Designs to Account for Trust in Social Network-based Sybil Defenses

被引:1
作者
Mohaisen, Abedelaziz [1 ]
Hopper, Nicholas [1 ]
Kim, Yongdae [1 ]
机构
[1] Univ Minnesota, Minneapolis, MN 55455 USA
来源
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10) | 2010年
关键词
Sybil Attack; Social Networks; Trust;
D O I
10.1145/1866307.1866407
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs. The performance of these defenses depends on the quality of the algorithmic property and assuming a strong trust model in the underlying graph. While it is natural to think of trust value associated with the social graphs, Sybil defenses have used the social graphs without this consideration. In this paper we study paramagnetic designs to tune the performance of Sybil defenses by accounting for trust in social graphs and modeling the trust as modified random walks. Our designs are motivated by the observed relationship between the algorithmic property required for the defenses to perform well and a hypothesized trust value in the underlying graphs.
引用
收藏
页码:714 / 716
页数:3
相关论文
共 11 条
[1]  
[Anonymous], 2009, NDSS
[2]  
Crandall DavidJ., 2008, KDD, P160
[3]  
Leskovec J., 2008, WWW
[4]  
Lesniewski-Lass Chris., 2010, 7 USENIX S NETWORK D, P3
[5]  
Mohaisen A., 2010, ACM SIGCOMM C INT ME
[6]  
Sinclair A., 1992, Combinatorics, probability and Computing, V1, P351, DOI [DOI 10.1017/S0963548300000390, 10.1017/S0963548300000390]
[7]  
Tran Dinh Nguyen, 2009, P 6 USENIX S NETW SY, P15
[8]  
Viswanath B., 2010, SIGCOMM IN PRESS
[9]  
Wilson C, 2009, EUROSYS'09: PROCEEDINGS OF THE FOURTH EUROSYS CONFERENCE, P205
[10]   SybilGuard: Defending against sybil attacks via social networks [J].
Yu, Haifeng ;
Kaminsky, Michael ;
Gibbons, Phillip B. ;
Flaxman, Abraham .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) :267-278