Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.12.533

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph  

Kim, Kyungbaek (전남대학교 전자컴퓨터공학부)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.12, 2013 , pp. 533-540 More about this Journal
Abstract
Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.
Keywords
Sybil Attack; Sybil-Resistant Trust Value; Fast Mixing Graph; Online Social Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Petar Maymounkov and David Mazieres, Kademlia: A Peer-to-peer Information System Based on the XOR Metric. In Proc. of 1st International Workshop on Peer-to-peer Systems (IPTPS'02), 2002.
2 Kyungbaek Kim. Using multiple verifiers to detect Sybils in a social network graph. In Proc. of the 8th International Conference on Future Information Technology (FutureTech 2013), September 4-6, 2013, Gwangju, South Korea.
3 Kyungbaek Kim. Assessing the impact of properties of a node to OSN based Sybil detection. In Proc. of the International Conference on Computer Applications and Information Processing Technology (CAIPT 2013), June 27-29, 2013, Prague, Czech Republic.
4 Kyungbaek Kim. Sybil-Resistant Trust Value of Social Network Graph. In Proc. of the First International Conference on Smart Media and Applications (SMA 2012), August 21-24, 2012, Kunming, Yunnan, China.
5 S. D. Kamvar, M. T. Schlosser and H. Garcia-molina. The EigenTrust Algorithm for Reputation Management in P2P Networks. In Proc. of 12th WWW, 2003.
6 A.G.P. Rahbar and O. Yang. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing. In IEEE TOPDS, Vol.18, Issue.4, April, 2007.
7 J. R. Douceur. The sybil attack. In Proceedings of IPTPS 2002, pp.251-260, 2002.
8 Luis von Ahn, Manuel Blum, Nicholas J. Hopper and John Langford. CAPTCHA: Using Hard AI Problems for Security. In Proc. EUROCRYPT 2003, Springer LNCS Vol.2656, Warsaw, Poland.
9 H. Yu, M. Kaminsky, P. B. Gibbons and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. In Proc. of ACM SIGCOMM, August, 2006.
10 H. Yu, P. B. Gibbons, M. Kaminsky and F. Xiao. SybilLimit:A Near-Optimal Social Network Defense against Sybil Attacks. In Proc. of IEEE Symposium on Security and Provacy 2008, pp.3-17, 2008.
11 Nguyen Tran, Jinyang Li, Lakshiminarayanan Subramanian, and Sherman S.M. Chow. Optimal Sybil-resilient node admission control. In Proc. INFOCOMM 2011
12 M. Mitzenmacher and E. Upfal. Probability and Computing. Cambridge University Press, 2005.
13 Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang. SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation. In Proc. of IEEE INFOCOM 2011, April 10-15, 2011, Shanghai, China.
14 Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan and Xiaowei Yang. Assessing the Veracity of Identity Assertions via OSNs. In Proc. of COMSNETS 2012, January 3-7, 2012, Bangalore, India.