首页> 外文期刊>Concurrency and Computation >SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks
【24h】

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks

机译:SybilTrap:在线社交网络的基于图的半监督Sybil防御方案

获取原文
获取原文并翻译 | 示例
           

摘要

Sybil attacks are increasingly prevalent in online social networks. A malicious user canrngenerate a huge number of fake accounts to produce spam, impersonate other users, commitrnfraud, and reach many legitimate users. For security reasons, such fake accounts have to berndetected and deactivated immediately. Various defense schemes have been proposed to dealrnwith fake accounts. However, most identify fake accounts using only the structure of socialrngraphs, leading to poor performance. In this paper, we propose a new and scalable defensernscheme, SybilTrap. SybilTrap uses a semi‐supervised technique that automatically integratesrnthe underlying features of user activities with the social structure into one system. Unlikernother machine learning–based approaches, the proposed defense scheme works on unlabeledrndata, and it is effective in detecting targeted attacks, because it manipulates different levels ofrnfeatures of user profiles. We evaluate SybilTrap on a dataset collected from Twitter. We showrnthat our proposed scheme is able to accurately detect Sybil nodes as well as huge conspiraciesrnamong them.
机译:Sybil攻击在在线社交网络中越来越普遍。恶意用户可以生成大量的虚假帐户来产生垃圾邮件,冒充其他用户,进行欺诈并到达许多合法用户。出于安全原因,必须立即检测到此类假账户并停用它们。已经提出了各种防御方案来处理假帐。但是,大多数人仅使用社交图的结构来识别假账户,从而导致性能不佳。在本文中,我们提出了一种新的可扩展的防御方案SybilTrap。 SybilTrap使用一种半监督技术,该技术可将用户活动的基本特征与社会结构自动集成到一个系统中。与其他基于机器学习的方法不同,建议的防御方案适用于未标记的数据,并且由于它可操纵不同级别的用户配置文件功能,因此可以有效地检测目标攻击。我们根据从Twitter收集的数据集评估SybilTrap。我们证明,我们提出的方案能够准确地检测到Sybil节点以及它们之间的巨大阴谋。

著录项

  • 来源
    《Concurrency and Computation》 |2018年第5期|1-10|共10页
  • 作者单位

    Pervasive and Mobile Computing, Collage of Computer and Information Sciences, King Saud University, Riyadh, KSA Department of Information Systems, KingSaud University, Riyadh, KSA;

    Department of Information Systems, King Saud University, Riyadh, KSA;

    Pervasive and Mobile Computing, Collage of Computer and Information Sciences, King Saud University, Riyadh, KSA Department of Software Engineering, King Saud University, Riyadh, KSA;

    Pervasive and Mobile Computing, Collage of Computer and Information Sciences, King Saud University, Riyadh, KSA;

    Pervasive and Mobile Computing, Collage of Computer and Information Sciences, King Saud University, Riyadh, KSA;

    Department of Software Engineering, King Saud University, Riyadh, KSA;

    National Institute of Technology, Kurukshetra, India;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    social network; Sybil attack; Sybil defense; targeted attack;

    机译:社交网络;西比尔攻击;西比尔防御针对性攻击;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号