Abstract
Due to open and anonymous nature, online social networks are particularly vulnerable to the Sybil attack, in which a malicious user can fabricate many dummy identities to attack the systems. Recently, there is a flurry of interests to leverage social network structure for Sybil defense. However, most of graph-based approaches pay little attention to the distrust information, which is an important factor for uncovering more Sybils. In this paper, we propose an unified ranking mechanism by leveraging trust and distrust in social networks against such kind of attacks based on a variant of the PageRank-like model. Specifically, we first use existing topological anti-Sybil algorithms as a subroutine to produce reliable Sybil seeds. To enhance the robustness of these approaches against target attacks, we then also introduce an effective similarity-based graph pruning technique utilizing local structure similarity. Experiments show that our approach outperforms existing competitive methods for Sybil detection in social networks.
Chapter PDF
Similar content being viewed by others
References
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Haifeng, Y., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Computer Communication Review 36, 267–278 (2006)
Haifeng, Y., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: Security and Privacy (2008)
Tran, D.N., Min, B., Li, J., Subramanian, L.: Sybil-Resilient Online Content Voting. NSDI 9, 15–28 (2009)
Tran, N., Subramanian, L., Chow, S.S.M.: Optimal sybil-resilient node admission control. In: INFOCOM (2011)
Viswanath, B., Post, A., Gummadi, K.P., Mislove, A.: An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review 41(4), 363–374 (2011)
Mohaisen, A., Yun, A., Kim, Y.: Measuring the mixing time of social graphs. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement. ACM (2010)
Mohaisen, A., Hopper, N., Kim, Y.: Keep your friends close: Incorporating trust into social network-based sybil defenses. In: INFOCOM (2011)
Wei, W., Xu, F., Tan, C.C., Li, Q.: Sybildefender: Defend against sybil attacks in large social networks. In: INFOCOM (2012)
Qiang, C., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: NSDI (2012)
Chao, Y., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st International Conference on World Wide Web, pp. 71–80. ACM (2012)
Danezis, G., Mittal, P.: SybilInfer: Detecting Sybil Nodes using Social Networks. In: NDSS (2009)
Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st International Conference on World Wide Web. ACM (2012)
Berkhin, P.: A survey on pagerank computing. Internet Mathematics 2(1), 73–120 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Zhang, H., Xu, C., Zhang, J. (2014). Exploiting Trust and Distrust Information to Combat Sybil Attack in Online Social Networks. In: Zhou, J., Gal-Oz, N., Zhang, J., Gudes, E. (eds) Trust Management VIII. IFIPTM 2014. IFIP Advances in Information and Communication Technology, vol 430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43813-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-662-43813-8_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43812-1
Online ISBN: 978-3-662-43813-8
eBook Packages: Computer ScienceComputer Science (R0)