Understanding Sybil Groups in the Wild

被引:8
作者
Jiang, Jing [1 ,2 ]
Shan, Zi-Fei [2 ]
Wang, Xiao [2 ]
Zhang, Li [1 ]
Dai, Ya-Fei [2 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[2] Peking Univ, Dept Comp Sci & Technol, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
online social network; measurement; security; sybil group; sybil attack; SOCIAL NETWORKS; ATTACKS; DEFENSE;
D O I
10.1007/s11390-015-1602-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Sybil attacks are one kind of well-known and powerful attacks against online social networks (OSNs). In a sybil attack, a malicious attacker generates a sybil group consisting of multiple sybil users, and controls them to attack the system. However, data confidentiality policies of major social network providers have severely limited researchers' access to large-scale datasets of sybil groups. A deep understanding of sybil groups can provide important insights into the characteristics of malicious behavior, as well as numerous practical implications on the design of security mechanisms. In this paper, we present an initial study to measure sybil groups in a large-scale OSN, Renren. We analyze sybil groups at different levels, including individual information, social relationships, and malicious activities. Our main observations are: 1) user information in sybil groups is usually incomplete and in poor quality; 2) sybil groups have special evolution patterns in connectivity structure, including bursty actions to add nodes, and a monotonous merging pattern that lacks non-singleton mergings; 3) several sybil groups have strong relationships with each other and compose sybil communities, and these communities cover a large number of users and pose great potential threats; 4) some sybil users are not banned until a long time after registration in some sybil groups. The characteristics of sybil groups can be leveraged to improve the security mechanisms in OSNs to defend against sybil attacks. Specifically, we suggest that OSNs should 1) check information completeness and quality, 2) learn from dynamics of community connectivity structure to detect sybil groups, 3) monitor sybil communities and inspect them carefully to prevent collusion, and 4) inspect sybil groups that behave normally even for a long time to prevent potential malicious behaviors.
引用
收藏
页码:1344 / 1357
页数:14
相关论文
共 36 条
[1]  
[Anonymous], 2010, IMC 2010 P
[2]  
Bastian M., ICWSM, Vvol 3, ppp 361, DOI [10.1016/B978-0-12-372180-8.50042-1, DOI 10.1609/ICWSM.V3I1.13937]
[3]  
Benevenuto F, 2010, P CEAS JUL
[4]   Detecting Spammers and Content Promoters in Online Video Social Networks [J].
Benevenuto, Fabricio ;
Rodrigues, Tiago ;
Almeida, Virgilio ;
Almeida, Jussara ;
Goncalves, Marcos .
PROCEEDINGS 32ND ANNUAL INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2009, :620-627
[5]  
Bhat SajidYousuf., 2013, ADV SOCIAL NETWORKS, P100
[6]   Fast unfolding of communities in large networks [J].
Blondel, Vincent D. ;
Guillaume, Jean-Loup ;
Lambiotte, Renaud ;
Lefebvre, Etienne .
JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, 2008,
[7]  
Chu Z, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P21
[8]  
Dai H, 2012, P C INF KNOWL MAN CI, P1557
[9]  
Danezis G, 2009, P NDSS FEBR
[10]   Detecting and Characterizing Social Spam Campaigns [J].
Gao, Hongyu ;
Hu, Jun ;
Wilson, Christo ;
Li, Zhichun ;
Chen, Yan ;
Zhao, Ben Y. .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :681-683