Sybil Defense Techniques in Online Social Networks: A Survey

被引:54
|
作者
Al-Qurishi, Muhammad [1 ]
Al-Rakhami, Mabrook [1 ]
Alamri, Atif [1 ]
Alrubaian, Majed [1 ]
Rahman, Sk Md Mizanur [1 ,3 ]
Hossain, M. Shamim [2 ]
机构
[1] King Saud Univ, Res Chair Pervas & Mobile Comp, Riyadh 11543, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 11543, Saudi Arabia
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11543, Saudi Arabia
来源
IEEE ACCESS | 2017年 / 5卷
关键词
Online social networks; Sybil attack and defense; Twitter; Sybil impact; BIG DATA; ATTACKS; SYBILDEFENDER; COMMUNITIES; CENTRALITY;
D O I
10.1109/ACCESS.2017.2656635
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this article, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks.
引用
收藏
页码:1200 / 1219
页数:20
相关论文
共 50 条
  • [21] Sybil-resist: A new protocol for Sybil attack defense in social network
    Ma, Wei
    Hu, Sen-Zhe
    Dai, Qiong
    Wang, Ting-Ting
    Huang, Yin-Fei
    Communications in Computer and Information Science, 2014, 490 : 219 - 230
  • [22] Sybil-Resist: A New Protocol for Sybil Attack Defense in Social Network
    Ma, Wei
    Hu, Sen-Zhe
    Dai, Qiong
    Wang, Ting-Ting
    Huang, Yin-Fei
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 219 - 230
  • [23] Credibility in Online Social Networks: A Survey
    Alrubaian, Majed
    Al-Qurishi, Muhammad
    Alamri, Atif
    Al-Rakhami, Mabrook
    Hassan, Mohammad Mehedi
    Fortino, Giancarlo
    IEEE ACCESS, 2019, 7 : 2828 - 2855
  • [24] A Survey and Analysis on Online Social Networks
    Sudha, R.
    Maheswari, N. Uma
    Venkatesh, R.
    JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (02) : 1414 - 1420
  • [25] A survey on decentralized Online Social Networks
    Paul, Thomas
    Famulari, Antonino
    Strufe, Thorsten
    COMPUTER NETWORKS, 2014, 75 : 437 - 452
  • [26] A Survey on Deceptions in Online Social Networks
    Shariff, Shafiza Mohd
    Zhang, Xiuzhen
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2014,
  • [27] RobuRec: Robust Sybil Attack Defense in Online Recommender Systems
    Noh, Giseop
    Kim, Chong-kwon
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [28] Enhancing security in online social networks: introducing the DeepSybil model for Sybil attack detection
    Blessy Antony
    S. Revathy
    Multimedia Tools and Applications, 2024, 83 : 41911 - 41937
  • [29] Enhancing security in online social networks: introducing the DeepSybil model for Sybil attack detection
    Antony, Blessy
    Revathy, S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 41911 - 41937
  • [30] SybilSCAR: Sybil Detection in Online Social Networks via Local Rule based Propagation
    Wang, Binghui
    Zhang, Le
    Gong, Neil Zhenqiang
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,