Exploiting trust and distrust information to combat sybil attack in online social networks

6Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Due to open and anonymous nature, online social networks are particularly vulnerable to the Sybil attack, in which a malicious user can fabricate many dummy identities to attack the systems. Recently, there is a flurry of interests to leverage social network structure for Sybil defense. However, most of graph-based approaches pay little attention to the distrust information, which is an important factor for uncoveringmore Sybils. In this paper, we propose an unified ranking mechanismby leveraging trust and distrust in social networks against such kind of attacks based on a variant of the PageRank-like model. Specifically, we first use existing topological anti-Sybil algorithms as a subroutine to produce reliable Sybil seeds. To enhance the robustness of these approaches against target attacks, we then also introduce an effective similarity-based graph pruning technique utilizing local structure similarity. Experiments show that our approach outperforms existing competitive methods for Sybil detection in social networks.

Cite

CITATION STYLE

APA

Zhang, H., Xu, C., & Zhang, J. (2014). Exploiting trust and distrust information to combat sybil attack in online social networks. In IFIP Advances in Information and Communication Technology (Vol. 430, pp. 77–92). Springer New York LLC. https://doi.org/10.1007/978-3-662-43813-8_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free