Introduction to algorithms
Randomized algorithms
The anatomy of a large-scale hypertextual Web search engine
WWW7 Proceedings of the seventh international conference on World Wide Web 7
Authoritative sources in a hyperlinked environment
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Sybilproof reputation mechanisms
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Statistical properties of community structure in large social and information networks
Proceedings of the 17th international conference on World Wide Web
Ostra: leveraging trust to thwart unwanted communication
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Proceedings of the 1st Workshop on Social Network Systems
DSybil: Optimal Sybil-Resistance for Recommendation Systems
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Link analysis, eigenvectors and stability
IJCAI'01 Proceedings of the 17th international joint conference on Artificial intelligence - Volume 2
Pass it on: social networks stymie censors
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Proceedings of the 18th ACM conference on Information and knowledge management
Securing rating aggregation systems using statistical detectors and trust
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Measurement and analysis of an online content voting network: a case study of Digg
Proceedings of the 19th international conference on World wide web
P2P trading in social networks: the value of staying connected
INFOCOM'10 Proceedings of the 29th conference on Information communications
Brief announcement: improving social-network-based sybil-resilient node admission control
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
An analysis of social network-based Sybil defenses
Proceedings of the ACM SIGCOMM 2010 conference
FaceTrust: assessing the credibility of online personas via social networks
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Whanau: a sybil-proof distributed hash table
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Designs to account for trust in social network-based sybil defenses
Proceedings of the 17th ACM conference on Computer and communications security
Collusion-resilient credit-based reputations for peer-to-peer content distribution
Proceedings of the 2010 Workshop on Economics of Networks, Systems, and Computation
Measuring the mixing time of social graphs
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
SocialFilter: introducing social trust to collaborative spam mitigation
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Foundations and Trends in Information Retrieval
Bazaar: strengthening user reputations in online marketplaces
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Defending against Sybil nodes in BitTorrent
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II
Sybil defenses via social networks: a tutorial and survey
ACM SIGACT News
Decentralized polling with respectable participants
Journal of Parallel and Distributed Computing
Uncovering social network sybils in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Vulnerabilities and countermeasures in context-aware social rating services
ACM Transactions on Internet Technology (TOIT)
Canal: scaling social network-based Sybil tolerance schemes
Proceedings of the 7th ACM european conference on Computer Systems
Leveraging trust and distrust for sybil-tolerant voting in online social media
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Innocent by association: early recognition of legitimate users
Proceedings of the 2012 ACM conference on Computer and communications security
Defending against large-scale crawls in online social networks
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Enhancing and identifying cloning attacks in online social networks
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
SocialWatch: detection of online service abuse via large-scale social graphs
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Iolaus: securing online content rating systems
Proceedings of the 22nd international conference on World Wide Web
Hang with your buddies to resist intersection attacks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Understanding latent interactions in online social networks
ACM Transactions on the Web (TWEB)
Proactively accountable anonymous messaging in verdict
SEC'13 Proceedings of the 22nd USENIX conference on Security
You are how you click: clickstream analysis for Sybil detection
SEC'13 Proceedings of the 22nd USENIX conference on Security
SGor: Trust graph based onion routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
Uncovering social network Sybils in the wild
ACM Transactions on Knowledge Discovery from Data (TKDD) - Casin special issue
Robust Sybil attack defense with information level in online Recommender Systems
Expert Systems with Applications: An International Journal
Information and Computation
Hi-index | 0.00 |
Obtaining user opinion (using votes) is essential to ranking user-generated online content. However, any content voting system is susceptible to the Sybil attack where adversaries can out-vote real users by creating many Sybil identities. In this paper, we present SumUp, a Sybilresilient vote aggregation system that leverages the trust network among users to defend against Sybil attacks. SumUp uses the technique of adaptive vote flow aggregation to limit the number of bogus votes cast by adversaries to no more than the number of attack edges in the trust network (with high probability). Using user feed-back on votes, SumUp further restricts the voting power of adversaries who continuously misbehave to below the number of their attack edges. Using detailed evaluation of several existing social networks (YouTube, Flickr), we show SumUp's ability to handle Sybil attacks. By applying SumUp on the voting trace of Digg, a popular news voting site, we have found strong evidence of attack on many articles marked "popular" by Digg.