Open Access Open Access  Restricted Access Subscription or Fee Access

ESSDM: an Efficient Mechanism for Handling Sybil Attacks in Social Networks


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v9i12.5006

Abstract


Social networks are becoming more popular platforms for communication, interaction and collaboration among relatives & friends. Researchers have recently come out with an emerging class of technology that leverage relationships from social networks to improve security in applications such as electronic mail, overlay routing and web browsing. Peer-to-peer systems are mostly vulnerable to Sybil attacks. The Sybil attack is an attack where an adversary creates multiple Duplicate or False identities to compromise the running of the system. By including false information by the Duplicated entities, an adversary can mislead a system into making decisions benefiting. Defending against Sybil attacks is quite challenging. Over the last few years, there are so many approaches suggested to overcome such issues of fake user behavior but there remain some issues unaddressed. This work gives a novel Sybil attack detection and removal mechanism based on behavioral analysis and neighbor similarity calculation named Enhanced Similarity based Sybil Detection Mechanism (ESSDM). In this approach, neighbor nodes acquainting with more familiarity are identified as the duplicated Sybil nodes. By applying our enhanced similarity based Sybil detection mechanism, the results show that the Sybil attack is considerably minimized, thereby improving security and its performance level.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Social Networks Security; Sybil Attack; Neighbor Similarity

Full Text:

PDF


References


J. Douceur, The Sybil Attack, Proceeding IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems, (Page: 251-260, 2002 ISBN:3-540-44179-4).

N. Tran, B. Min, J. Li, and L. Subramanian, Sybil-Resilient Online Content Voting, Proceedings of the 6th USENIX symposium on Networked systems design and implementation in NSDI, (Page: 15-28, 2009).

N. Tran, J. Li, L. Subramanian, and S. S. Chow, Optimal sybil-resilient node admission control, Proceedings IEEE INFOCOM, (Page: 3218-3226, 2011).
http://dx.doi.org/10.1109/infcom.2011.5935171

A. Post, V. Shah, and A. Mislove, Bazaar: Strengthening user reputations in online marketplaces, Proceedings of the 8th USENIX conference on Networked systems design and implementation, (Page: 183-196, 2011).

A. Mislove, A. Post, K. P. Gummadi, and P. Druschel, “Ostra: Leveraging Trust to Thwart Unwanted Communication,” in NSDI, 2008.

J. R. Douceur, “The sybil attack,” in IPTPS, 2002.
http://dx.doi.org/10.1007/3-540-45748-8_24

C. Piro, C. Shields, and B. N. Levine, Detecting the sybil attack in mobile ad hoc networks, in Securecomm and Workshops, 2006.
http://dx.doi.org/10.1109/seccomw.2006.359558

Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons and Abraham Flaxman, “SybilGuard: Defending against Sybil Attacks via Social Networks”, ACM Special Issue on SIGCOMM-06, 2006. doi: 1595933085/06/0009.
http://dx.doi.org/10.1145/1159913.1159945

Bo Yang, Liu J., and Feng J.. On the spectral characterization and scalable mining of network communities, IEEE Transactions On Knowledge and Data Engineering, 24(2), pp.326-337, 2012.
http://dx.doi.org/10.1109/tkde.2010.233

H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks, In Proc. IEEE S&P, Oakland, CA. 2008.
http://dx.doi.org/10.1109/sp.2008.13

H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, SybilGuard: Defending Against Sybil Attacks via Social Network, In Proc. SIGCOMM’06, Pisa, Italy. 2006.
http://dx.doi.org/10.1145/1159913.1159945

N. Tran, B. Min, J. Li, and L. Subramanian, Sybil-Resilient Online Content Voting, In Proc. NSDI’09, 2009. Boston, MA.

Piatek, M., Isdal, T., Krishnamurthy, A., and Anderson, T, One hop reputations for peer to peer file sharing workload, In NSDI’08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, USENIX Association, 2008. pp. 1–14.

Cheng, A., and Friedman, E, Sybilproof reputation mechanisms, In P2PECON ’05: Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, ACM, 2005. pp. 128–132.
http://dx.doi.org/10.1145/1080192.1080202

Ziegler, C.-N., and Lausen, G, Propagation models for trust and distrust in social networks, Journal of Information Systems Frontiers, Vol. 7, 4-5, 2005. Pages: 337–358.
http://dx.doi.org/10.1007/s10796-005-4807-3

Raph, Alexander, Attack-resistant trust metrics for public key certification, Proceeding SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium, Vol. 7, pp. 18-18, 1998.

Sandhya, M.K., Murugan, K., Eliminating False Data and improving network lifetime using mobile data collector in wireless sensor networks, (2014) International Review on Computers and Software (IRECOS), 9 (1), pp. 9-17.

Enshaei, M., Hanapi, Z.M., Othman, M., A review: Mobile Ad Hoc networks challenges, attacks, security, vulnerability and routing protocols, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 168-179.
http://dx.doi.org/10.15866/irecap.v4i5.3001


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize