2010 10th IEEE/IPSJ International Symposium on Applications and the Internet 2010
DOI: 10.1109/saint.2010.32
|View full text |Cite
|
Sign up to set email alerts
|

Resisting Sybil Attack By Social Network and Network Clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
12
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…In the evaluation SybilInfer handled networks with up to 30K nodes, which is much smaller than the size of regular online social networks. The algorithm proposed by Xu et al [18] calculates the shortest path between every pair of nodes within the network in each round, which makes it impractical for even small-sized social networks. In contrast, SybilDefender only relies on performing a limited number of random walks in the social graph, and it is scalable to large networks.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In the evaluation SybilInfer handled networks with up to 30K nodes, which is much smaller than the size of regular online social networks. The algorithm proposed by Xu et al [18] calculates the shortest path between every pair of nodes within the network in each round, which makes it impractical for even small-sized social networks. In contrast, SybilDefender only relies on performing a limited number of random walks in the social graph, and it is scalable to large networks.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, there has been an increasing interest in defending against sybil attacks in social networks [6], [12], [18], [19], [20]. In a social network, two user identities share a link if a relationship is established between them.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, there has been an increasing interest in defending against sybil attacks in social networks [3], [4], [5], [6], [7]. In a social network, two user identities share a link if a relationship is established between them.…”
mentioning
confidence: 99%
“…The large sizes of these networks require that any scheme aiming to defend against sybil attacks in online social networks should be efficient and scalable. Some previous schemes can achieve good performance on a very small network sample (2,000 nodes in [5] and 30,000 nodes in [3]), but their algorithms are computationally intensive and cannot scale to networks with millions of nodes. For the schemes that performed evaluation on million-node samples of online social networks, SybilGuard [7] admits Oð ffiffiffi n p log nÞ sybil nodes per attack edge, where n is the number of honest nodes; SybilLimit [6] improves over SybilGuard by accepting Oðlog nÞ sybil nodes per attack edge, but it is still away from the theoretical lower bound by a log n factor.…”
mentioning
confidence: 99%