Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks

被引:0
|
作者
de Asis Lopez-Fuentes, Francisco [1 ]
Balleza-Gallegos, Salvador [1 ]
机构
[1] Univ Autonoma Metropolitana Cuajimalpa UAM C, Dept Tecnol Informac, Mexico City, DF, Mexico
关键词
peer-to-peer networks; Sybil attack; online-social networks;
D O I
10.1109/HPCC-CSS-ICESS.2015.252
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, online social networks (OSN) have become very popular. These types of networks have been useful to find former classmates or to improve our interaction with friends. Currently, a huge amount of information is generated and consumed by millions of people from these types of networks. Most popular online social networks are based on centralized servers, which are responsible for the management and storage all information. Although online social networks introduce several benefits, these networks still face many challenges such as central control, privacy or security. P2P infrastructures have emerged as an alternative platform to deploy decentralized online social networks. However, decentralized distributed systems are vulnerable to malicious peers. In this work, we evaluate P2P infrastructures against Sybil attacks. In particular, we simulate and evaluate hybrid and distributed P2P architectures.
引用
收藏
页码:1262 / 1267
页数:6
相关论文
共 50 条
  • [1] Limiting sybil attacks in structured P2P networks
    Rowaihy, Hosam
    Enck, William
    McDaniel, Patrick
    La Porta, Thomas
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 2596 - +
  • [2] Investigation of Effects of Spoofing Attacks in P2P Online Social Networks
    de Asis Lopez-Fuentes, Francisco
    Balleza-Gallegos, Salvador
    [J]. IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 199 - 203
  • [3] Evaluating P2P Networks against Eclipse Attacks
    de Asis Lopez-Fuentes, Francisco
    Eugui-De-Alba, Inaki
    Ortiz-Ruiz, Otoniel M.
    [J]. 2012 IBEROAMERICAN CONFERENCE ON ELECTRONICS ENGINEERING AND COMPUTER SCIENCE, 2012, 3 : 61 - 68
  • [4] The Impact of Routing Attacks on Pastry-Based P2P Online Social Networks
    Eichert, Felix A.
    Monhof, Markus
    Graffi, Kalman
    [J]. EURO-PAR 2014: PARALLEL PROCESSING WORKSHOPS, PT I, 2014, 8805 : 347 - 358
  • [5] P2P Networks Considering Sybil-proof with the Reputation of Social Link
    Guo Zongyuan
    Madrazo, Carlos
    Koyanag, Keiichi
    [J]. ADVANCED RESEARCH IN MATERIAL SCIENCE AND MECHANICAL ENGINEERING, PTS 1 AND 2, 2014, 446-447 : 1596 - +
  • [6] A social networks routing algorithm of resisting sybil attack based on P2P
    Jia, Xiaoqiang
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2016, 16 (04) : 877 - 898
  • [7] Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model
    Shareh, Morteza Babazadeh
    Navidi, Hamidreza
    Javadi, Hamid Haj Seyyed
    HosseinZadeh, Mehdi
    [J]. INFORMATION SCIENCES, 2019, 470 : 94 - 108
  • [8] Availability in P2P based Online Social Networks
    Shahriar, Nashid
    Chowdhury, Shihabur Rahman
    Ahmed, Reaz
    Sharmin, Mahfuza
    Boutaba, Raouf
    Mathieu, Bertrand
    [J]. PROCEEDINGS OF 2017 4TH INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 29 - 37
  • [9] Sybil Resilient Identity Distribution in P2P Networks
    Jose, Jissy Liz
    Jayasudha, J. S.
    Thampi, Sabu M.
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 433 - 439
  • [10] Collaborative Privacy Management in P2P Online Social Networks
    Zahak, Matin
    Alizadeh, Mahdi
    Abbaspour, Maghsoud
    [J]. 2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 64 - 72