IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Probability and Computing: Randomized Algorithms and Probabilistic Analysis
Probability and Computing: Randomized Algorithms and Probabilistic Analysis
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
User interactions in social networks and their implications
Proceedings of the 4th ACM European conference on Computer systems
The slashdot zoo: mining a social network with negative edges
Proceedings of the 18th international conference on World wide web
Sybil-resilient online content voting
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Signed networks in social media
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Predicting positive and negative links in online social networks
Proceedings of the 19th international conference on World wide web
Proceedings of the 19th international conference on World wide web
Sybil attacks against mobile users: friends and foes to the rescue
INFOCOM'10 Proceedings of the 29th conference on Information communications
An analysis of social network-based Sybil defenses
Proceedings of the ACM SIGCOMM 2010 conference
Whanau: a sybil-proof distributed hash table
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Expansion and search in networks
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
A novel approach to propagating distrust
WINE'10 Proceedings of the 6th international conference on Internet and network economics
Finding the bias and prestige of nodes in networks based on trust scores
Proceedings of the 20th international conference on World wide web
Hi-index | 0.00 |
Due to open membership access, voting on content items in online social media (OSM) is susceptible to Sybil attacks. Malicious attackers can create multiple Sybil identities to outvote the real users of the system. This work proposes a mechanism to defend against such an attack by leveraging (i) trust which is inherent in the social network among users in OSM, and (ii) distrust between honest users, who identify some of the spam content items, and the Sybil identities who promoted them. Modeling trust and distrust in the system as a signed network, our method proceeds in two phases. First, we identify nodes and edges that constrain paths along positive edges between the endpoints of each negative edge. Second, we limit the votes from Sybil voters whose paths to honest nodes pass across these bottlenecks. Our simulation results on datasets of popular OSM show both the feasibility of incorporating distrust alongside trust to defend against Sybil attacks, and that our method outperforms the state-of-the-art approach, SumUp.