Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks

被引:0
|
作者
de Asis Lopez-Fuentes, Francisco [1 ]
Balleza-Gallegos, Salvador [1 ]
机构
[1] Univ Autonoma Metropolitana Cuajimalpa UAM C, Dept Tecnol Informac, Mexico City, DF, Mexico
关键词
peer-to-peer networks; Sybil attack; online-social networks;
D O I
10.1109/HPCC-CSS-ICESS.2015.252
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, online social networks (OSN) have become very popular. These types of networks have been useful to find former classmates or to improve our interaction with friends. Currently, a huge amount of information is generated and consumed by millions of people from these types of networks. Most popular online social networks are based on centralized servers, which are responsible for the management and storage all information. Although online social networks introduce several benefits, these networks still face many challenges such as central control, privacy or security. P2P infrastructures have emerged as an alternative platform to deploy decentralized online social networks. However, decentralized distributed systems are vulnerable to malicious peers. In this work, we evaluate P2P infrastructures against Sybil attacks. In particular, we simulate and evaluate hybrid and distributed P2P architectures.
引用
收藏
页码:1262 / 1267
页数:6
相关论文
共 50 条
  • [31] Managing and Integrating Social Networks in P2P Infrastructure
    Upadhyaya, Bipin
    Choi, Eunmi
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 409 - 414
  • [32] Mapping Social Networks into P2P Directory Service
    Zaczek, Lukasz
    Datta, Anwitaman
    [J]. SOCINFO 2009: INTERNATIONAL WORKSHOP ON SOCIAL INFORMATICS, PROCEEDINGS, 2009, : 10 - +
  • [33] Social-P2P: An Online Social Network Based P2P File Sharing System
    Shen, Haiying
    Li, Ze
    Chen, Kang
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (10) : 2874 - 2889
  • [34] P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks
    Zhou, Tong
    Roy, Romit
    Ning, Choudhury Peng
    Chakrabarty, Krishnendu
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) : 582 - 594
  • [35] Optimising Sybil Attacks against P2P-based Botnets
    Davis, Carlton R.
    Fernandez, Jose M.
    Neville, Stephen
    [J]. 2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 78 - +
  • [36] A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 128 - 134
  • [37] Random visitor: A defense against identity attacks in P2P overlay networks
    Gu, Jabeom
    Nah, Jaehoon
    Chae, Cheoljoo
    Lee, Jaekwang
    Jang, Jongsoo
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 282 - +
  • [38] On Pollution Attacks in Fully Connected P2P Networks Using Trusted Peers
    Medina-Lopez, Cristobal
    Shakirov, Ilshat
    Casado, L. G.
    Gonzalez-Ruiz, Vicente
    [J]. INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA 2016), 2017, 557 : 144 - 153
  • [39] How friendship networks work in online P2P lending markets
    Li, Siming
    Lin, Zhangxi
    Qiu, Jiaxian
    Safi, Roozmehr
    Xiao, Zhongyi
    [J]. NANKAI BUSINESS REVIEW INTERNATIONAL, 2015, 6 (01) : 42 - 67
  • [40] A Case for P2P Infrastructure for Social Networks - Opportunities & Challenges
    Buchegger, Sonja
    Datta, Anwitaman
    [J]. WONS 2009: SIXTH INTERNATIONAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, 2009, : 149 - +