Identification of Sybil attacks on social networks using a framework based on user interactions

被引:6
|
作者
Asadian, Hooman [1 ]
Javadi, Hamid Haj Seyed [2 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp Engn, Tehran, Iran
[2] Shahed Univ, Dept Math & Comp Sci, Tehran, Iran
来源
SECURITY AND PRIVACY | 2018年 / 1卷 / 02期
关键词
community detection; interactions among users; Jaccard index; social networks; Sybil attacks;
D O I
10.1002/spy2.19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The popularity of modern social networks has rendered social media platforms vulnerable to malicious activities. One such activity is a Sybil attack, in which a single entity emulates the behaviors of multiple users and attempts to create problems for other users and a network itself. This problem has prompted researchers to develop several techniques for preventing Sybil attacks, but in most cases, the efficiency assumptions that underlie proposed methods are not oriented toward reality. The current study puts forward an efficient framework for identifying Sybil attacks. The highly precise framework is underlain by rational assumptions and detects attacks on the basis of the structural characteristics of social networks and the social interactions among users. We evaluate our proposed framework using both synthetic and real world social network topologies. We show that SybilUncover is able to accurately identify high precision rate. Moreover, SybilUncover performs orders of magnitudes better than existing Sybil detection mechanisms.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Detecting Sybil Attacks in Mobile Wireless Sensor Networks Based on ID Frequency
    Cheng, Ying-ying
    Huang, He-jiao
    Du, Hong-wei
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 330 - 334
  • [42] User Identification Based on Integrating Multiple User Information across Online Social Networks
    Zeng, Wenjing
    Tang, Rui
    Wang, Haizhou
    Chen, Xingshu
    Wang, Wenxian
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [43] Applying trust metrics based on user interactions to recommendation in social networks
    Lumbreras, Alberto
    Gavalda, Ricard
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 1159 - 1164
  • [44] Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation
    Sjouke Mauw
    Yunior Ramírez-Cruz
    Rolando Trujillo-Rasua
    Knowledge and Information Systems, 2022, 64 : 1077 - 1100
  • [45] A Multi-Granularity Representation Learning Framework for User Identification Across Social Networks
    Fu, Shun
    Wang, Guoyin
    Xia, Shuyin
    Liu, Li
    ROUGH SETS, IJCRS 2019, 2019, 11499 : 507 - 521
  • [46] Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation
    Mauw, Sjouke
    Ramirez-Cruz, Yunior
    Trujillo-Rasua, Rolando
    KNOWLEDGE AND INFORMATION SYSTEMS, 2022, 64 (04) : 1077 - 1100
  • [47] Enhancing Security in Social Networks through Machine Learning: Detecting and Mitigating Sybil Attacks with SybilSocNet
    Cardenas-Haro, Jose Antonio
    Salem, Mohamed
    Aldaco-Gastelum, Abraham N.
    Lopez-Avitia, Roberto
    Dawson, Maurice
    ALGORITHMS, 2024, 17 (10)
  • [48] Sustenance against RL-based Sybil attacks in Cognitive Radio Networks using Dynamic Reputation System
    Ezirim, Kenneth
    Troja, Erald
    Sengupta, Shamik
    2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 1789 - 1794
  • [49] User Identification Based on Multiple Attribute Decision Making in Social Networks
    Ye Na
    Zhao Yinliang
    Dong Lili
    Bian Genqing
    Liu, Enjie
    Clapworthy, Gordon J.
    CHINA COMMUNICATIONS, 2013, 10 (12) : 37 - 49
  • [50] User Profiles Matching for Different Social Networks Based on Faces Identification
    Sokhin, Timur
    Butakov, Nikolay
    Nasonov, Denis
    HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2019, 2019, 11734 : 551 - 562