Sybil-Resist: A New Protocol for Sybil Attack Defense in Social Network

被引:0
|
作者
Ma, Wei [1 ]
Hu, Sen-Zhe [2 ]
Dai, Qiong [1 ]
Wang, Ting-Ting [1 ]
Huang, Yin-Fei [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Beijing Special Vehicle Inst, Beijing 100072, Peoples R China
[3] Shanghai Stock Exchange, Shanghai 200120, Peoples R China
关键词
Network security; social networks; Sybil attack and detection;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Currently, most of the existing social networks on Internet are distributed, decentralized systems, and they are particularly vulnerable to Sybil attack in which a single malicious user introduces multiple bogus identities and pretends to be multiple and real users in the network. With these controlled identities, the malicious user can create a Byzantine failure in collaborative tasks by 'out vote' the real identities. This paper conducts a survey on the network security of social networks to provide the overview of the current online security of the social networks and the corresponding defend methods. Based on the survey, this paper proposes Sybil-Resist, a Random Walk-based Sybil attack defense protocol devoting to identifying the Sybil nodes and the Sybil region efficiently. The simulation results obtained by a more realistic simulation topology show that the proposed scheme outperforms existing solutions in terms of detection accuracy and running time.
引用
收藏
页码:219 / 230
页数:12
相关论文
共 50 条
  • [21] DEFENSE AGAINST SYBIL ATTACK IN VEHICULAR AD HOC NETWORK BASED ON ROADSIDE UNIT SUPPORT
    Park, Soyoung
    Aslam, Baber
    Turgut, Damla
    Zou, Cliff C.
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 37 - 43
  • [22] Location verification based defense against sybil attack in sensor networks
    Mukhopadhyay, Debapriyay
    Saha, Indranil
    DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2006, 4308 : 509 - 521
  • [23] SybilVote: Formulas to Quantify the Success Probability of Sybil Attack in Online Social Network Voting
    Silawan, Teerapol
    Aswakul, Chaodit
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (07) : 1553 - 1556
  • [24] Robust Sybil attack defense with information level in online Recommender Systems
    Noh, Giseop
    Kang, Young-myoung
    Oh, Hayoung
    Kim, Chong-kwon
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) : 1781 - 1791
  • [25] Research on sybil attack in defense blockchain based on improved PBFT algorithm
    Lai Y.
    Bo Z.
    Liu J.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (09): : 104 - 117
  • [26] Survey on sybil attack defense mechanisms in wireless ad hoc networks
    Vasudeva, Amol
    Sood, Manu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 120 : 78 - 118
  • [27] A prediction system of Sybil attack in social network using deep-regression model
    Al-Qurishi, Muhammad
    Alrubaian, Majed
    Rahman, Sk Md Mizanur
    Alamri, Atif
    Hassan, Mohammad Mehedi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 743 - 753
  • [28] Sybil Attack Prevention and Detection in Vehicular Ad hoc Network
    Sharma, Aravendra Kumar
    Saroj, Sushil Kumar
    Chauhan, Sanjeev Kumar
    Saini, Sachin Kumar
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 594 - 599
  • [29] A NOVEL SYBIL ATTACK DETECTION SCHEME FOR WIRELESS SENSOR NETWORK
    Tian, Bin
    Yao, Yizhan
    Shi, Lei
    Shao, Shuai
    Liu, Zhaohui
    Xu, Changxing
    2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, : 294 - 297
  • [30] Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network
    Zhang, Shijie
    Lee, Jong-Hyouk
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (10) : 5715 - 5722