Exploring the design space of social network-based Sybil defenses
#1

Abstract

Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glance, existing social network-based Sybil defense schemes can be divided into two categories: Sybil detection and Sybil tolerance. These two categories of systems both leverage global properties of the underlying social graph, but they rely on different assumptions and provide different guarantees: Sybil detection schemes are application-independent and rely only on the graph structure to identify Sybil identities, while Sybil tolerance schemes rely on application-specific information and leverage the graph structure and transaction history to bound the leverage an attacker can gain from using multiple identities. In this paper, we take a closer look at the design goals, models, assumptions, guarantees, and limitations of both categories of social network-based Sybil defense systems.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: design of space truss, seminar on a near optimal social network defence against sybil attacks, social networking sites in sybil attack in ppt, exploring risk dimensions in indian software industry ppt, space vehicle design, social web design,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Exploring the design space of social network-based Sybil defenses - by Guest - 06-02-2017, 10:28 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Critical State-Based Filtering System for Securing SCADA Network Protocols 1 857 14-02-2017, 12:48 PM
Last Post: jaseela123d
  Design of Intranet Mail System nit_cal 14 11,486 19-05-2015, 11:17 AM
Last Post: seminar report asees
  Cyber Space Management System project topics 3 4,195 15-05-2015, 04:30 PM
Last Post: seminar report asees
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,581 10-01-2015, 11:13 PM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,268 19-09-2014, 12:52 AM
Last Post: [email protected]
  IEEE Project on Network Simulation using OMNeT++ 3.2 for M.Tech and B.Tech VickyBujju 3 3,052 03-06-2013, 11:13 AM
Last Post: computer topic
  Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-B Projects9 3 3,031 15-04-2013, 11:14 AM
Last Post: computer topic
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,940 18-03-2013, 12:25 PM
Last Post: computer topic
  Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation seminar class 2 3,321 02-02-2013, 02:08 PM
Last Post: seminar details
  The Wireless Sensor Network for Home-Care System Using ZigBee smart paper boy 1 1,975 31-01-2013, 11:34 AM
Last Post: seminar details

Forum Jump: