SybilInfer: Detecting Sybil Nodes using Social Networks.

作者: George Danezis , Prateek Mittal

DOI:

关键词:

摘要: … SybilInfer is an algorithm for labelling nodes in a social network as honest user or Sybils. … – bound on number of trust relationships between attackers and honest nodes – Attacker cannot create edges between honest nodes and Sybil identities … – Under a major Sybil attack, we obtain cuts with E …

参考文章(24)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Shishir Nagaraja, Anonymity in the wild: mixes on unstructured networks privacy enhancing technologies. pp. 254- 271 ,(2007) , 10.1007/978-3-540-75551-7_16
S. Milgram, The Small World Problem Psychology today. ,vol. 1, pp. 60- 67 ,(1967)
George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross Anderson, Sybil-Resistant DHT Routing Computer Security – ESORICS 2005. pp. 305- 318 ,(2005) , 10.1007/11555827_18
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford, CAPTCHA: using hard AI problems for security theory and application of cryptographic techniques. pp. 294- 311 ,(2003) , 10.1007/3-540-39200-9_18
Matei Ripeanu, Adriana Iamnitchi, Ian T. Foster, Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design arXiv: Distributed, Parallel, and Cluster Computing. ,(2002)
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Alexander Aiken, Raph Levien, Attack-resistant trust metrics for public key certification usenix security symposium. pp. 18- 18 ,(1998)
DAVID J. PHILLIPS, Defending the boundaries : Identifying and countering threats in a Usenet newsgroup The Information Society. ,vol. 12, pp. 39- 62 ,(1996) , 10.1080/019722496129693