An Efficient Technique To Detect And Prevent Sybil Attacks In Social Network Applications

被引:0
|
作者
Samuel, S. Justin [1 ]
Dhivya, B. [1 ]
机构
[1] Sathyabama Univ, Fac Comp, Dept Informat Technol, Madras, Tamil Nadu, India
关键词
Sybil attack; Social Network Security; Security with Trusted Relationship; P2P Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sybil attack is an attack where malicious users obtain multiple fake identities and access the system from multiple different modes. It is an attack wherein a reputation system is destroyed by falsifying identities in peer to peer networks. Communication between the users of networks only requires the users to be part of the same network. All kinds of distributed systems are capable of being wounded to Sybil attacks. An attacker can easily create a number of duplicate identities (called as Sybil) to impure the system with fake information and affect the exact performance of the system. In this paper, We propose an algorithm to improve the efficiency of blocking a Sybil attack by combining neighborhood similarity method and improved Knowledge Discovery tree based algorithm. This algorithm is proposed to block sybil attacks in social websites like Facebook, Twitter.
引用
收藏
页数:3
相关论文
共 50 条
  • [31] Is It Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper
    Hammi, Badis
    Idir, Yacine Mohamed
    Zeadally, Sherali
    Khatoun, Rida
    Nebhen, Jamel
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) : 18273 - 18287
  • [32] A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks
    Moradi, Sepide
    Alavi, Meysam
    2016 EIGHTH INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2016, : 276 - 280
  • [33] Security against sybil attack in social network
    Kansara, Krishna B.
    Shekokar, Narendra M.
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [34] A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications
    Samanta, Ashis Kumar
    Chaki, Nabendu
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2023, 2023, 14164 : 108 - 123
  • [35] Safeguarding against sybil attacks via social networks and multipath routing
    Hota, Chittaranjan
    Lindqvist, Janne
    Karvonen, Kristiina
    Yla-Jaaski, Antti
    Mohan, C. K. J.
    INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 122 - +
  • [36] An Efficient Test Technique to Prevent Scan-Based Side-Channel Attacks
    Ahlawat, Satyadev
    Vaghani, Darshit
    Singh, Virendra
    2017 22ND IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2017,
  • [37] Detecting Sybil attacks in image senor network using cognitive intelligence
    Muraleedharan, Rajani
    Yan, Yanjun
    Osadciw, Lisa Ann
    International Conference on Mobile Computing and Networking, MobiCom'07 Co-Located Workshops - Proceedings of the First ACM Workshop on Sensor and Actor Networks, SANET'07, 2007, : 59 - 60
  • [38] A Security Routing Mechanism against Sybil Attacks in Mobile Social Networks
    Sun, Yan
    Yin, Lihua
    WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 : 325 - 332
  • [39] Safeguarding against Sybil attacks via social networks and multipath routing
    Hota, Chittaranjan
    Srikanth, M. S., V
    Ylae-Jaeaeski, Antti
    Lindqvist, Janne
    Kristiina, K.
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 1039 - +
  • [40] SybilExposer: An Effective Scheme to Detect Sybil Communities in Online Social Networks
    Misra, Satyajayant
    Tayeen, Abu Saleh Md
    Xu, Wen
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,