Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/SP.2013.33guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

SoK: The Evolution of Sybil Defense via Social Networks

Published: 19 May 2013 Publication History

Abstract

Sybil attacks in which an adversary forges a potentially unbounded number of identities are a danger to distributed systems and online social networks. The goal of sybil defense is to accurately identify sybil identities. This paper surveys the evolution of sybil defense protocols that leverage the structural properties of the social graph underlying a distributed system to identify sybil identities. We make two main contributions. First, we clarify the deep connection between sybil defense and the theory of random walks. This leads us to identify a community detection algorithm that, for the first time, offers provable guarantees in the context of sybil defense. Second, we advocate a new goal for sybil defense that addresses the more limited, but practically useful, goal of securely white-listing a local region of the graph.

Cited By

View all
  • (2022)Differentially private graph learning via sensitivity-bounded personalized pagerankProceedings of the 36th International Conference on Neural Information Processing Systems10.5555/3600270.3601913(22617-22627)Online publication date: 28-Nov-2022
  • (2022)Foundations for Grassroots Democratic MetaverseProceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems10.5555/3535850.3536116(1814-1818)Online publication date: 9-May-2022
  • (2020)TrustGCNProceedings of the 12th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1109/ASONAM49781.2020.9381325(42-49)Online publication date: 7-Dec-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '13: Proceedings of the 2013 IEEE Symposium on Security and Privacy
May 2013
571 pages
ISBN:9780769549774

Publisher

IEEE Computer Society

United States

Publication History

Published: 19 May 2013

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Differentially private graph learning via sensitivity-bounded personalized pagerankProceedings of the 36th International Conference on Neural Information Processing Systems10.5555/3600270.3601913(22617-22627)Online publication date: 28-Nov-2022
  • (2022)Foundations for Grassroots Democratic MetaverseProceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems10.5555/3535850.3536116(1814-1818)Online publication date: 9-May-2022
  • (2020)TrustGCNProceedings of the 12th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1109/ASONAM49781.2020.9381325(42-49)Online publication date: 7-Dec-2020
  • (2019)Sybil-resilient reality-aware social choiceProceedings of the 28th International Joint Conference on Artificial Intelligence10.5555/3367032.3367114(572-579)Online publication date: 10-Aug-2019
  • (2019)SoKProceedings of the 1st ACM Conference on Advances in Financial Technologies10.1145/3318041.3355458(183-198)Online publication date: 21-Oct-2019
  • (2019)Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social NetworksProceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining10.1145/3292500.3330702(2012-2022)Online publication date: 25-Jul-2019
  • (2018)Online Social Spammer Detection Based on Semi-supervised LearningProceedings of the 2018 International Conference on Algorithms, Computing and Artificial Intelligence10.1145/3302425.3302429(1-5)Online publication date: 21-Dec-2018
  • (2017)PrioProceedings of the 14th USENIX Conference on Networked Systems Design and Implementation10.5555/3154630.3154652(259-282)Online publication date: 27-Mar-2017
  • (2017)Identity Related Threats, Vulnerabilities and Risk Mitigation in Online Social NetworksProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3136066(2603-2605)Online publication date: 30-Oct-2017
  • (2017)Systems Applications of Social NetworksACM Computing Surveys10.1145/309274250:5(1-42)Online publication date: 26-Sep-2017
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media