  • [42] Integrating static and dynamic analysis for detecting vulnerabilities
    Aggarwal, Ashish
    Jalote, Pankaj
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 1, REGULAR PAPERS/PANELS, PROCEEDINGS, 2006, : 343 - +
  • [43] Detecting static and dynamic novelties using dynamic neural network
    Ozbilge, Emre
    9TH INTERNATIONAL CONFERENCE ON THEORY AND APPLICATION OF SOFT COMPUTING, COMPUTING WITH WORDS AND PERCEPTION, ICSCCW 2017, 2017, 120 : 877 - 886
  • [44] Detecting Community Structure in Networks by Propagating Labels of Nodes
    Pang, Chuanjun
    Shao, Fengjing
    Sun, Rencheng
    Li, Shujing
    ADVANCES IN NEURAL NETWORKS - ISNN 2009, PT 3, PROCEEDINGS, 2009, 5553 : 839 - 846
  • [45] Detecting coverage boundary nodes in wireless sensor networks
    Zhang, Chi
    Zhang, Yanchao
    Fang, Yuguang
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, 2006, : 868 - 873
  • [46] Flows in networks with dynamic ramification nodes
    Eszter Sikolya
    Journal of Evolution Equations, 2005, 5 : 441 - 463
  • [47] Launcher nodes for detecting efficient influencers in social networks
    Martins P.
    Martins F.A.
    Online Social Networks and Media, 2021, 25
  • [48] Detecting Communities Around Seed Nodes in Complex Networks
    Staudt, Christian L.
    Marrakchi, Yassine
    Meyerhenke, Henning
    2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,
  • [49] Detecting Noncooperation Nodes Mechanisms in Wireless Networks: A Survey
    Nobahary, Solmaz
    Garakani, Hossein Gharaee
    Khademzadeh, Ahmad
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [50] Flows in networks with dynamic ramification nodes
    Sikolya, E
    JOURNAL OF EVOLUTION EQUATIONS, 2005, 5 (03) : 441 - 463