Communities, Random Walks, and Social Sybil Defense
نویسندگان
چکیده
Sybil attacks, in which an adversary forges a potentially unbounded number of identities, are a danger to distributed systems and online social networks. The goal of sybil defense is to accurately identify sybil identities. This paper surveys the evolution of sybil defense protocols that leverage the structural properties of the social graph underlying a distributed system to identify sybil identities. We make two main contributions. First, we clarify the deep connection between sybil defense and the theory of random walks. This leads us to identify a community detection algorithm that, for the first time, offers provable guarantees in the context of sybil defense. Second, we advocate a new goal for sybil defense that addresses the more limited, but practically useful, goal of securely white-listing a local region of the graph.
منابع مشابه
Supplementary file for “ SybilDefender : A Defense Mechanism for Sybil Attacks in Large Social Networks ”
G(V,E) social graph, V is the set of nodes, E is the set of edges P transition matrix of the random walk process n number of honest nodes in G λ initial state vector of the random walk process π stationary distribution of G l random walk length Ql accumulated probability distribution of the nodes being traversed by a random walk with length l t threshold frequency used in the sybil identificati...
متن کاملImproving Sybil Detection via Graph Pruning and Regularization Techniques
Due to their open and anonymous nature, online social networks are particularly vulnerable to Sybil attacks. In recent years, there has been a rising interest in leveraging social network topological structures to combat Sybil attacks. Unfortunately, due to their strong dependency on unrealistic assumptions, existing graph-based Sybil defense mechanisms suffer from high false detection rates. I...
متن کاملSybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection
Sybil attacks are becoming increasingly widespread and pose a significant threat to online social systems; a single adversary can inject multiple colluding identities in the system to compromise security and privacy. Recent works have leveraged social network-based trust relationships to defend against Sybil attacks. However, existing defenses are based on oversimplified assumptions about netwo...
متن کاملTowards trustworthy social computing systems
The rising popularity of social computing systems has managed to attract rampant forms of service abuse that negatively affects the sustainability of these systems and degrades the quality of service experienced by their users. The main factor that enables service abuse is the weak identity infrastructure used by most sites, where identities are easy to create with no verification by a trusted ...
متن کاملSurvey of Sybil Attacks in Social Networks
This paper reviews the Sybil attack in social networks, which has the ability to compromise the whole distributed network. In the Sybil attack, the malicious user claims multiple identities to compromise the whole network. Sybil attacks can be used to change the overall ranking in voting applications, bad-mouth an opinion, access resources or to break the trust mechanism behind a P2P network. I...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Internet Mathematics
دوره 10 شماره
صفحات -
تاریخ انتشار 2014