Identification of Sybil attacks on social networks using a framework based on user interactions

被引:6
|
作者
Asadian, Hooman [1 ]
Javadi, Hamid Haj Seyed [2 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp Engn, Tehran, Iran
[2] Shahed Univ, Dept Math & Comp Sci, Tehran, Iran
来源
SECURITY AND PRIVACY | 2018年 / 1卷 / 02期
关键词
community detection; interactions among users; Jaccard index; social networks; Sybil attacks;
D O I
10.1002/spy2.19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The popularity of modern social networks has rendered social media platforms vulnerable to malicious activities. One such activity is a Sybil attack, in which a single entity emulates the behaviors of multiple users and attempts to create problems for other users and a network itself. This problem has prompted researchers to develop several techniques for preventing Sybil attacks, but in most cases, the efficiency assumptions that underlie proposed methods are not oriented toward reality. The current study puts forward an efficient framework for identifying Sybil attacks. The highly precise framework is underlain by rational assumptions and detects attacks on the basis of the structural characteristics of social networks and the social interactions among users. We evaluate our proposed framework using both synthetic and real world social network topologies. We show that SybilUncover is able to accurately identify high precision rate. Moreover, SybilUncover performs orders of magnitudes better than existing Sybil detection mechanisms.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] A User Identification Algorithm Based on User Behavior Analysis in Social Networks
    Deng, Kaikai
    Xing, Ling
    Zheng, Longshui
    Wu, Honghai
    Xie, Ping
    Gao, Feifei
    IEEE ACCESS, 2019, 7 : 47114 - 47123
  • [22] Structure Based User Identification across Social Networks
    Zhou, Xiaoping
    Liang, Xun
    Du, Xiaoyong
    Zhao, Jichao
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2018, 30 (06) : 1178 - 1191
  • [23] Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information
    Sarigiannidis, Panagiotis
    Karapistoli, Eirini
    Economides, Anastasios A.
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) : 7560 - 7572
  • [24] Detecting Sybil Attacks in Vehicular Fog Networks Using RSSI and Blockchain
    Benadla, Sarra
    Merad-Boudia, Omar Rafik
    Senouci, Sidi Mohammed
    Lehsaini, Mohamed
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 3919 - 3935
  • [25] Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
    Ssu, Kuo-Feng
    Wang, Wei-Tong
    Chang, Wen-Chung
    COMPUTER NETWORKS, 2009, 53 (18) : 3042 - 3056
  • [26] User Identification in Online Social Networks using Graph Transformer Networks
    Kumar, Pavan K. N.
    Gavrilova, Marina L.
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [27] DETECTING SYBIL ATTACKS IN WIRELESS SENSOR NETWORKS USING SEQUENTIAL ANALYSIS
    Vamsi, P. Raghu
    Kant, Krishna
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2016, 9 (02): : 651 - 680
  • [28] Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis
    Yang, Jie
    Chen, Yingying
    Trappe, Wade
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 834 - +
  • [29] Defending Sybil attacks based on neighboring relations in wireless sensor networks
    Wang, Wei-Tong
    Ssu, Kuo-Feng
    Chang, Wen-Chung
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (05) : 408 - 420
  • [30] SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks
    Mulamba, Dieudonne
    Ray, Indrajit
    Ray, Indrakshi
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 179 - 193