CORC  > 北京大学  > 信息科学技术学院
Understanding Sybil Groups in the Wild
Jiang, Jing ; Shan, Zi-Fei ; Wang, Xiao ; Zhang, Li ; Dai, Ya-Fei
刊名JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
2015
关键词online social network measurement security sybil group sybil attack SOCIAL NETWORKS ATTACKS DEFENSE
DOI10.1007/s11390-015-1602-6
英文摘要Sybil attacks are one kind of well-known and powerful attacks against online social networks (OSNs). In a sybil attack, a malicious attacker generates a sybil group consisting of multiple sybil users, and controls them to attack the system. However, data confidentiality policies of major social network providers have severely limited researchers' access to large-scale datasets of sybil groups. A deep understanding of sybil groups can provide important insights into the characteristics of malicious behavior, as well as numerous practical implications on the design of security mechanisms. In this paper, we present an initial study to measure sybil groups in a large-scale OSN, Renren. We analyze sybil groups at different levels, including individual information, social relationships, and malicious activities. Our main observations are: 1) user information in sybil groups is usually incomplete and in poor quality; 2) sybil groups have special evolution patterns in connectivity structure, including bursty actions to add nodes, and a monotonous merging pattern that lacks non-singleton mergings; 3) several sybil groups have strong relationships with each other and compose sybil communities, and these communities cover a large number of users and pose great potential threats; 4) some sybil users are not banned until a long time after registration in some sybil groups. The characteristics of sybil groups can be leveraged to improve the security mechanisms in OSNs to defend against sybil attacks. Specifically, we suggest that OSNs should 1) check information completeness and quality, 2) learn from dynamics of community connectivity structure to detect sybil groups, 3) monitor sybil communities and inspect them carefully to prevent collusion, and 4) inspect sybil groups that behave normally even for a long time to prevent potential malicious behaviors.; the National Basic Research 973 Program of China under Grant No.2011CB302305, the National Natural Science Foundation of China under Grant No.61300006, and the Project of the State Key Laboratory of Software Development Environment under Grant No.SKLSDE-2013ZX-26; SCI(E); EI; 中国科技核心期刊(ISTIC); 中国科学引文数据库(CSCD); ARTICLE; jiangjing@buaa.edu.cn; shanzifei@pku.edu.cn; wangxiao@pku.edu.cn; lily@buaa.edu.cn; dyf@pku.edu.cn; 6; 1344-1357; 30
语种英语
内容类型期刊论文
源URL[http://ir.pku.edu.cn/handle/20.500.11897/435904]  
专题信息科学技术学院
推荐引用方式
GB/T 7714
Jiang, Jing,Shan, Zi-Fei,Wang, Xiao,et al. Understanding Sybil Groups in the Wild[J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY,2015.
APA Jiang, Jing,Shan, Zi-Fei,Wang, Xiao,Zhang, Li,&Dai, Ya-Fei.(2015).Understanding Sybil Groups in the Wild.JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY.
MLA Jiang, Jing,et al."Understanding Sybil Groups in the Wild".JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY (2015).
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace