A novel model for Sybil attack detection in online social network using optimal three-stream double attention network

被引:6
作者
Antony, Blessy [1 ]
Revathy, S. [2 ]
机构
[1] Sathyabama Inst Sci & Technol Deemed Be Univ, Dept Comp Sci & Engn, Chennai, India
[2] Sathyabama Inst Sci & Technol Deemed Be Univ, Dept IT, Chennai, India
关键词
Online social network; Sybil attack; Detection of social spam; Bidirectional long short-term memory network; Three-stream-double attention network; Gannet optimization algorithm; PREDICTION;
D O I
10.1007/s11227-023-05677-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Online social networks (OSNs) have gained popularity as platforms for professional, personal, and social networking. However, they are also vulnerable to fraudulent events such as rumors or fake news, which can mislead users and have serious consequences. The dissemination of misinformation on social networking sites has become a global threat. To address this, a novel model GO-3DANB is proposed to utilize a three-stream, double attention network-modified BiLSTM (3S-A2 DenseNet-modified BiLSTM) with Gannet optimization algorithm (GOA) to predict Sybils in OSNs. The GO-3DANB model extracts network weights and crucial characteristics using the 3S-A2 DenseNet-modified BiLSTM to automatically extract higher and lower features from social network fake account (SNFA) input data. The SNFA dataset, containing 17 metadata features from fake and real profiles and a total of 921 data points, is collected from Kaggle. The modified BiLSTM is used to establish forward correlation with input sequences and learn dependencies with input sequences in backward sequence, thereby completely extracting context information among various channels. We utilize GOA optimization to assess each individual's fitness for identifying Sybil's attacks. Our proposed method is evaluated using various metrics, including precision, sensitivity, accuracy, specificity, F1-score value, and receiver operating characteristic curve (ROC). In comparison to existing methods, our proposed method, GO-3DANB, achieves 96% accuracy, 96.34% precision, 95.31% specificity, 96.5% sensitivity, 0.96 F1-score value, and 0.97 ROC. Thus, our proposed method demonstrates the potential to address the problem of Sybil detection in OSNs and provides a valuable contribution to the field of Sybil security.
引用
收藏
页码:7433 / 7482
页数:50
相关论文
共 46 条
[21]   Hybrid graph -based Sybil detection with user behavior patterns [J].
Li, Xiang ;
Lin, Qixiao ;
Mao, Jian .
2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 :607-612
[22]   Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things [J].
Liu, Yi ;
Zhao, Ruihui ;
Kang, Jiawen ;
Yassine, Abdulsalam ;
Niyato, Dusit ;
Peng, Jialiang .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (03)
[23]  
Lu Y, 2019, SOCIAL NETWORK FAKE
[24]   Credibility Enhanced Temporal Graph Convolutional Network Based Sybil Attack Detection On Edge Computing Servers [J].
Luo, Baiting ;
Liu, Xiangguo ;
Zhu, Qi .
2021 32ND IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV), 2021, :524-531
[25]   Detecting quantum attacks: a machine learning based defense strategy for practical continuous-variable quantum key distribution [J].
Mao, Yiyu ;
Huang, Wenti ;
Zhong, Hai ;
Wang, Yijun ;
Qin, Hao ;
Guo, Ying ;
Huang, Duan .
NEW JOURNAL OF PHYSICS, 2020, 22 (08)
[26]   RETRACTED: Machine Learning Technique to Detect Sybil Attack on IoT Based Sensor Network (Retracted Article) [J].
Mehbodniya, Abolfazl ;
Webber, Julian L. ;
Shabaz, Mohammad ;
Mohafez, Hamidreza ;
Yadav, Kusum .
IETE JOURNAL OF RESEARCH, 2023, 69 (10)
[27]   A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things [J].
Murali, Sarumathi ;
Jamalipour, Abbas .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) :379-388
[28]   Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks [J].
Nancy, Periasamy ;
Muthurajkumar, S. ;
Ganapathy, S. ;
Kumar, S. V. N. ;
Selvi, M. ;
Arputharaj, Kannan .
IET COMMUNICATIONS, 2020, 14 (05) :888-895
[29]  
Onyema E.M., 2022, Security and Privacy in Cyberspace, P25
[30]   A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks [J].
Onyema, Edeh Michael ;
Kumar, M. Anand ;
Balasubaramanian, Sundaravadivazhagn ;
Bharany, Salil ;
Rehman, Ateeq Ur ;
Eldin, Elsayed Tag ;
Shafiq, Muhammad .
SUSTAINABILITY, 2022, 14 (19)