Robust Sybil Attack Detection Mechanism For Social Networks- A Survey

被引:0
|
作者
Valarmathi, M. L. [1 ]
Meenakowshalya, A. [1 ]
Bharathi, A. [1 ]
机构
[1] Govt Coll Technol, Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
Sybil attack; Social network; Recommender System; robust algorithm;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Now a day's Recommender Systems (RS) have become predominant in Internet of Things (IoT), Online Social Networks (OSN) and Social Internet of Things (SloT). Sybil attack is an attack where malicious users suppress opinions of honest users by creating fake identities called Sybils. Sybil attacks are prevalent in wireless sensor networks, online social networks, Peer to Peer networks and mobile networks. In this paper survey various types of Sybil attacks which are based on behavior of attacker. This paper also surveys different types of current Sybil defense protocols like SybilGuard, SybilLimit, SybilDefender, SybilInfer, SybilShield, and SyMon to defend against the Sybil attack.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks
    Wei, Wei
    Xu, Fengyuan
    Tan, Chiu C.
    Li, Qun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (12) : 2492 - 2502
  • [32] Sybil Attack Detection using Sequential Hypothesis Testing in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 698 - 702
  • [33] Signal Strength Based Sybil Attack Detection in Wireless Ad hoc Networks
    Abbas, S.
    Merabti, M.
    Llewellyn-Jones, D.
    2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2009, : 190 - 195
  • [34] An RFID based System for the detection of Sybil attack in Military Wireless Sensor networks
    Triki, Bayrem
    Rekhis, Slim
    Boudriga, Noureddine
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [35] Sybil Attack Detection and Analysis of Energy Consumption in Cluster Based Sensor Networks
    Saxena, Sweety
    Sejwar, Vikas
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (05): : 15 - 30
  • [36] Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks
    Gu, Pengwenlong
    Khatoun, Rida
    Begriche, Youcef
    Serhrouchni, Ahmed
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [37] A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
    Wang, Hui
    Ma, Li
    Bai, Hong-ying
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 752 - 756
  • [38] Doppler-Shift-Based Sybil Attack Detection for Mobile IoT Networks
    Dogan-Tusha, Seda
    Althunibat, Saud
    Qaraqe, Marwa
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1136 - 1147
  • [39] User behavior-based and graph-based hybrid approach for detection of Sybil Attack in online social networks
    Jethava, Gordhan
    Rao, Udai Pratap
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [40] A lightweight intrusion detection system based on RSSI for sybil attack detection in wireless sensor networks
    Sadeghizadeh, Mahdi
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 305 - 320