Sybil Defense Techniques in Online Social Networks: A Survey

被引:54
|
作者
Al-Qurishi, Muhammad [1 ]
Al-Rakhami, Mabrook [1 ]
Alamri, Atif [1 ]
Alrubaian, Majed [1 ]
Rahman, Sk Md Mizanur [1 ,3 ]
Hossain, M. Shamim [2 ]
机构
[1] King Saud Univ, Res Chair Pervas & Mobile Comp, Riyadh 11543, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 11543, Saudi Arabia
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11543, Saudi Arabia
来源
IEEE ACCESS | 2017年 / 5卷
关键词
Online social networks; Sybil attack and defense; Twitter; Sybil impact; BIG DATA; ATTACKS; SYBILDEFENDER; COMMUNITIES; CENTRALITY;
D O I
10.1109/ACCESS.2017.2656635
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this article, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks.
引用
收藏
页码:1200 / 1219
页数:20
相关论文
共 50 条
  • [1] Sybil Detection in Online Social Networks
    Ali, Hussain
    Malik, Ismaeel
    Mahmood, Saba
    Akif, Farah
    Amin, Javaria
    2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 125 - 129
  • [2] Survey of Model and Techniques for Online Social Networks
    Song Xin-fang
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 1495 - 1498
  • [3] Sybil Detection in Online Social Networks (OSNs)
    Bansal, Harpreet
    Misra, Manoj
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 569 - 576
  • [4] SoK: The Evolution of Sybil Defense via Social Networks
    Alvisi, Lorenzo
    Clement, Allen
    Epasto, Alessandro
    Lattanzi, Silvio
    Panconesi, Alessandro
    2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 382 - 396
  • [5] Defense Against Sybil Attacks in Directed Social Networks
    Liu, Pengfei
    Wang, Xiaohan
    Che, Xiangqian
    Chen, Zhaoqun
    Gu, Yuantao
    2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 239 - 243
  • [6] A survey of event detection techniques in online social networks
    Goswami, Anuradha
    Kumar, Ajey
    SOCIAL NETWORK ANALYSIS AND MINING, 2016, 6 (01)
  • [7] On The Effectiveness of Sybil Defenses Based on Online Social Networks
    Koll, David
    Li, Jun
    Stein, Joshua
    Fu, Xiaoming
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [8] SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks
    Al-Qurishi, Muhammad
    Rahman, Sk Md Mizanur
    Alamri, Atif
    Mostafa, Mohamed A.
    Al-Rubaian, Majed
    Hossain, M. Shamim
    Gupta, B. B.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (05):
  • [9] SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks
    Wei, Wei
    Xu, Fengyuan
    Tan, Chiu C.
    Li, Qun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (12) : 2492 - 2502
  • [10] Survey on sybil attack defense mechanisms in wireless ad hoc networks
    Vasudeva, Amol
    Sood, Manu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 120 : 78 - 118