2017
DOI: 10.1002/cpe.4276
|View full text |Cite
|
Sign up to set email alerts
|

SybilTrap: A graph‐based semi‐supervised Sybil defense scheme for online social networks

Abstract: Sybil attacks are increasingly prevalent in online social networks. A malicious user can generate a huge number of fake accounts to produce spam, impersonate other users, commit fraud, and reach many legitimate users. For security reasons, such fake accounts have to be detected and deactivated immediately. Various defense schemes have been proposed to deal with fake accounts. However, most identify fake accounts using only the structure of social graphs, leading to poor performance. In this paper, we propose a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…Moreover, unlike [18], where just one evaluation metric, "Accuracy", was used to evaluate the model's performance, in this work, here, we measure the model's performance by using four evaluation metrics -"Precision", "Recall", "F1" score, and "Accuracy" (see table 5). Furthermore, we provide the descriptive statistics of the features (see table 4) as well as their correlation with the target (see figure 3) and compare our work with other similar works as SybilTrap [19] (see table 2). Finally, we conduct a comparative review of the user characteristics primarily used in the literature so far, and the ones used in our model and provide supplementary information to help with stratifying trusted and untrusted users (see table 3).…”
Section: A Our Contribution and Differences With Previous Workmentioning
confidence: 99%
“…Moreover, unlike [18], where just one evaluation metric, "Accuracy", was used to evaluate the model's performance, in this work, here, we measure the model's performance by using four evaluation metrics -"Precision", "Recall", "F1" score, and "Accuracy" (see table 5). Furthermore, we provide the descriptive statistics of the features (see table 4) as well as their correlation with the target (see figure 3) and compare our work with other similar works as SybilTrap [19] (see table 2). Finally, we conduct a comparative review of the user characteristics primarily used in the literature so far, and the ones used in our model and provide supplementary information to help with stratifying trusted and untrusted users (see table 3).…”
Section: A Our Contribution and Differences With Previous Workmentioning
confidence: 99%
“…Moreover, unlike [18], where just one evaluation metric, "Accuracy", was used to evaluate the model's performance, in this work, here, we measure the model's performance by using four evaluation metrics -"Precision", "Recall", "F1" score, and "Accuracy" (see table 5). Furthermore, we provide the descriptive statistics of the features (see table 4) as well as their correlation with the target (see figure 3) and compare our work with other similar works as SybilTrap [19] (see table 2). Finally, we conduct a comparative review of the user characteristics primarily used in the literature so far, and the ones used in our model and provide supplementary information to help with stratifying trusted and untrusted users (see table 3).…”
Section: A Our Contribution and Differences With Previous Workmentioning
confidence: 99%
“…Al-Qurishi et al [3] developed a new defence system to minimize Sybil attacks. The idea is to conspire a dataset 𝐷 = 𝐿 𝐷 ∪ 𝑈 𝐷 , where 𝐿 𝐷 is a small set of labelled data and 𝑈 𝐷 is a large set of unlabelled data.…”
Section: Sockpuppetmentioning
confidence: 99%