{"title":"Robust Sybil attack detection mechanism for Social Networks - a survey","authors":"M. Valarmathi, A. Meenakowshalya, A. Bharathi","doi":"10.1109/ICACCS.2016.7586399","DOIUrl":null,"url":null,"abstract":"Now a day's Recommender Systems (RS) have become predominant in Internet of Things (IoT), Online Social Networks (OSN) and Social Internet of Things (SIoT). Sybil attack is an attack where malicious users suppress opinions of honest users by creating fake identities called Sybils. Sybil attacks are prevalent in wireless sensor networks, online social networks, Peer to Peer networks and mobile networks. In this paper survey various types of Sybil attacks which are based on behavior of attacker. This paper also surveys different types of current Sybil defense protocols like SybilGuard, SybilLimit, SybilDefender, SybilInfer, SybilShield, and SyMon to defend against the Sybil attack.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"28 22","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCS.2016.7586399","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Now a day's Recommender Systems (RS) have become predominant in Internet of Things (IoT), Online Social Networks (OSN) and Social Internet of Things (SIoT). Sybil attack is an attack where malicious users suppress opinions of honest users by creating fake identities called Sybils. Sybil attacks are prevalent in wireless sensor networks, online social networks, Peer to Peer networks and mobile networks. In this paper survey various types of Sybil attacks which are based on behavior of attacker. This paper also surveys different types of current Sybil defense protocols like SybilGuard, SybilLimit, SybilDefender, SybilInfer, SybilShield, and SyMon to defend against the Sybil attack.