Computer Science ›› 2016, Vol. 43 ›› Issue (1): 172-177.doi: 10.11896/j.issn.1002-137X.2016.01.039

Previous Articles     Next Articles

Compound Approach for Sybil Users Detection in Social Networks

KANG Kai, ZHANG Ying-jun, LIAN Yi-feng and LIU Yu-ling   

  • Online:2018-12-01 Published:2018-12-01

Abstract: We mainly focused on the detection of Sybil attack in social networks.By analyzing the collected 100000 data in social networks,we extracted the users’ features,and combining the network reliability,we proposed a method to detect Sybil users.Finally,we conducted some experiments to validate the effective of our method.

Key words: Social networks,Sybil attack,Detection of malicious users

[1] Douceur J.The Sybil attack[M]∥Lecture Notes in Computer Scie-nce 2429,2002:251-260
[2] Yu H,Kaminsky M,Gibbons P B,et al.SybilGuard:Defending Against Sybil Attacks via Social Networks[J].IEEE/ACM Transactions on Networking,2008,16(3):576-589
[3] Yu H,Gibbons P B,Kaminsky M,et al.Sybillimit:A near-optimal social network defense against sybil attacks[C]∥IEEE Symposium on Security and Privacy.Oakland,2008:3-17
[4] Tran N,Li J,Subramanian L,et al.Optimal sybil-resilient node admission control[C]∥IEEE INFOCOM.Shanghai,2011:3218-3226
[5] Danezis G,Mit P.Sybilinfer:Detecting sybil nodes using social networks[C]∥NDSS.2009
[6] Xu L,Chainan S,Takizawa H,et al.Resisting Sybil attack by social network and network clustering[C]∥10th Annual International Symposium on Applications and the Internet.Seoul,2010:15-21
[7] Wei W,Xu F,Tan C C,et al.Sybil Defender:Defend AgainstSybil Attacks in Large Social Networks[C]∥IEEE INFOCOM.2012:1951-1959
[8] Golder S,Lotan G.Tweet,tweet,retweet:Conversational as-pects of retweeting on Twitter[C]∥2010 43rd Hawaii Intermational Conference on System Sicences(HICSS).2010:1-10
[9] Honeycutt C,Herring S C.Beyond microblogging:Conversation and collaboration via Twitter[C]∥42nd Hawaii International Conference on System Sciences,2009(HICSS’09).IEEE,2009:1-10
[10] Bilge L,Strufe T,Balzarotti D,et al.All your contacts are belong to us:Automated identity theft attacks on social networks[C]∥Proceedings of the 18th International Conference on World Wide Web(WWW’09).2009:551-560
[11] Ghosh S,Korlam G,Ganguly N.Spammers’ Networks withinOnline Social Networks:A Case-Study on Twitter[C]∥Proceedings of the 20th International Conference Companion on World Wide Web(WWW’11).2011:41-42
[12] Krishnamurthy B,Gill P,Arlitt M.A few chirps about twitter[C]∥Proceedings of the First Workshop on Online Social Networks(WOSN’08).2008:19-24
[13] Chu Z,Gianvecchio S,Wang H,et al.Who is tweeting on Twitter:human,bot,or cyborg?[C]∥Proceedings of the 26th Annual Computer Security Applications Conference(ACSAC’10).2010:21-30
[14] Tan Lei,Lian Yi-feng,Chen Kai.Malicious users identification in social network based on composite classification model[J].Computer Applications and Software,2012(12):1-5(in Chinese) 谈磊,连一峰,陈恺.基于复合分类模型的社交网络恶意用户识别方法[J].计算机应用与软件,2012(12):1-5
[15] R语言.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .