Eigenvalue computation in the 20th century
Journal of Computational and Applied Mathematics - Special issue on numerical analysis 2000 Vol. III: linear algebra
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Improved Bounds for Mixing Rates of Marked Chains and Multicommodity Flow
LATIN '92 Proceedings of the 1st Latin American Symposium on Theoretical Informatics
Maximizing the spread of influence through a social network
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Network Analysis: Methodological Foundations (Lecture Notes in Computer Science)
Network Analysis: Methodological Foundations (Lecture Notes in Computer Science)
Proceedings of the 15th international conference on World Wide Web
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Local Graph Partitioning using PageRank Vectors
FOCS '06 Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science
IEEE Transactions on Knowledge and Data Engineering
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
An analysis of social network-based Sybil defenses
Proceedings of the ACM SIGCOMM 2010 conference
Measuring the mixing time of social graphs
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
Multilevel local search algorithms for modularity clustering
Journal of Experimental Algorithmics (JEA)
Sybil defenses via social networks: a tutorial and survey
ACM SIGACT News
Uncovering social network sybils in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
The socialbot network: when bots socialize for fame and money
Proceedings of the 27th Annual Computer Security Applications Conference
On the NP-Completeness of some graph cluster measures
SOFSEM'06 Proceedings of the 32nd conference on Current Trends in Theory and Practice of Computer Science
An Analysis of Performance Measures for Binary Classifiers
ICDM '11 Proceedings of the 2011 IEEE 11th International Conference on Data Mining
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Key challenges in defending against malicious socialbots
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Facilitating real-time graph mining
Proceedings of the fourth international workshop on Cloud data management
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Sybil attacks in social and information systems have serious security implications. Out of many defence schemes, Graph-based Sybil Detection (GSD) had the greatest attention by both academia and industry. Even though many GSD algorithms exist, there is no analytical framework to reason about their design, especially as they make different assumptions about the used adversary and graph models. In this paper, we bridge this knowledge gap and present a unified framework for systematic evaluation of GSD algorithms. We used this framework to show that GSD algorithms should be designed to find local community structures around known non-Sybil identities, while incrementally tracking changes in the graph as it evolves over time.