Journal of Xidian University ›› 2021, Vol. 48 ›› Issue (1): 39-49.doi: 10.19665/j.issn1001-2400.2021.01.005
Previous Articles Next Articles
XU Zhicheng1,2(),LI Xiang1(),MAO Jian1(),LIU Jianwei1(),ZHOU Zhihong2()
Received:
2020-08-15
Online:
2021-02-20
Published:
2021-02-03
Contact:
Jian MAO
E-mail:xuzhicheng@buaa.edu.cn;llllx@buaa.edu.cn;maojian@buaa.edu.cn;liujianwei@buaa.edu.cn;zhouzhihong@sjtu.edu.cn
CLC Number:
XU Zhicheng,LI Xiang,MAO Jian,LIU Jianwei,ZHOU Zhihong. Overview of Sybil attacks and defenses in the distributed architecture[J].Journal of Xidian University, 2021, 48(1): 39-49.
[1] | DOUCEUR J R. The Sybil Attack [C]//Lecture Notes in Computer Science:2429.Heidelberg:Springer Verlag, 2002: 251-260. |
[2] | 王永程, 孟艳红. 针对有向社交网络的Sybil检测方法[J]. 西安电子科技大学学报, 2016,43(2):199-204. |
WANG Yongcheng, MENG Yanhong. SybilGrid:Sybil Detection Method Based on Directed Social Networks[J]. Journal of Xidian University, 2016,43(2):199-204. | |
[3] | HU Y C, PERRIG A. A Survey of Secure Wireless Ad Hoc Routing[J]. IEEE Security and Privacy, 2004,2(3):28-39. |
[4] | AL-QURISHI M, ALRUBAIAN M, RAHMAN S MM, et al. A Prediction System of Sybil Attack in Social Network Using Deep-regression Model[J]. Future Generation Computer Systems, 2018,87:743-753. |
[5] | ANGAPPAN K.An Improve Performance, Discovery and Interruption of Sybil Attack in MANET[J]. Middle-East Journal of Scientific Research, 2015,23(7):1346-1352. |
[6] | ZHENG H, XUE M, LU H, et al. Smoke Screener or Straight Shooter:Detecting Elite Sybil Attacks in User-Review Social Networks[C/OL].[2020-07-26].https://arxiv.org/pdf/1709.06916.pdf. |
[7] | CAYIRCI E, GOVINDAN R, ZNATI T, et al. Wireless Sensor Networks[J]. Computer Networks, 2003,43(4):417-419. |
[8] | BUCHEGGER S, LE BOUDEC J Y.A Robust Reputation System for P2P and Mobile Adhoc Networks P2P and Mobile Ad-hoc Networks[C/OL].[2020-07-26].https://www.researchgate.net/publication/2943041. |
[9] | YANG Z, WILSON C, WANG X, et al. Uncovering Social Network Sybils in the Wild[J]. ACM Transactions on Knowledge Discovery from Data, 2014,8(1):2556609. |
[10] | AYAIDA M, MESSAI N, NAJEH S, et al. A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs[J]. Ad Hoc Networks, 2019,90:101845. |
[11] | ZHANG S, LEE J H. Double-spending with a Sybil Attack in the Bitcoin Decentralized Network[J]. IEEE Transactions on Industrial Informatics, 2019,15(10):5715-5722. |
[12] | 司海飞, 杨忠, 王珺. 无线传感器网络研究现状与应用[J]. 机电工程, 2011,28(1):16-20,37. |
SI Haifei, YANG Zhong, WANG Jun. Review on Research Status and Application of Wireless Sensor Networks[J]. Journal of Mechanical & Electrical Engineering, 2011,28(1):16-20,37. | |
[13] | ALKHATIB A A A, BAICHER G S.Wireless Sensor Network Architecture[C/OL].[2020-07-26].https://www.researchgate.net/publication/227352986. |
[14] | BOUKERCHE A, LI X. An Agent-based Trust and Reputation Management Scheme for Wireless Sensor Networks [C]//Proceedings of the 2005 IEEE Global Telecommunications Conference.Piscataway:IEEE, 2005: 1857-1861. |
[15] | GANERIWAL S, BALZANO L K, SRIVASTAVA M B. Reputation-based Framework for High Integrity Sensor Networks[J]. ACM Transactions on Sensor Networks, 2008,4(3):15. |
[16] | PRAMOD A V, AZEEM M A, PRAKASH M O. Detecting the Sybil Attack in Wireless Sensor Network:Survey[J]. International Journal of Computers & Technology, 2004,3(1c):158-161. |
[17] | CHEN S, GENG Y, CHEN S. A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks [C]//Proceedings of the 2010 WRI International Conference on Communications and Mobile Computing.Washington:IEEE Computer Society, 2010: 142-146. |
[18] | DHANALAKSHMI T G, BHARATHI N, MONISHA M. Safety Concerns of Sybil Attack in WSN [C]// Proceedings of the 2014 IEEE International Conference on Science Engineering and Management Research.Piscataway:IEEE, 2014: 7043659. |
[19] | NEWSOME J, SHI E, SONG D, et al. The Sybil Attack in Sensor Networks:Analysis & Defenses [C]// Proceedings of the 2004 Third International Symposium on Information Processing in Sensor Networks.New York:ACM, 2004: 259-268. |
[20] | RISHIWAL V, KUSH A, VERMA S. Stable and Energy Efficient Routing for Mobile Adhoc Networks [C]// Proceedings of the 2008 IEEE International Conference on Information Technology:New Generations.Piscataway:IEEE, 2008: 1028-1033. |
[21] | 单宝颖, 魏东平. 移动自组织网络中的安全与信任技术研究[J]. 计算机与数字工程, 2020,48(8):1928-1934. |
SHAN Baoying, WEI Dongping. Research on Security and Trust Technology in MANET[J]. Computer & Digital Engineering, 2020,48(8):1928-1934. | |
[22] | SINHA S, PAUL A, PAL S. The Sybil Attack in Mobile Adhoc Network:Analysis and Detection [C]// Proceedings of the 2013 3rd IET International Conference on Computational Intelligence & Information Technology.London:IET, 2013: 458-466. |
[23] | JAMSHIDI M, ZANGENEH E, ESNAASHARI M, et al. A Novel Model of Sybil Attack in Cluster-based Wireless Sensor Networks and Propose A Distributed Algorithm to Defend It[J]. Wireless Personal Communications, 2019,105(1):145-173. |
[24] | YU H, KAMINSKY M, GIBBONS P B, et al. SybilGuard:Defending Against Sybil Attacks Via Social Networks[J]. IEEE/ACM Transactions on Networking, 2008,16(3):576-589. |
[25] | CAO Q, SIRIVIANOS M, YANG X, et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services [C]//Proceedings of the 2012 9th USENIX Symposium on Networked Systems Design and Implementation.Berkeley:USENIX Association, 2012: 197-210. |
[26] | VASUDEVA A, SOOD M. Survey on Sybil Attack Defense Mechanisms in Wireless Ad Hoc Networks[J]. Journal of Network and Computer Applications, 2018,120:78-118. |
[27] | KARLOF C, WAGNER D. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[J]. Ad Hoc Networks, 2003,1(2/3):293-315. |
[28] | GUPTA D, SAIA J, YOUNG M. Resource-Competitive Sybil Defenses[J/OL].[2020-07-26].https://arxiv.org/pdf/1911.06462v1.pdf. |
[29] | WU Z, MA R. A Novel Sybil Attack Detection Scheme Based on Edge Computing for Mobile IoT Environment[J/OL].[2020-07-26].https://arxiv.org/pdf/1911.03129.pdf. |
[30] | MARGOLIN N B, LEVINE B N. Quantifying Resistance to the Sybil Attack [C]//Lecture Notes in Computer Science:5143.Heidelberg:Springer Verlag, 2008: 1-15. |
[31] | ABBAS S, MERABTI M, LIEWELLYN-JONES D, et al. Lightweight Sybil Attack Detection in Manets[J]. IEEE Systems Journal, 2013,7(2):236-248. |
[32] | DEMIRBAS M, SONG Y. An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks [C]//Proceedings of the 2006 International Symposium on a World of Wireless,Mobile and Multimedia Networks.Washington:IEEE Computer Society, 2006: 564-568. |
[33] | XIAO B, YU B, GAO C. Detection and Localization of Sybil Nodes in VANETs [C]//Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks.New York:ACM, 2006: 1-8. |
[34] | TANGPONG A, KESIDIS G, HSU H Y, et al. Robust Sybil Detection for Manets [C]//Proceedings of the 2009 International Conference on Computer Communications and Networks.Piscataway:IEEE, 2009: 5235387. |
[35] | ZHANG X, XIE H, LUI J C S.Sybil Detection in Social-activity Networks:Modeling,Algorithms and Evaluations [C]//Proceedings of the 2018 International Conference on Network Protocols.Washington:IEEE Computer Society, 2018: 44-54. |
[36] | YUAN D, MIAO Y, GONG N Z, et al. Detecting Fake Accounts in Online Social Networks at the Time of Registrations [C]//Proceedings of the 2019 ACM Conference on Computer and Communications Security.New York:ACM, 2019: 1423-1438. |
[37] | BOSHMAF Y, LOGOTHETIS D, SIGANOS G, et al. Integro:Leveraging Victim Prediction for Robust Fake Account Detection in Large Scale OSNs[J]. Computers and Security, 2016,61:142-168. |
[38] | AMATO F, CASTIGLIONE A, DE SANTO A, et al. Recognizing Human Behaviours in Online Social Networks[J]. Computers and Security, 2018,74:355-370. |
[39] | AL-QURISHI M, HOSSAIN M S, ALRUBAIAN M, et al. Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-scale Social Networks[J]. IEEE Transactions on Industrial Informatics, 2018,14(2):799-813. |
[40] | WANG G, KONOLIGE T, WILSON C, et al. You Are How You Click:Clickstream Analysis for Sybil Detection [C]//Proceedings of the 2013 22nd USENIX Security Symposium.Berkeley:USENIX Association, 2013: 241-256. |
[41] | DE MONTJOYE Y A, HIDALGO C A, VERLEYSEN M, et al.Unique in the Crowd:the Privacy Bounds of Human Mobility[J/OL].[2020-07-26].https://www.nature.com/articles/srep01376. |
[42] | ZHANG X, ZHENG H, LI X, et al. You Are Where You Have Been:Sybil Detection Via Geo-location Analysis in OSNs [C]//Proceedings of the 2014 IEEE Global Communications Conference.Piscataway:IEEE, 2014: 698-703. |
[43] | DENG R, RUAN N, JIN R, et al. SpamTracer:Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features [C]//Lecture Notes in Computer Science:11449.Heidelberg:Springer Verlag, 2019: 384-403. |
[44] | GONG Q, CHEN Y, HE X, et al. DeepScan:Exploiting Deep Learning for Malicious Account Detection in Location-based Social Networks[J]. IEEE Communications Magazine, 2018,56(11):21-27. |
[45] | ZHANG X, XIE H, LUI J C S.Sybil Detection in Social-activity Networks:Modeling,Algorithms and Evaluations [C]//Proceedings of the 2018 International Conference on Network Protocols.Washington:IEEE Computer Society, 2018: 44-54. |
[46] | YU H, GIBBONS P B, KAMINSKY M, et al. Sybillimit:a Near-optimal Social Network Defense Against Sybil Attacks [C]//Proceedings of the 2008 IEEE Symposium on Security and Privacy.Piscataway:IEEE, 2008: 3-17. |
[47] | WANG B, ZHANG L, GONG N Z. SybilSCAR:Sybil Detection in Online Social Networks Via Local Rule Based Propagation [C]//Proceedings of the 2017 IEEE INFOCOM.Piscataway:IEEE, 2017: 8057066. |
[48] | IRANI D, BALDUZZI M, BALZAROTTI D, et al. Reverse Social Engineering Attacks in Online Social Networks [C]//Lecture Notes in Computer Science:6739.Heidelberg:Springer Verlag, 2011: 55-74. |
[49] | EFFENDY S, YAP R H C.The Strong Link Graph for Enhancing Sybil Defenses [C]//Proceedings of the 2017 International Conference on Distributed Computing Systems.Piscataway:IEEE, 2017: 944-954. |
[50] | JIA J, WANG B, GONG N Z. Random Walk Based Fake Account Detection in Online Social Networks [C]// Proceedings of the 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.Piscataway:IEEE, 2017: 273-284. |
[51] | GAO P, WANG B, GONG N Z, et al. Sybilfuse:Combining Local Attributes with Global Structure to Perform Robust Sybil Detection [C]//Proceedings of the 2018 IEEE Conference on Communications and Network Security.Piscataway:IEEE, 2018: 8433147. |
[1] | XU Hua,TIAN Youliang. Protection of privacy of the weighted social network under differential privacy [J]. Journal of Xidian University, 2022, 49(1): 17-25. |
[2] | TU Shouzhong,YAN Zhou,WEI Lingwei,ZHU Xiaoyan. User interesting mining method in the heterogeneous social network [J]. Journal of Xidian University, 2019, 46(2): 83-88. |
[3] | TANG Xing;QUAN Yining;DONG Ze;MIAO Qiguang. Novel algorithm for finding circles in the ego network based on entropy [J]. Journal of Xidian University, 2017, 44(3): 43-48. |
[4] | TANG Xing;QUAN Yining;SONG Jianfeng;DENG Kai;ZHU Hai;MIAO Qiguang. Novel algorithm for predicting personalized retweet behavior [J]. Journal of Xidian University, 2016, 43(4): 51-56+62. |
[5] | WANG Yongcheng;MENG Yanhong. SybilGrid: Sybil detection method based on directed social networks [J]. Journal of Xidian University, 2016, 43(2): 199-204. |
[6] | YU Lingfei;GONG Haigang;WANG Xiaomin. Hot-zone based routing protocol for mobile social networks [J]. J4, 2014, 41(6): 142-147. |
[7] | CHEN Qingli;ZHANG Zhiyong;XIANG Fei;WANG Jian. Research on the access control model for multimedia social networks [J]. J4, 2014, 41(6): 181-187. |
[8] | SUN Yi-fei;JIAO Li-cheng. Immune optimization algorithm based on the social network searching model [J]. J4, 2010, 37(4): 642-647. |
|