2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6566893
|View full text |Cite
|
Sign up to set email alerts
|

SybilShield: An agent-aided social network-based Sybil defense among multiple communities

Abstract: Abstract-Lacking trusted central authority, distributed systems have received serious security threats from Sybil attack, where an adversary forges identities of more than one node and attempts to control the system. By utilizing the real-world trust relationships between users, social network-based defense schemes have been proposed to mitigate the impact of Sybil attacks. These solutions are mostly built on the assumption that the social network graph can be partitioned into two loosely linked regions -a tig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(20 citation statements)
references
References 21 publications
0
19
0
Order By: Relevance
“…We believe security is important and should be addressed in future publications. For example, recently proposed algorithms for collusion and sybil attack detection in social networks [40], [55] may be incorporated as additional filters that identify and drop "bad sources" from consideration before employing techniques described in this paper on the remaining data.…”
Section: Related Workmentioning
confidence: 99%
“…We believe security is important and should be addressed in future publications. For example, recently proposed algorithms for collusion and sybil attack detection in social networks [40], [55] may be incorporated as additional filters that identify and drop "bad sources" from consideration before employing techniques described in this paper on the remaining data.…”
Section: Related Workmentioning
confidence: 99%
“…This can be leveraged in a variety of ways, leading to detection mechanisms (Yu et al, 2006(Yu et al, , 2008Danezis and Mittal, 2009;Wei et al, 2012), and Sybil-resistant P2P designs (Lesniewski-Laas, 2008;Lesniewski-Laas and Kaashoek, 2010;Mittal et al, 2012). In this case, Sybilshield (Shi et al, 2013;Gunturu, 2015) assumes that there exist multiple number of large, medium and small communities in real-time social networks. The authors conducted a real-time experiment on Myspace dataset, which reveals that it can be divided into 19 communities (Shi et al, 2013).…”
Section: Related Workmentioning
confidence: 99%
“…In this case, Sybilshield (Shi et al, 2013;Gunturu, 2015) assumes that there exist multiple number of large, medium and small communities in real-time social networks. The authors conducted a real-time experiment on Myspace dataset, which reveals that it can be divided into 19 communities (Shi et al, 2013).…”
Section: Related Workmentioning
confidence: 99%
“…problems like node capture [28] and detection of selfish behavior and other security issues [9,10,11,12,13] have been solved by exploiting social relations among the network nodes.…”
Section: Related Workmentioning
confidence: 99%