Sybil Defense Techniques in Online Social Networks: A Survey

被引:54
|
作者
Al-Qurishi, Muhammad [1 ]
Al-Rakhami, Mabrook [1 ]
Alamri, Atif [1 ]
Alrubaian, Majed [1 ]
Rahman, Sk Md Mizanur [1 ,3 ]
Hossain, M. Shamim [2 ]
机构
[1] King Saud Univ, Res Chair Pervas & Mobile Comp, Riyadh 11543, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 11543, Saudi Arabia
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11543, Saudi Arabia
来源
IEEE ACCESS | 2017年 / 5卷
关键词
Online social networks; Sybil attack and defense; Twitter; Sybil impact; BIG DATA; ATTACKS; SYBILDEFENDER; COMMUNITIES; CENTRALITY;
D O I
10.1109/ACCESS.2017.2656635
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this article, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks.
引用
收藏
页码:1200 / 1219
页数:20
相关论文
共 50 条
  • [41] Survey of Online Social Networks Threats and Solutions
    Yassein, Muneer Bani
    Aljawarneh, Shadi
    Wahsheh, Yarub A.
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 375 - 380
  • [42] A SURVEY ON VULNERABLE ATTACKS IN ONLINE SOCIAL NETWORKS
    NaliniPriya, G.
    Asswini, M.
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [43] The Evolution of Online Social Networks A tutorial survey
    Leberknight, Christopher
    Inaltekin, Hazer
    Chiang, Mung
    Poor, H. Vincent
    IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (02) : 41 - 52
  • [44] Information Diffusion in Online Social Networks: A Survey
    Guille, Adrien
    Hacid, Hakim
    Favre, Cecile
    Zighed, Djamel A.
    SIGMOD RECORD, 2013, 42 (02) : 17 - 28
  • [45] Social Influence Aware Sybil Detection in Social Networks
    Wu, Dapeng
    Si, Shushan
    Wang, Honggang
    Wang, Ruyan
    Yan, Junjie
    2017 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2017, : 1135 - 1138
  • [46] A Content-Based Method for Sybil Detection in Online Social Networks via Deep Learning
    Gao, Tianyu
    Yang, Jin
    Peng, Wenjun
    Jiang, Luyu
    Sun, Yihao
    Li, Fangchuan
    IEEE ACCESS, 2020, 8 : 38753 - 38766
  • [47] Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
    Vora, Adnan
    Nesterenko, Mikhail
    Tixeuil, Sebastien
    Delaet, Sylvie
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, 10TH INTERNATIONAL SYMPOSIUM, SSS 2008, 2008, 5340 : 63 - +
  • [48] Robust Sybil attack defense with information level in online Recommender Systems
    Noh, Giseop
    Kang, Young-myoung
    Oh, Hayoung
    Kim, Chong-kwon
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) : 1781 - 1791
  • [49] Survey of network embedding techniques for social networks
    Nerurkar, Pranav
    Chandane, Madhav
    Bhirud, Sunil
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (06) : 4768 - 4782
  • [50] Toward an Optimal Social Network Defense Against Sybil Attacks
    Yu, Haifeng
    Gibbons, Phillip B.
    Kaminsky, Michael
    PODC'07: PROCEEDINGS OF THE 26TH ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2007, : 376 - 377