Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks

被引:0
|
作者
de Asis Lopez-Fuentes, Francisco [1 ]
Balleza-Gallegos, Salvador [1 ]
机构
[1] Univ Autonoma Metropolitana Cuajimalpa UAM C, Dept Tecnol Informac, Mexico City, DF, Mexico
关键词
peer-to-peer networks; Sybil attack; online-social networks;
D O I
10.1109/HPCC-CSS-ICESS.2015.252
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, online social networks (OSN) have become very popular. These types of networks have been useful to find former classmates or to improve our interaction with friends. Currently, a huge amount of information is generated and consumed by millions of people from these types of networks. Most popular online social networks are based on centralized servers, which are responsible for the management and storage all information. Although online social networks introduce several benefits, these networks still face many challenges such as central control, privacy or security. P2P infrastructures have emerged as an alternative platform to deploy decentralized online social networks. However, decentralized distributed systems are vulnerable to malicious peers. In this work, we evaluate P2P infrastructures against Sybil attacks. In particular, we simulate and evaluate hybrid and distributed P2P architectures.
引用
收藏
页码:1262 / 1267
页数:6
相关论文
共 50 条
  • [41] Emerging structures of P2P networks induced by social relationships
    Carchiolo, Vincenza
    Malgeri, Michele
    Mangioni, Giuseppe
    Nicosia, Vincenzo
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (03) : 620 - 628
  • [42] Semantic grouping of social networks in P2P database settings
    Kantere, Verena
    Tsoumakos, Dimitrios
    Sellis, Timos
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, 4653 : 689 - +
  • [43] P2P Trading in Social Networks: The Value of Staying Connected
    Liu, Zhengye
    Hu, Hao
    Liu, Yong
    Ross, Keith W.
    Wang, Yao
    Mobius, Markus
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [44] Making P2P Downloading Dependable by Exploiting Social Networks
    Zhu, Yingwu
    [J]. 2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [45] Exploiting social networks dynamics for P2P resource organisation
    Carchiolo, Vincenza
    Malgeri, Michele
    Mangioni, Giuseppe
    Nicosia, Vincenzo
    [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 726 - +
  • [46] Detecting and Mitigating P2P Eclipse Attacks
    Ismail, Hatem
    Germanus, Daniel
    Suri, Neeraj
    [J]. 2015 IEEE 21ST INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2015, : 224 - 231
  • [47] Defending Sybil Attacks in Mobile Social Networks
    Sun, Yan
    Yin, Lihua
    Liu, Wenmao
    [J]. 2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 163 - +
  • [48] Fighting pollution attacks in P2P streaming
    Tauhiduzzaman, Md.
    Wang, Mea
    [J]. COMPUTER NETWORKS, 2015, 79 : 39 - 52
  • [49] Sybil Detection in Online Social Networks
    Ali, Hussain
    Malik, Ismaeel
    Mahmood, Saba
    Akif, Farah
    Amin, Javaria
    [J]. 2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 125 - 129
  • [50] Social VPNs: Integrating Overlay and Social Networks for Seamless P2P Networking
    Figueiredo, Renato J.
    Boykin, P. Oscar
    St Juste, Pierre
    Wolinsky, David
    [J]. 17TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2008, : 93 - 98