The small-world phenomenon: an algorithmic perspective
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Robust incentive techniques for peer-to-peer networks
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
The LOCKSS peer-to-peer digital preservation system
ACM Transactions on Computer Systems (TOCS)
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Worm Origin Identification Using Random Moonwalks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Efficient lookup on unstructured topologies
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
On the establishment of distinct identities in overlay networks
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Sybilproof reputation mechanisms
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Understanding the network-level behavior of spammers
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Decentralized trust management for ad-hoc peer-to-peer networks
Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006)
New metrics for reputation management in P2P networks
AIRWeb '07 Proceedings of the 3rd international workshop on Adversarial information retrieval on the web
Toward an optimal social network defense against Sybil attacks
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Exploiting KAD: possible uses and misuses
ACM SIGCOMM Computer Communication Review
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Network monitoring using traffic dispersion graphs (tdgs)
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
RepuScore: collaborative reputation management framework for email infrastructure
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Self-certified Sybil-free pseudonyms
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Exploiting social networks for threshold signing: attack-resilience vs. availability
Proceedings of the 2008 ACM symposium on Information, computer and communications security
On spreading recommendations via social gossip
Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures
Ostra: leveraging trust to thwart unwanted communication
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Do social networks improve e-commerce?: a study on social marketplaces
Proceedings of the first workshop on Online social networks
Authenticated out-of-band communication over social links
Proceedings of the first workshop on Online social networks
SybilGuard: defending against sybil attacks via social networks
IEEE/ACM Transactions on Networking (TON)
SAT: situation-aware trust architecture for vehicular networks
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture
A Distributed Certification System for Structured P2P Networks
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Quantifying Resistance to the Sybil Attack
Financial Cryptography and Data Security
Proceedings of the 1st Workshop on Social Network Systems
An offline foundation for online accountable pseudonyms
Proceedings of the 1st Workshop on Social Network Systems
RepTrap: a novel attack on feedback-based reputation systems
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Load-Balanced and Sybil-Resilient File Search in P2P Networks
OPODIS '08 Proceedings of the 12th International Conference on Principles of Distributed Systems
User interactions in social networks and their implications
Proceedings of the 4th ACM European conference on Computer systems
A holistic mechanism against file pollution in peer-to-peer networks
Proceedings of the 2009 ACM symposium on Applied Computing
Analysis of tag within online social networks
Proceedings of the ACM 2009 international conference on Supporting group work
Peer-assisted content distribution with prices
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Sybil-resilient online content voting
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Telling experts from spammers: expertise ranking in folksonomies
Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
Evaluation of Sybil Attacks Protection Schemes in KAD
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
A Distributed and Oblivious Heap
ICALP '09 Proceedings of the 36th Internatilonal Collogquium on Automata, Languages and Programming: Part II
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
On the evolution of user interaction in Facebook
Proceedings of the 2nd ACM workshop on Online social networks
Mapping Social Networks into P2P Directory Service
SOCINFO '09 Proceedings of the 2009 International Workshop on Social Informatics
Scalable proximity estimation and link prediction in online social networks
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Proceedings of the 16th ACM conference on Computer and communications security
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Proceedings of the 5th international conference on Emerging networking experiments and technologies
A case for P2P infrastructure for social networks - opportunities & challenges
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
Anonymity and Censorship Resistance in Unstructured Overlay Networks
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
Flexible and secure service discovery in ubiquitous computing
Journal of Network and Computer Applications
A sybil-proof referral system based on multiplicative reputation chains
IEEE Communications Letters
Measurement-calibrated graph models for social network experiments
Proceedings of the 19th international conference on World wide web
A self-certified and Sybil-free framework for secure digital identity domain buildup
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Random-walk based approach to detect clone attacks in wireless sensor networks
IEEE Journal on Selected Areas in Communications
Sybil attacks against mobile users: friends and foes to the rescue
INFOCOM'10 Proceedings of the 29th conference on Information communications
P2P trading in social networks: the value of staying connected
INFOCOM'10 Proceedings of the 29th conference on Information communications
A privacy-preserving scheme for online social networks with efficient revocation
INFOCOM'10 Proceedings of the 29th conference on Information communications
Brief announcement: improving social-network-based sybil-resilient node admission control
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Poisonedwater: An improved approach for accurate reputation ranking in P2P networks
Future Generation Computer Systems
An analysis of social network-based Sybil defenses
Proceedings of the ACM SIGCOMM 2010 conference
Pass it on: social networks stymie censors
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Whanau: a sybil-proof distributed hash table
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
FlightPath: obedience vs. choice in cooperative services
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
WOSN'10 Proceedings of the 3rd conference on Online social networks
Designs to account for trust in social network-based sybil defenses
Proceedings of the 17th ACM conference on Computer and communications security
Dependable filtering: Philosophy and realizations
ACM Transactions on Information Systems (TOIS)
Collusion-resilient credit-based reputations for peer-to-peer content distribution
Proceedings of the 2010 Workshop on Economics of Networks, Systems, and Computation
Measuring the mixing time of social graphs
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
The impact of unlinkability on adversarial community detection: effects and countermeasures
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
How to share your favourite search results while preserving privacy and quality
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
Secure routing strategies in DHT-based systems
Globe'10 Proceedings of the Third international conference on Data management in grid and peer-to-peer systems
The design of a reliable reputation system
Electronic Commerce Research
Spatio-temporal patterns in network events
Proceedings of the 6th International COnference
Comet: an active distributed key-value store
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Detecting sybil nodes in static and dynamic networks
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Privacy amplification with social networks
Proceedings of the 15th international conference on Security protocols
Uniform and ergodic sampling in unstructured peer-to-peer systems with malicious nodes
OPODIS'10 Proceedings of the 14th international conference on Principles of distributed systems
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Foundations and Trends in Information Retrieval
Bazaar: strengthening user reputations in online marketplaces
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Vulnerability in socially-informed peer-to-peer systems
Proceedings of the 4th Workshop on Social Network Systems
Temporal defenses for robust recommendations
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
Defending against Sybil nodes in BitTorrent
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II
Structural trend analysis for online social networks
Proceedings of the VLDB Endowment
Prometheus: user-controlled P2P social data management for socially-aware applications
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
Reverse social engineering attacks in online social networks
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
Dirty jobs: the role of freelance labor in web service abuse
SEC'11 Proceedings of the 20th USENIX conference on Security
Characterizing the adversarial power in uniform and ergodic node sampling
Proceedings of the First International Workshop on Algorithms and Models for Distributed Event Processing
Comparing linkage graph and activity graph of online social networks
SocInfo'11 Proceedings of the Third international conference on Social informatics
Suspended accounts in retrospect: an analysis of twitter spam
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Uncovering social network sybils in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Vulnerabilities and countermeasures in context-aware social rating services
ACM Transactions on Internet Technology (TOIT)
Authenticating strangers in Online Social Networks
International Journal of Security and Networks
A new closeness metric for social networks based on the k shortest paths
ISNN'10 Proceedings of the 7th international conference on Advances in Neural Networks - Volume Part II
Mitigating the malicious trust expansion in social network service
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Canal: scaling social network-based Sybil tolerance schemes
Proceedings of the 7th ACM european conference on Computer Systems
Data in social network analysis
ICCMSN'08 Proceedings of the First international conference on Computer-Mediated Social Networking
SocialClouds: concept, security architecture and some mechanisms
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Leveraging trust and distrust for sybil-tolerant voting in online social media
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Spam filtering in twitter using sender-receiver relationship
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Proceedings of the 21st international conference on World Wide Web
Addressing common vulnerabilities of reputation systems for electronic commerce
Journal of Theoretical and Applied Electronic Commerce Research
Reliable client accounting for P2P-infrastructure hybrids
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Adapting social spam infrastructure for political censorship
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Clustered embedding of massive social networks
Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems
Peer-to-peer indirect reciprocity via personal currency
Journal of Parallel and Distributed Computing
Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Resource-competitive analysis: a new perspective on attack-resistant distributed computing
FOMC '12 Proceedings of the 8th International Workshop on Foundations of Mobile Computing
GAUR: a method to detect Sybil groups in peer-to-peer overlays
International Journal of Grid and Utility Computing
Sybil resilient identity distribution in P2P networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Innocent by association: early recognition of legitimate users
Proceedings of the 2012 ACM conference on Computer and communications security
SybilControl: practical sybil defense with computational puzzles
Proceedings of the seventh ACM workshop on Scalable trusted computing
Beyond Social Graphs: User Interactions in Online Social Networks and their Implications
ACM Transactions on the Web (TWEB)
Magentix2: A privacy-enhancing Agent Platform
Engineering Applications of Artificial Intelligence
Defending against large-scale crawls in online social networks
Proceedings of the 8th international conference on Emerging networking experiments and technologies
An identity authentication protocol in online social networks
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Mechanism design for time critical and cost critical task execution via crowdsourcing
WINE'12 Proceedings of the 8th international conference on Internet and Network Economics
Enhancing and identifying cloning attacks in online social networks
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments
ACM Transactions on Internet Technology (TOIT)
SocialWatch: detection of online service abuse via large-scale social graphs
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Dynamix: anonymity on dynamic social structures
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Iolaus: securing online content rating systems
Proceedings of the 22nd international conference on World Wide Web
Graph-based Sybil detection in social and information systems
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Follow the green: growth and dynamics in twitter follower markets
Proceedings of the 2013 conference on Internet measurement conference
Understanding latent interactions in online social networks
ACM Transactions on the Web (TWEB)
Proactively accountable anonymous messaging in verdict
SEC'13 Proceedings of the 22nd USENIX conference on Security
Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse
SEC'13 Proceedings of the 22nd USENIX conference on Security
You are how you click: clickstream analysis for Sybil detection
SEC'13 Proceedings of the 22nd USENIX conference on Security
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
On the embeddability of random walk distances
Proceedings of the VLDB Endowment
Uncovering social network Sybils in the wild
ACM Transactions on Knowledge Discovery from Data (TKDD) - Casin special issue
Robust Sybil attack defense with information level in online Recommender Systems
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Peer-to-peer and other decentralized,distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack,a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the system,the malicious user is able to "out vote" the honest users in collaborative tasks such as Byzantine failure defenses. This paper presents SybilGuard, a novel protocol for limiting the corruptive influences of sybil attacks.Our protocol is based on the "social network "among user identities, where an edge between two identities indicates a human-established trust relationship. Malicious users can create many identities but few trust relationships. Thus, there is a disproportionately-small "cut" in the graph between the sybil nodes and the honest nodes. SybilGuard exploits this property to bound the number of identities a malicious user can create.We show the effectiveness of SybilGuard both analytically and experimentally.