Intelligent Sybil attack detection on abnormal connectivity behavior in mobile social networks

被引:0
作者
Chinchore, Anand [1 ]
Jiang, Frank [1 ]
Xu, Guandong [1 ]
机构
[1] Advanced Analytics Institute, University of Technology Sydney, Ultimo
来源
Lecture Notes in Business Information Processing | 2015年 / 224卷
关键词
Anomaly detection; Mobile social network; Sybil attack;
D O I
10.1007/978-3-319-21009-4_45
中图分类号
学科分类号
摘要
There have been a large number of researches on mobile networks in the literature, focusing on a variety of secured applications over the network, including the use of their connections, fake identification and attacks on social group. These applications are created for the intention to collect confidential information, money laundering, blackmailing and to perform other crime activity. The purpose of this research is to identify the behavior of the honest node (network account) and fake node (network account) on mobile social network. In this research, the behavior survey of these nodes is carried out and further analysed with the help of graph-based Sybil detection system. This paper particularly studies Sybil attacks and its defense system for IoT (Internet-of-Things) environment. To be implied, the identification of each forged Sybil node is to be tracked on the basis of nodes connectivity and their timing of connectivity as well as frequency among each other. Sybil node has a forged identity in different locations and also reports its virtual location information to servers. © Springer International Publishing Switzerland 2015.
引用
收藏
页码:602 / 617
页数:15
相关论文
共 23 条
[1]  
Alvisi L., Clement A., Epasto A., Lattanzi S., Panconesi A., SoK: The evolution of sybil defense via social networks: Security and privacy (SP), 2013, IEEE Symposium on Security and Privacy, pp. 382-396, (2013)
[2]  
Jyothi B.S., Janakiram D., SyMon: A practical approach to defend large structured P2P systems against Sybil Attack, Peer-To-Peer Networking and Applications, 4, 3, pp. 289-308, (2011)
[3]  
Cortimiglia M.N., Renga F., Ghezzi A., Mobile social networking: A case study in an australian mobile network operator, mobile business (ICMB), 2011 Tenth International Conference on Mobile Business, pp. 84-92, (2011)
[4]  
Haifeng Y., Gibbons P.B., Kaminsky M., Feng X., SybilLimit: A near-optimal social network defense against sybil attacks, IEEE/ACM Trans. Netw, 18, 3, pp. 885-898, (2010)
[5]  
Haifeng Y., Kaminsky M., Gibbons P.B., Flaxman A.D., SybilGuard: Defending against sybil attacks via social networks, IEEE/ACM Netw, 16, 3, pp. 576-589, (2008)
[6]  
Hao X., Weidong X., Tang D., Tang J., Wang Z., Core-based community evolution in mobile social networks: Big data, 2013, IEEE International Conference, (2013)
[7]  
Jing J., Zifei S., Wenpeng S., Xiao W., Yafei D., Detecting and validating sybil groups in the wild, distributed computing systems workshops (ICDCSW), 2012 32nd International Conference, pp. 127-132, (2012)
[8]  
Koleshwar A., Thakare V., Sherekar S., Study of mobile cloud computing security against cyber attacks, Int. J. Adv. Res. Comput. Sci, 5, 4, pp. 187-191, (2014)
[9]  
Kuan Z., Xiaohui L., Rongxing L., Xuemin S., SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks, communications (ICC), IEEE International Conference, pp. 6045-6049, (2013)
[10]  
Kuan Z., Xiaohui L., Rongxing L., Xuemin S., Sybil attacks and their defenses in the internet of things, Internet Things J. IEEE, 1, 5, pp. 372-383, (2014)