Review on Detection and Mitigation of Sybil attack in the network

被引:8
|
作者
Bhise, Arpita M. [1 ]
Kamble, Shailesh D. [1 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Dept Comp Technol, Nagpur 441110, Maharashtra, India
来源
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015 | 2016年 / 78卷
关键词
Sybil attacks; reputation system; pseudonymous identities; peer-to-peer networks; WIRELESS; TRUST;
D O I
10.1016/j.procs.2016.02.080
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sybil attack is an attack in which the identities of the node are subverted and the large number of pseudonymous identities is produced to gain the access of the network. In this paper, we studied the detection mechanism of Sybil attack in peer-to-peer reputation systems, self-organizing networks and even social network systems. Also, various methods to mitigate the Sybil attack are analyzed. The studied mechanisms are evaluated in terms of detection rate, false positive rate, false negative rate and non trustworthy rate. A research component in detection and mitigation of Sybil attack is, how to improve the detection rate and to minimize the false positive and false negative rate. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:395 / 401
页数:7
相关论文
共 50 条
  • [1] Sybil group attack detection in Kad network
    Li, Zhoujun, 1614, Science Press (51):
  • [2] Sybil attack detection in a hierarchical sensor network
    Yin, Jian
    Madria, Sanjay Kumar
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 494 - 503
  • [3] Sybil Nodes as a Mitigation Strategy against Sybil Attack
    Trifa, Zied
    Khemakhem, Maher
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 1135 - 1140
  • [4] Network Attack Detection and Mitigation
    Roy, Sangita
    Sairam, Ashok Singh
    2015 IEEE NINTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS (SASOW), 2015, : 168 - 173
  • [5] Sybil Attack Prevention and Detection in Vehicular Ad hoc Network
    Sharma, Aravendra Kumar
    Saroj, Sushil Kumar
    Chauhan, Sanjeev Kumar
    Saini, Sachin Kumar
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 594 - 599
  • [6] A NOVEL SYBIL ATTACK DETECTION SCHEME FOR WIRELESS SENSOR NETWORK
    Tian, Bin
    Yao, Yizhan
    Shi, Lei
    Shao, Shuai
    Liu, Zhaohui
    Xu, Changxing
    2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, : 294 - 297
  • [7] A New Sybil Attack Detection for Wireless Body Sensor Network
    Liu, Ruixia
    Wang, Yinglong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 367 - 370
  • [8] Sybil Attack Detection Based on RSSI for Wireless Sensor Network
    Wang, Jiangtao
    Yang, Geng
    Sun, Yuan
    Chen, Shengshou
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2684 - 2687
  • [9] Network Dominating Attack Detection and Mitigation
    Johny, Jincy
    Singh, Mahendra Pratap
    2018 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT'18), 2018,
  • [10] IoT Network Attack Detection and Mitigation
    Gelenbe, Erol
    Froehlich, Piotr
    Nowak, Mateusz
    Papadopoulos, Stavros
    Protogerou, Aikaterini
    Drosou, Anastasios
    Tzovaras, Dimitrios
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 123 - 128