Computer Science ›› 2013, Vol. 40 ›› Issue (6): 100-102.

Previous Articles     Next Articles

Sybil Attack Defense Based on Ant Colony Algorithm

WANG Feng,LI Ya,ZHU Hai and WANG Yi-ran   

  • Online:2018-11-16 Published:2018-11-16

Abstract: In the structured peer to peer networks,non concentration of management and the freedom of participants involving the system make the Sybil attack becomes a special security threat which faces.By reviewing and studying the current Sybil defense,the social network which defenses Sybil attacks has good prospects.Using social network,combining ant colony algorithm to solve NP problem,an ant colony algorithm based on Sybil attack defense model ASDM and the related algorithm was presented.The experimental results show that the ASDM can effectively identify the Sybil node.

Key words: Sybil attack,P2P network,Ant colony algorithm,Social network

[1] Douceur J.The Sybil attack [C]∥Proceedings of the 1st International Workshop on Peer-to-Peer Systems.London,U K:S pringer-Verlag,2002:251-260
[2] Danezis G,Lesniewski-Laas C,Kaashoek M F,et al.Sybil-Resistant DHT Routing[C]∥ESORICS.2005
[3] Yu H,Kaminsky M,Gibbons P B,et al.SybilGuard:Defending Against Sybil Attacks via Social Networks[C]∥Proc.SIGCOMM (Pisa,Italy). New York,NY:ACM Press.2006:267-278
[4] Urdaneta G.A Survey of DHT Security Techniques[J].ACM Computing Surveys,2011,43(2):1-35
[5] Rodrigues R,Druschel P. Peer-to-Peer Systems [J].communications of the ACM,2010,53(10):72-85
[6] Lesniewski-Laas M C,Kaashoek F.Whanau:A Sybil-proof Distributed Hash Table[C]∥NSDI’10Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation.2010
[7] Viswanath B.An Analysis of Social Network-Based Sybil Defenses[C]∥SIGCOMM’10.New Delhi,India,2010
[8] Castro M,Druschel P,Ganesh A,et al.Secure Routing forStructured Peer-to-Peer Overlay Networks[C]∥Proc.5th Symposium on Operating System Design and Implementation (Boston,MA).New York,NY:ACM Press,2002:299-314
[9] Dinger J,Hartenstein H.Defending the Sybil Attack in P2PNetworks:Taxonomy,Chal-lenges,and a Proposal for Self-Regis-tration[C]∥Proc.1st International Conference on Availability,Reliabilityand Security (Vienna,Austria). Los Alamitos,CA:IEEE Computer Society Press,2006:756-763
[10] Wang H,Zhu Y,Hu Y.An Efficient and Secure Peer-to-Peer Overlay Network[C]∥ Proc.30th Local Computer Networks.Los Alamitos,CA:IEEE Computer Society Press,2005:764-771
[11] Yu H,Gibbons P B,Kaminsky M,et al.SybilLimit:A Near-Optimal Social Network Defense against Sybil Attacks[C]∥Proc.International Symposium on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,2008:3-17
[12] Borisov N.Computational Puzzles as Sybil Defenses[C]∥Proc.6th International Conference on Peer-to-Peer Computing.Los Alamitos,CA:IEEE Computer Society Press,2006:171-176
[13] 王峰,周佳骏.基于蚁群算法的对等网络,自适应寻径协议[J].计算机工程与应用,2010,17

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!