Filters








68 Hits in 5.7 sec

Exploiting Trust and Distrust Information to Combat Sybil Attack in Online Social Networks [chapter]

Huanhuan Zhang, Chang Xu, Jie Zhang
2014 IFIP Advances in Information and Communication Technology  
Due to open and anonymous nature, online social networks are particularly vulnerable to the Sybil attack, in which a malicious user can fabricate many dummy identities to attack the systems.  ...  In this paper, we propose an unified ranking mechanism by leveraging trust and distrust in social networks against such kind of attacks based on a variant of the PageRank-like model.  ...  This work is supported by the MoE AcRF Tier 2 Grant M4020110.020 and the ACI Seed Funding M4080962.C90 awarded to Dr. Jie Zhang.  ... 
doi:10.1007/978-3-662-43813-8_6 fatcat:byuusdhklngnvkdetzrjk32gam

Systems Applications of Social Networks

Changtao Zhong, Nishanth Sastry
2017 ACM Computing Surveys  
To this end, we give examples of how data about social links have been collected and used in di erent application contexts.  ...  which defend against users who abuse the system (e.g., spam or sybil attacks).  ...  Guha et al. [2004] were the first to examine signed relationships in online social networks, when they considered trust and distrust in the Epinions community.  ... 
doi:10.1145/3092742 fatcat:hcfudmor4feonjlalyma2l6owy

A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay Networks

Behrouz Jedari, Feng Xia, Zhaolong Ning
2018 IEEE Communications Surveys and Tutorials  
Meanwhile, misbehaving nodes can launch different types of internal attacks (e.g., blackhole and trust-related attacks) to disrupt the normal operation of the network.  ...  The performance of data delivery in wireless relay networks (WRNs), such as delay-tolerant networks and device-to-device communications heavily relies on the cooperation of mobile nodes (i.e., users and  ...  The authors are grateful to the anonymous reviewers for their constructive comments and suggestions to improve the quality of the article.  ... 
doi:10.1109/comst.2018.2791428 fatcat:2v6odowj4rhx5ico7g2i4pk6ne

The design of a reliable reputation system

Gayatri Swamynathan, Kevin C. Almeroth, Ben Y. Zhao
2010 Electronic Commerce Research  
Zero accountability via anonymous online identities and divergent interests result in selfish behavior that can disrupt or manipulate networks for personal gain.  ...  Finally, we present our solutions to address the two leading reasons for erroneous and misleading values produced by reputation systems today, i.e., user collusion and short-lived online identities.  ...  Information from social networks can be exploited to enhance many practical areas of research.  ... 
doi:10.1007/s10660-010-9064-y fatcat:trx6nky665el5eb75r2bdvelk4

Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems

Akshay Dua, Nirupama Bulusu, Wu-Chang Feng, Wen Hu
2014 ACM Transactions on Embedded Computing Systems  
To address these attacks, we develop (i) a Trusted Sensing Peripheral (TSP) enabling collection of high-integrity raw or aggregated data, and participation in applications requiring additional modalities  ...  Data integrity becomes imperative as malicious participants can launch software and Sybil attacks modifying the sensing platform and data.  ...  The TSP has built-in sensors, and a Trusted Platform Module (TPM) that helps it resist software and Sybil attacks to its platform.  ... 
doi:10.1145/2629338 fatcat:ttwzbvbgcfcbzk2zjylegme424

Technology-Enabled Disinformation: Summary, Lessons, and Recommendations [article]

John Akers, Gagan Bansal, Gabriel Cadamuro, Christine Chen, Quanze Chen, Lucy Lin, Phoebe Mulcaire, Rajalakshmi Nandakumar, Matthew Rockett, Lucy Simko, John Toman, Tongshuang Wu, Eric Zeng (+2 others)
2019 arXiv   pre-print
Technology is increasingly used -- unintentionally (misinformation) or intentionally (disinformation) -- to spread false information at scale, with potentially broad-reaching societal effects.  ...  The goals of this course were to study (1) how technologies and today's technical platforms enable and support the creation and spread of such mis- and disinformation, as well as (2) how technical approaches  ...  the trust aspect of social networks, bot promotion of a story on social media, and government-funded media outlets.  ... 
arXiv:1812.09383v2 fatcat:76dnmu7jojairmqnccauukmagq

Limiting fake accounts in large-scale distributed systems through adaptive identity management

Weverton Luis da Costa Cordeiro, Luciano Paschoal Gaspary
2015 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)  
close to 0 indicate high distrust, i.e., a high probability that there exists an attacker behind that source, who is launching a Sybil attack.  ...  In 2002, Douceur (DOUCEUR, 2002) coined the term "Sybil attack" 1 to designate the creation of fake accounts in online systems 2 .  ... 
doi:10.1109/inm.2015.7140438 dblp:conf/im/CordeiroG15 fatcat:kox4wemat5eureoyhjt5oiavfy

Taxonomy of attacks and defense mechanisms in P2P reputation systems—Lessons for reputation system designers

Eleni Koutrouli, Aphrodite Tsalgatidou
2012 Computer Science Review  
A B S T R A C T Robust and credible reputation systems are essential for the functionality of Peer-to-Peer (P2P) applications. However, they themselves are susceptible to various types of attacks.  ...  Since most current efforts lack an exploration of a comprehensive adversary model, we try to fill in this gap by providing a thorough view of the various credibility threats against a decentralized reputation  ...  Exploiting graph characteristics and properties of graph represented P2P networks Such methods constrain Sybil attacks, as proposed in [90] [91] [92] [93] . Yu et al.  ... 
doi:10.1016/j.cosrev.2012.01.002 fatcat:qqur47qpfvcddjvxzntrlq3jza

Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation

Max Ismailov, Michail Tsikerdekis, Sherali Zeadally
2020 Future Internet  
Identity deception in online social networks is a pervasive problem. Ongoing research is developing methods for identity deception detection.  ...  Based on this analysis, we identify common methodological weaknesses for these approaches, and we propose recommendations that can increase their effectiveness for when they are applied in real-world environments  ...  Acknowledgments: We thank the anonymous reviewers for their valuable comments, which helped us improve the content, organization, and presentation of this paper.  ... 
doi:10.3390/fi12090148 fatcat:q4y2wb5swzaipodw72f74kni6q

A graph-based comprehensive reputation model: Exploiting the social context of opinions to enhance trust in social commerce

Su-Rong Yan, Xiao-Lin Zheng, Yan Wang, William Wei Song, Wen-Yu Zhang
2015 Information Sciences  
The proposed model incorporates the behavioral activities and social relationship reputations of users to combat the scarcity of first-hand information and identifies a set of critical trust factors to  ...  Thus, this study proposes a new graph-based comprehensive reputation model to build trust by fully exploiting the social context of opinions based on the activities and relationship networks of opinion  ...  [7] presented a SocialTrust framework to aggregate trust in online social networks.  ... 
doi:10.1016/j.ins.2014.09.036 fatcat:4ntuxshblfhjtfog37norhg7sq

Digital media and misinformation: An outlook on multidisciplinary strategies against manipulation

Danielle Caled, Mário J. Silva
2021 Journal of Computational Social Science  
AbstractThis review discusses the dynamic mechanisms of misinformation creation and spreading used in social networks.  ...  The review also surveys how digital platforms handle misinformation and gives an outlook on opportunities to address it in light of the presented viewpoints.  ...  Social attacks are mechanisms that exploit weaknesses in information systems through human resources, whether these are individual or collective agents (e.g., sock-puppeting and click farms).  ... 
doi:10.1007/s42001-021-00118-8 pmid:34075349 pmcid:PMC8156576 fatcat:3uagqf2i2ndpdcxei7wceynxzy

Combating Disinformation in a Social Media Age [article]

Kai Shu, Amrita Bhattacharjee, Faisal Alatawi, Tahora Nazer, Kaize Ding, Mansooreh Karami, Huan Liu
2020 arXiv   pre-print
In this paper, we present an overview of the techniques explored to date for the combating of disinformation with various forms.  ...  The creation, dissemination, and consumption of disinformation and fabricated content on social media is a growing concern, especially with the ease of access to such sources, and the lack of awareness  ...  People tend to trust their social contacts, and "information" that appear to be trendy.  ... 
arXiv:2007.07388v1 fatcat:scqvbj3aczc6lf2h7t45ndtpye

FROM BULLETS TO FAKE NEWS: DISINFORMATION AS A WEAPON OF MASS DISTRACTION. WHAT SOLUTIONS DOES INTERNATIONAL LAW PROVIDE?

Chema Suárez
2020 Spanish Yearbook of International Law  
Conventional warfare has given way to 'information warfare', an expression openly used by most exemplary international organizations. New approaches and new rules deem necessary.  ...  Could such an action represent a threat to peace and security? How to face it?  ...  with cyberattacks, elements of economic pressure or campaigns of influence by social networks and information manipulation.  ... 
doi:10.17103/sybil.24.6 fatcat:md2tn4wovjbr5fvf6niieehluy

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

Osama Alkadi, Nour Moustafa, Benjamin Turnbull
2020 IEEE Access  
Blockchain-based applications have emerged in multiple domains to offer trust and data privacy services.  ...  Blockchain offers new opportunities by allowing participants to exchange transactions and share information while maintaining a degree of trust, integrity and enhanced transparency.  ...  Security awareness programs and regular training are the most effective methods in keeping users informed and ready to combat such attacks.  ... 
doi:10.1109/access.2020.2999715 fatcat:qz677wrupvcblbvcrm74owmjyu

Understanding and combating link farming in the twitter social network

Saptarshi Ghosh, Bimal Viswanath, Farshad Kooti, Naveen Kumar Sharma, Gautam Korlam, Fabricio Benevenuto, Niloy Ganguly, Krishna Phani Gummadi
2012 Proceedings of the 21st international conference on World Wide Web - WWW '12  
In this paper, we first investigate link farming in the Twitter network and then explore mechanisms to discourage the activity.  ...  Like the Web, Twitter has become a target for link farming, where users, especially spammers, try to acquire large numbers of follower links in the social network.  ...  Acknowledgment We thank the anonymous reviewers whose suggestions helped to improve the paper.  ... 
doi:10.1145/2187836.2187846 dblp:conf/www/GhoshVKSKBGG12 fatcat:vtgduskddjfthb2zczxayiadmq
« Previous Showing results 1 — 15 out of 68 results