Sybil Defense Techniques in Online Social Networks: A Survey

被引:58
作者
Al-Qurishi, Muhammad [1 ]
Al-Rakhami, Mabrook [1 ]
Alamri, Atif [1 ]
Alrubaian, Majed [1 ]
Rahman, Sk Md Mizanur [1 ,3 ]
Hossain, M. Shamim [2 ]
机构
[1] King Saud Univ, Res Chair Pervas & Mobile Comp, Riyadh 11543, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 11543, Saudi Arabia
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11543, Saudi Arabia
来源
IEEE ACCESS | 2017年 / 5卷
关键词
Online social networks; Sybil attack and defense; Twitter; Sybil impact; BIG DATA; ATTACKS; SYBILDEFENDER; COMMUNITIES; CENTRALITY;
D O I
10.1109/ACCESS.2017.2656635
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this article, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks.
引用
收藏
页码:1200 / 1219
页数:20
相关论文
共 110 条
[1]   Dissecting a Social Botnet: Growth, Content and Influence in Twitter [J].
Abokhodair, Norah ;
Yoo, Daisy ;
McDonald, David W. .
PROCEEDINGS OF THE 2015 ACM INTERNATIONAL CONFERENCE ON COMPUTER-SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CSCW'15), 2015, :839-851
[2]   Online Social Network Management Systems: State of The Art [J].
Al-Qurishi, Muhammad ;
Al-Rakhami, Mabrook ;
AlRubaian, Majed ;
Alamri, Atif ;
Al-Hougbany, Mohammed .
INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, 73 :474-481
[3]  
AlRubaian M., 2015, P R C 2 N R L S M P, P1
[4]   A Multistage Credibility Analysis Model for Microblogs [J].
AlRubaian, Majed ;
Al-Qurishi, Muhammad ;
Al-Rakhami, Mabrook ;
Rahman, Sk Md Mizanur ;
Alamri, Atif .
PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, :1434-1440
[5]   Communities, Random Walks, and Social Sybil Defense [J].
Alvisi, Lorenzo ;
Clement, Allen ;
Epasto, Alessandro ;
Lattanzi, Silvio ;
Panconesi, Alessandro .
INTERNET MATHEMATICS, 2014, 10 (3-4) :360-420
[6]  
[Anonymous], EACH MONTH 250 MILLI
[7]  
[Anonymous], 170 AMAZING TWITTER
[8]  
[Anonymous], SURVEY SYBIL ATTACKS
[9]  
[Anonymous], CONCURRENCY COMPUTAT
[10]  
[Anonymous], ALRIYADH NEWS PAPER