Communities, random walks, and social sybil defense

8Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

Sybil attacks, in which an adversary forges a potentially unbounded number of identities, are a danger to distributed systems and online social networks. The goal of sybil defense is to accurately identify sybil identities. This article surveys the evolution of sybil defense protocols that leverage the structural properties of the social graph underlying a distributed system to identify sybil identities. We make two main contributions. First, we clarify the deep connection between sybil defense and the theory of random walks. This leads us to identify a community detection algorithm that, for the first time, offers provable guarantees in the context of sybil defense. Second, we advocate a new goal for sybil defense that addresses the more limited, but practically useful, goal of securely white-listing a local region of the graph.

Cite

CITATION STYLE

APA

Alvisi, L., Clement, A., Epasto, A., Lattanzi, S., & Panconesi, A. (2014). Communities, random walks, and social sybil defense. Internet Mathematics, 10(3–4), 360–420. https://doi.org/10.1080/15427951.2013.865685

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free