期刊文献+

一种社交网络Sybil用户检测方法 被引量:3

Compound Approach for Sybil Users Detection in Social Networks
下载PDF
导出
摘要 对社交网络中广泛存在的"女巫攻击"(Sybil Attack)进行检测。通过对收集的近10万微博用户数据提取特征并进行分析,同时结合网络可信度,提出了社交网络Sybil用户检测方法。最后通过实验验证了该方法的有效性。 We mainly focused on the detection of Sybil attack in social networks.By analyzing the collected 100000 data in social networks,we extracted the users' features,and combining the network reliability,we proposed a method to detect Sybil users.Finally,we conducted some experiments to validate the effective of our method.
出处 《计算机科学》 CSCD 北大核心 2016年第1期172-177,共6页 Computer Science
基金 国家自然科学基金(61303248 U1536106) 北京市自然科学基金(4144089 4122085) 国家863计划(2013AA01A214)资助
关键词 社交网络 女巫攻击 恶意用户检测 Social networks Sybil attack Detection of malicious users
  • 相关文献

参考文献15

  • 1Douceur J. The Sybil attack [M]//Lecture Notes in Computer Scie- nce 2429,2002 : 251-260.
  • 2Yu H, Kaminsky M, Gibbons P B, et al. SybilGuard.. Defending Against Sybil Attacks via Social Networks[J]. IEEE/ACM Transactions on Networking, 2008,16 (3) .. 576-589.
  • 3Yu H, Gibbons P B, Kaminsky M, et al. Sybillimit: A near-opti- mal social network defense against sybil attacks [C]//IEEE Symposium on Security and Privacy. Oakland, 2008:3-17.
  • 4Tran N, Li J, Subramanian L, et al. Optimal sybil-resilient node admission control[C]//IEEE INFOCOM. Shanghai, 2011:3218- 3226.
  • 5Danezis G, Mit P. Sybilinfer: Detecting sybil nodes using social networks[C]//NDSS. 2009.
  • 6Xu L, Chainan S, Takizawa H, et al. Resisting Sybil attack by social network and network elustering[C]//10th Annual Inter- national Symposium on Applications and the Internet. Seoul, 2010:15-21.
  • 7Wei W, Xu F, Tan C C, et al. Sybil Defender: Defend Against Sybil Attacks in Large Social Networks[C]//IEEE INFOCOM. 2012:1951-1959.
  • 8Golder S, Lotan (Jr. Tweet, tweet, retweet: Conversatfonal as- pects of retweeting on Twitter[C]//2010 43rd Hawaii Interma- tional Conference on System Sicences(HlCSS). 2010:1-10.
  • 9Honeycutt C, Herring S C. Beyond microblogging: Conversation and collaboration via Twitter[C]//42nd Hawaii International Conference on System Sciences, 2009 ( HICSS' 09). IEEE, 2009 : 1-10.
  • 10Bilge L, Strufe T, Balzarotti D, et al. All your contacts are be- long to us: Automated identity theft attacks on social networks [C] // Proceedings of the 18th International Conference on World Wide Web(WWW'09). 2009 : 551-560.

二级参考文献21

  • 1Zhao Dejin,Mary Beth Rosson.How and why people twitter:the rolethat micro-blogging plays in informal communication at work[C]//Proceedings of the ACM 2009 International Conference on SupportingGroup Work,Sanibel Island,FL,USA,2009.
  • 2Yardi S,Romero D,Schoenebeck G,et al.Detecting spam in a twitternetwork[J].First Monday,2010,15(1).
  • 3Steven Gianvecchio,Xie Mengjun,Wu Zhenyu,et al.Measurement andclassification of humans and bots in internet chat[C]//Proceedings ofthe 17th USENIX Security symposium,San Jose,CA,2008.
  • 4Gianluca Stringhini,Christopher Kruegel,Giovanni Vigna.DetectingSpammers on Social Networks[C]//ACSAC’10 Dec.6-10,2010,Austin,Texas USA.
  • 5Chu Zi,Steven Gianvecchio,Wang Haining.Who is Tweeting on Twit-ter:Human,Bot,or Cyborg?[C]//ACSAC’10 Dec.6-10,2010,Austin,Texas USA.
  • 6Akshay Java,Song Xiaodan,Tim Finin,et al.Why we twitter:under-standing microblogging usage and communities[C]//Proceedings ofthe 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Miningand Social Network Analysis,San Jose,CA,USA,2007.
  • 7Krishnamurthy B,Gill P,Aritt M.A few chirps about twitter[C]//USENIX Workshop on Online Social Networks,2008.
  • 8Bilge L,Strufe T,Balzarotti D,et al.All your contacts are belong to us:Automated identity theft attacks on social networks[C]//World WideWeb Conference,2009.
  • 9Jagatic T N,Johnson N A,Jakobsson M,et al.Social phishing.Comm[J].ACM,2007,50(10):94-100.
  • 10Harris Interactive Public Relations Research.A study of social networksscams[R].2008.

共引文献11

同被引文献17

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部