Sybil-Resist: A New Protocol for Sybil Attack Defense in Social Network

被引:0
|
作者
Ma, Wei [1 ]
Hu, Sen-Zhe [2 ]
Dai, Qiong [1 ]
Wang, Ting-Ting [1 ]
Huang, Yin-Fei [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Beijing Special Vehicle Inst, Beijing 100072, Peoples R China
[3] Shanghai Stock Exchange, Shanghai 200120, Peoples R China
关键词
Network security; social networks; Sybil attack and detection;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Currently, most of the existing social networks on Internet are distributed, decentralized systems, and they are particularly vulnerable to Sybil attack in which a single malicious user introduces multiple bogus identities and pretends to be multiple and real users in the network. With these controlled identities, the malicious user can create a Byzantine failure in collaborative tasks by 'out vote' the real identities. This paper conducts a survey on the network security of social networks to provide the overview of the current online security of the social networks and the corresponding defend methods. Based on the survey, this paper proposes Sybil-Resist, a Random Walk-based Sybil attack defense protocol devoting to identifying the Sybil nodes and the Sybil region efficiently. The simulation results obtained by a more realistic simulation topology show that the proposed scheme outperforms existing solutions in terms of detection accuracy and running time.
引用
收藏
页码:219 / 230
页数:12
相关论文
共 50 条
  • [1] Sybil-resist: A new protocol for Sybil attack defense in social network
    Ma, Wei
    Hu, Sen-Zhe
    Dai, Qiong
    Wang, Ting-Ting
    Huang, Yin-Fei
    Communications in Computer and Information Science, 2014, 490 : 219 - 230
  • [2] Security against sybil attack in social network
    Kansara, Krishna B.
    Shekokar, Narendra M.
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [3] Defense mechanisms against Sybil attack in vehicular ad hoc network
    Mohammadi, Mahdiyeh Ali
    Pouyan, Ali A.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 917 - 936
  • [4] A Novel Prevention Mechanism for Sybil Attack in Online Social Network
    AlRubaian, Majed
    Al-Qurishi, Muhammad
    Rahman, Sk Md Mizanur
    Alamri, Atif
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [5] Toward an Optimal Social Network Defense Against Sybil Attacks
    Yu, Haifeng
    Gibbons, Phillip B.
    Kaminsky, Michael
    PODC'07: PROCEEDINGS OF THE 26TH ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2007, : 376 - 377
  • [6] A New Sybil Attack Detection for Wireless Body Sensor Network
    Liu, Ruixia
    Wang, Yinglong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 367 - 370
  • [7] Sybil group attack detection in Kad network
    Li, Zhoujun, 1614, Science Press (51):
  • [8] Sybil attack detection in a hierarchical sensor network
    Yin, Jian
    Madria, Sanjay Kumar
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 494 - 503
  • [9] A Behavioral Study of Sybil Attack on Vehicular Network
    Suman, Amrit
    Kumar, Chiranjeev
    2016 3RD INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INFORMATION TECHNOLOGY (RAIT), 2016, : 56 - 60
  • [10] Review on Detection and Mitigation of Sybil attack in the network
    Bhise, Arpita M.
    Kamble, Shailesh D.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 395 - 401