A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation
[article]
2020
arXiv
pre-print
This paper addresses active re-identification attacks in the context of privacy-preserving social graph publication. ...
Active attacks are those where the adversary can leverage fake accounts, a.k.a. sybil nodes, to enforce structural patterns that can be used to re-identify their victims on anonymised graphs. ...
This finding is of paramount importance, as it enables the use of any known anonymisation method ensuring k-symmetry for preventing active re-identification attacks via sybil subgraph obfuscation. ...
arXiv:2007.05312v1
fatcat:ft6bndpi3jboro5qga24zikoza
Robust active attacks on social graphs
[article]
2018
arXiv
pre-print
patterns later used to re-identify the sybil nodes and other users after anonymisation. ...
Various types of attacks on naively anonymised graphs have been developed. ...
Acknowledgements: The work reported in this paper received funding from Luxembourg's Fonds National de la Recherche (FNR), via grant C17/IS/11685812 (PrivDA). ...
arXiv:1811.10915v1
fatcat:bvzhyo5fnveklhhtynytyqelcu
Robust active attacks on social graphs
2019
Data mining and knowledge discovery
patterns later used to re-identify the sybil nodes and other users after anonymisation. ...
Various types of attacks on naively anonymised graphs have been developed. ...
The work reported in this paper received funding from Luxembourg's Fonds National de la Recherche (FNR), via Grant C17/IS/11685812 (PrivDA). ...
doi:10.1007/s10618-019-00631-5
fatcat:uiwc5ikddzeozjyhc5jcknggvq
Anonymising social graphs in the presence of active attackers
2018
Transactions on Data Privacy
Experimental results, obtained on real-life graphs and a large collection of randomly generated graphs, show that our methods effectively prevent attacks from active adversaries with the capability of ...
In our adversarial model we consider an active attacker, who has the capability of altering the structure of the social graph before publication by creating new user profiles and establishing relations ...
Re-identification attacks to social graphs are typically categorised as passive or active. ...
dblp:journals/tdp/MauwRT18
fatcat:4xif4e2pxfdazd4lysrwsdfsqi
Privacy and security in online social networks: A survey
2017
Online Social Networks and Media
Online Social Networks (OSN) are a permanent presence in today's personal and professional lives of a huge segment of the population, with direct consequences to offline activities. ...
Built on a foundation of trust-users connect to other users with common interests or overlapping personal trajectories-online social networks and the associated applications extract an unprecedented volume ...
Zheleva and Getoor [Zheleva and Getoor, 2008 ] consider a link re-identification attack, where nodes have multiple types of edges and an attacker attempts to re-identify sensitive edges. ...
doi:10.1016/j.osnem.2017.09.001
fatcat:xme5wwkyfbhnpgoiwgadknageq
Privacy in Social Media: Identification, Mitigation and Applications
[article]
2018
arXiv
pre-print
The increasing popularity of social media has attracted a huge number of people to participate in numerous activities on a daily basis. This results in tremendous amounts of rich user-generated data. ...
We overview the privacy risks from different aspects of social media and categorize the relevant works into five groups 1) graph data anonymization and de-anonymization, 2) author identification, 3) profile ...
This work introduces both active and passive attacks on anonymized social networks. ...
arXiv:1808.02191v1
fatcat:grcar6kx7nbqlf7o3ygrn4te44
The Art of Social Bots: A Review and a Refined Taxonomy
[article]
2019
arXiv
pre-print
This paper presents a detailed review on current social bots and proper techniques that can be used to fly under the radar of OSNs defences to be undetectable for long periods of time. ...
Social bots represent a new generation of bots that make use of online social networks (OSNs) as a command and control (C\&C) channel. ...
Acknowledgement We would like to thank Gonca Gürsun and Huseyin Ulusoy for their fruitful comments on the manuscript, which helped us improve the quality of this work. ...
arXiv:1905.03240v1
fatcat:a4bliz7dpvgy5aacvodamlaata
A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks
2022
Electronics
In general, a privacy attack is carried out by the exercise of linking personal data available on the OSN site and social graphs (or statistics) published by the OSN service providers. ...
On the other hand, this ever-growing use of OSNs enables adversaries to launch various privacy attacks to compromise users' accounts as well as to steal other sensitive information via statistical matching ...
of a large number of nodes using similarity function Re-identify nodes Auxiliary graphs R Horawala et al. [279] Technical Correct re-identification of a large number of nodes using ML techniques Re-identify ...
doi:10.3390/electronics11131931
fatcat:wn3ism2pqrb23npcpkjhb5zmte
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey
[article]
2020
arXiv
pre-print
attacks and cybercrimes; (iii) comprehensive defense mechanisms embracing prevention, detection, and response (or mitigation) against OSD attacks along with their pros and cons; (iv) datasets/metrics ...
Cyber attackers have exploited the sophisticated features of SNSs to carry out harmful OSD activities, such as financial fraud, privacy threat, or sexual/labor exploitation. ...
Social media platforms need to enhance their effective OSD prevention mechanisms especially for young users. • Dynamic, updated defense mechanisms to obfuscate highly advanced attackers: Recent studies ...
arXiv:2004.07678v1
fatcat:k4a6siywefb6lhkmyn67lmoqwe
No Right to Remain Silent: Isolating Malicious Mixes
2019
USENIX Security Symposium
We present Miranda, an efficient mix-net design, which mitigates active attacks by malicious mixes. ...
Each active attack -including dropping packets -leads to reduced connectivity for corrupt mixes and reduces their ability to attack, and, eventually, to detection of corrupt mixes. ...
Community detection has been used in previous works to achieve Sybil detection based on social or introduction graphs [16, 17] . ...
dblp:conf/uss/LeibowitzPDH19
fatcat:zgclgcv6xbcuhce3573eo3o6o4
No right to remain silent: Isolating Malicious Mixes
[article]
2017
IACR Cryptology ePrint Archive
We present Miranda, an efficient mix-net design, which mitigates active attacks by malicious mixes. ...
Each active attack -including dropping packets -leads to reduced connectivity for corrupt mixes and reduces their ability to attack, and, eventually, to detection of corrupt mixes. ...
Community detection has been used in previous works to achieve Sybil detection based on social or introduction graphs [16, 17] . ...
dblp:journals/iacr/LeibowitzPDH17
fatcat:2mileec3wbeofgxi5wekwl2cxe
VOUTE-Virtual Overlays Using Tree Embeddings
[article]
2016
arXiv
pre-print
Our simulation study on real-world data indicates that our approach is highly efficient and effectively mitigates failures as well as powerful denial-of-service attacks. ...
Yet, existing F2F overlays suffer from a low performance, are vulnerable to denial-of-service attacks, or fail to provide anonymity. ...
By hiding the topology of the social graph, we prevent the identification of users by comparing a pseudonymous topology to an external social graph. ...
arXiv:1601.06119v1
fatcat:wxiljy4vc5adhguinbpnh6yte4
Adversarial Web Search
2010
Foundations and Trends in Information Retrieval
In other words, in the sybil attack the benefits can be either concentrated or spread across several sites, while in a collusion attack the benefits cannot be concentrated on a single site (or the other ...
Thus link farms created by collusion are a more restricted form of link farms than those created by a sybil attack. ...
doi:10.1561/1500000021
fatcat:toxnvajrmbdppf5hytdbnykuiq
SoK: Understanding BFT Consensus in the Age of Blockchains
[article]
2021
IACR Cryptology ePrint Archive
This paper conducts a systematic and comprehensive study on BFT consensus protocols with a specific focus on the blockchain era. ...
Based on the proposed APDB and asynchronous binary agreement, the authors design and present a self-bootstrap framework Dumbo-MVBA to reduce the communication cost of existing MVBA protocols. ...
Sybil attacks are typically hard to identify and prevent. ...
dblp:journals/iacr/Wang21c
fatcat:wggbkbi25fg43fieebp4qzlk3m
DIFFERENTIAL PRIVACY FOR IOT-ENABLED CRITICAL INFRASTRUCTURE: A COMPREHENSIVE SURVEY
2021
IEEE Access
Adversaries carry out privacy-oriented attacks to gain access to the sensitive and confidential data of critical infrastructure for various self-centered, political and commercial gains. ...
Machine Learning [53] A comprehensive review on privacy attacks on social networks, types of differential privacy in social network analysis, a degree distribution analysis, subgraph counting and edge ...
There are several types of attacks performed on IoTenabled CI including Sybil attacks, Denial of Service attacks and so on [8] , [9] . ...
doi:10.1109/access.2021.3124309
fatcat:vejtyjyrwffeffi7ob2o2svyja
« Previous
Showing results 1 — 15 out of 22 results