15-02-2017, 02:55 PM
Recently, there has been a significant interest in research to leverage social networks to defend against Sybil attacks. While much of this work may seem similar at first glance, Sybil's existing social defence schemes can be divided into two categories: Sybil's detection and Sybil's tolerance. These two categories of systems take advantage of the overall properties of the underlying social graph, but are based on different assumptions and offer different assurances: Sybil's detection schemes are independent of the application and are based only on the structure of the graphs to identify the identities Of Sybil. In application-specific information and take advantage of the graph structure and transaction history to limit the influence an attacker can get when using multiple identities. In this article, we look more closely at the design objectives, models, assumptions, assurances, and limitations of both Sybil's social network-based defence systems categories.
Video on Exploring the design space of Sybil's defences based on social networks :
Video on Exploring the design space of Sybil's defences based on social networks :