2013 IEEE Symposium on Security and Privacy 2013
DOI: 10.1109/sp.2013.33
|View full text |Cite
|
Sign up to set email alerts
|

SoK: The Evolution of Sybil Defense via Social Networks

Abstract: Sybil attacks in which an adversary forges a potentially unbounded number of identities are a danger to distributed systems and online social networks. The goal of sybil defense is to accurately identify sybil identities. This paper surveys the evolution of sybil defense protocols that leverage the structural properties of the social graph underlying a distributed system to identify sybil identities. We make two main contributions. First, we clarify the deep connection between sybil defense and the theory of r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
107
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 120 publications
(110 citation statements)
references
References 40 publications
0
107
0
Order By: Relevance
“…As shown before, defenses built according to these properties are very sensitive to changes in the graph structure. Alvisi et al suggest to force Sybils into the required structure [18] by monitoring the link request acceptance rates of different nodes. If a node has to be accepted by a certain number of other nodes to be classified as benign, Sybils might be forced into creating many links among themselves (which are guaranteed to be accepted).…”
Section: Prospects Of Future Sybil Defense Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…As shown before, defenses built according to these properties are very sensitive to changes in the graph structure. Alvisi et al suggest to force Sybils into the required structure [18] by monitoring the link request acceptance rates of different nodes. If a node has to be accepted by a certain number of other nodes to be classified as benign, Sybils might be forced into creating many links among themselves (which are guaranteed to be accepted).…”
Section: Prospects Of Future Sybil Defense Solutionsmentioning
confidence: 99%
“…Alvisi et al [18] pointed out that Sybil defense schemes tend to assume a minimal cut between Sybils and honest users, which however may not hold. The authors also analyzed SybilLimit [3] and show the sensitivity of the scheme to the existence of this cut.…”
Section: Introductionmentioning
confidence: 99%
“…In some scenarios, researchers develop de-anonymization techniques and then develop possible defense strategies against those types of techniques. Alvisi et al (2013) point out the Maginot syndrome for OSNs. In other words, while building strong defenses against sybil attacks, sophisticated attacks can be designed that exploit the weaknesses of these defenses.…”
Section: Defense Methods For De-anonymizationmentioning
confidence: 99%
“…Their main contribution is to be able to rank nodes where lower values indicate the likelihood of being a sybil node. Alvisi et al (2013) list four commonly used properties of structural graphs: popularity (degree of a node), small distance property (the maximum distance between any nodes in a social graph), clustering coefficient (related to the number of friendships of a user to the number of friendships among friends), and conductance (the ratio of the number of outgoing edges from the graph to the number of edges in the graph). The conductance property makes harder than other properties to act as undetected while not being fully fool-proof.…”
Section: Defense Methods For De-anonymizationmentioning
confidence: 99%
“…In social media platforms have been plagued "Sybil" attacks (where a reputation system is subverted by creating multiple fake identifies in a P2P network e.g. Social Network Site), Alvisi et al [2013] document and evaluate the evolution of defences that have been developed to mitigate this growing threat. The study shows trends in defence mechanisms, that are quickly becoming mathematically complex in nature and sometimes proven to be ineffectual in practice e.g.…”
Section: Technicalmentioning
confidence: 99%