Filters








22 Hits in 7.4 sec

Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation [article]

Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua
2020 arXiv   pre-print
This paper addresses active re-identification attacks in the context of privacy-preserving social graph publication.  ...  Active attacks are those where the adversary can leverage fake accounts, a.k.a. sybil nodes, to enforce structural patterns that can be used to re-identify their victims on anonymised graphs.  ...  This finding is of paramount importance, as it enables the use of any known anonymisation method ensuring k-symmetry for preventing active re-identification attacks via sybil subgraph obfuscation.  ... 
arXiv:2007.05312v1 fatcat:ft6bndpi3jboro5qga24zikoza

Robust active attacks on social graphs [article]

Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua
2018 arXiv   pre-print
patterns later used to re-identify the sybil nodes and other users after anonymisation.  ...  Various types of attacks on naively anonymised graphs have been developed.  ...  Acknowledgements: The work reported in this paper received funding from Luxembourg's Fonds National de la Recherche (FNR), via grant C17/IS/11685812 (PrivDA).  ... 
arXiv:1811.10915v1 fatcat:bvzhyo5fnveklhhtynytyqelcu

Robust active attacks on social graphs

Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua
2019 Data mining and knowledge discovery  
patterns later used to re-identify the sybil nodes and other users after anonymisation.  ...  Various types of attacks on naively anonymised graphs have been developed.  ...  The work reported in this paper received funding from Luxembourg's Fonds National de la Recherche (FNR), via Grant C17/IS/11685812 (PrivDA).  ... 
doi:10.1007/s10618-019-00631-5 fatcat:uiwc5ikddzeozjyhc5jcknggvq

Anonymising social graphs in the presence of active attackers

Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua
2018 Transactions on Data Privacy  
Experimental results, obtained on real-life graphs and a large collection of randomly generated graphs, show that our methods effectively prevent attacks from active adversaries with the capability of  ...  In our adversarial model we consider an active attacker, who has the capability of altering the structure of the social graph before publication by creating new user profiles and establishing relations  ...  Re-identification attacks to social graphs are typically categorised as passive or active.  ... 
dblp:journals/tdp/MauwRT18 fatcat:4xif4e2pxfdazd4lysrwsdfsqi

Privacy and security in online social networks: A survey

Imrul Kayes, Adriana Iamnitchi
2017 Online Social Networks and Media  
Online Social Networks (OSN) are a permanent presence in today's personal and professional lives of a huge segment of the population, with direct consequences to offline activities.  ...  Built on a foundation of trust-users connect to other users with common interests or overlapping personal trajectories-online social networks and the associated applications extract an unprecedented volume  ...  Zheleva and Getoor [Zheleva and Getoor, 2008 ] consider a link re-identification attack, where nodes have multiple types of edges and an attacker attempts to re-identify sensitive edges.  ... 
doi:10.1016/j.osnem.2017.09.001 fatcat:xme5wwkyfbhnpgoiwgadknageq

Privacy in Social Media: Identification, Mitigation and Applications [article]

Ghazaleh Beigi, Huan Liu
2018 arXiv   pre-print
The increasing popularity of social media has attracted a huge number of people to participate in numerous activities on a daily basis. This results in tremendous amounts of rich user-generated data.  ...  We overview the privacy risks from different aspects of social media and categorize the relevant works into five groups 1) graph data anonymization and de-anonymization, 2) author identification, 3) profile  ...  This work introduces both active and passive attacks on anonymized social networks.  ... 
arXiv:1808.02191v1 fatcat:grcar6kx7nbqlf7o3ygrn4te44

The Art of Social Bots: A Review and a Refined Taxonomy [article]

Majd Latah
2019 arXiv   pre-print
This paper presents a detailed review on current social bots and proper techniques that can be used to fly under the radar of OSNs defences to be undetectable for long periods of time.  ...  Social bots represent a new generation of bots that make use of online social networks (OSNs) as a command and control (C\&C) channel.  ...  Acknowledgement We would like to thank Gonca Gürsun and Huseyin Ulusoy for their fruitful comments on the manuscript, which helped us improve the quality of this work.  ... 
arXiv:1905.03240v1 fatcat:a4bliz7dpvgy5aacvodamlaata

A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks

Abdul Majeed, Safiullah Khan, Seong Oun Hwang
2022 Electronics  
In general, a privacy attack is carried out by the exercise of linking personal data available on the OSN site and social graphs (or statistics) published by the OSN service providers.  ...  On the other hand, this ever-growing use of OSNs enables adversaries to launch various privacy attacks to compromise users' accounts as well as to steal other sensitive information via statistical matching  ...  of a large number of nodes using similarity function Re-identify nodes Auxiliary graphs R Horawala et al. [279] Technical Correct re-identification of a large number of nodes using ML techniques Re-identify  ... 
doi:10.3390/electronics11131931 fatcat:wn3ism2pqrb23npcpkjhb5zmte

Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey [article]

Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra
2020 arXiv   pre-print
attacks and cybercrimes; (iii) comprehensive defense mechanisms embracing prevention, detection, and response (or mitigation) against OSD attacks along with their pros and cons; (iv) datasets/metrics  ...  Cyber attackers have exploited the sophisticated features of SNSs to carry out harmful OSD activities, such as financial fraud, privacy threat, or sexual/labor exploitation.  ...  Social media platforms need to enhance their effective OSD prevention mechanisms especially for young users. • Dynamic, updated defense mechanisms to obfuscate highly advanced attackers: Recent studies  ... 
arXiv:2004.07678v1 fatcat:k4a6siywefb6lhkmyn67lmoqwe

No Right to Remain Silent: Isolating Malicious Mixes

Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg
2019 USENIX Security Symposium  
We present Miranda, an efficient mix-net design, which mitigates active attacks by malicious mixes.  ...  Each active attack -including dropping packets -leads to reduced connectivity for corrupt mixes and reduces their ability to attack, and, eventually, to detection of corrupt mixes.  ...  Community detection has been used in previous works to achieve Sybil detection based on social or introduction graphs [16, 17] .  ... 
dblp:conf/uss/LeibowitzPDH19 fatcat:zgclgcv6xbcuhce3573eo3o6o4

No right to remain silent: Isolating Malicious Mixes [article]

Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg
2017 IACR Cryptology ePrint Archive  
We present Miranda, an efficient mix-net design, which mitigates active attacks by malicious mixes.  ...  Each active attack -including dropping packets -leads to reduced connectivity for corrupt mixes and reduces their ability to attack, and, eventually, to detection of corrupt mixes.  ...  Community detection has been used in previous works to achieve Sybil detection based on social or introduction graphs [16, 17] .  ... 
dblp:journals/iacr/LeibowitzPDH17 fatcat:2mileec3wbeofgxi5wekwl2cxe

VOUTE-Virtual Overlays Using Tree Embeddings [article]

Stefanie Roos, Martin Beck, Thorsten Strufe
2016 arXiv   pre-print
Our simulation study on real-world data indicates that our approach is highly efficient and effectively mitigates failures as well as powerful denial-of-service attacks.  ...  Yet, existing F2F overlays suffer from a low performance, are vulnerable to denial-of-service attacks, or fail to provide anonymity.  ...  By hiding the topology of the social graph, we prevent the identification of users by comparing a pseudonymous topology to an external social graph.  ... 
arXiv:1601.06119v1 fatcat:wxiljy4vc5adhguinbpnh6yte4

Adversarial Web Search

Carlos Castillo
2010 Foundations and Trends in Information Retrieval  
In other words, in the sybil attack the benefits can be either concentrated or spread across several sites, while in a collusion attack the benefits cannot be concentrated on a single site (or the other  ...  Thus link farms created by collusion are a more restricted form of link farms than those created by a sybil attack.  ... 
doi:10.1561/1500000021 fatcat:toxnvajrmbdppf5hytdbnykuiq

SoK: Understanding BFT Consensus in the Age of Blockchains [article]

Gang Wang
2021 IACR Cryptology ePrint Archive  
This paper conducts a systematic and comprehensive study on BFT consensus protocols with a specific focus on the blockchain era.  ...  Based on the proposed APDB and asynchronous binary agreement, the authors design and present a self-bootstrap framework Dumbo-MVBA to reduce the communication cost of existing MVBA protocols.  ...  Sybil attacks are typically hard to identify and prevent.  ... 
dblp:journals/iacr/Wang21c fatcat:wggbkbi25fg43fieebp4qzlk3m

DIFFERENTIAL PRIVACY FOR IOT-ENABLED CRITICAL INFRASTRUCTURE: A COMPREHENSIVE SURVEY

Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, Mike J. Ryan
2021 IEEE Access  
Adversaries carry out privacy-oriented attacks to gain access to the sensitive and confidential data of critical infrastructure for various self-centered, political and commercial gains.  ...  Machine Learning [53] A comprehensive review on privacy attacks on social networks, types of differential privacy in social network analysis, a degree distribution analysis, subgraph counting and edge  ...  There are several types of attacks performed on IoTenabled CI including Sybil attacks, Denial of Service attacks and so on [8] , [9] .  ... 
doi:10.1109/access.2021.3124309 fatcat:vejtyjyrwffeffi7ob2o2svyja
« Previous Showing results 1 — 15 out of 22 results