Exploring the design space of social network-based Sybil defenses
#2
Recently, there has been a significant interest in research to leverage social networks to defend against Sybil attacks. While much of this work may seem similar at first glance, Sybil's existing social defence schemes can be divided into two categories: Sybil's detection and Sybil's tolerance. These two categories of systems take advantage of the overall properties of the underlying social graph, but are based on different assumptions and offer different assurances: Sybil's detection schemes are independent of the application and are based only on the structure of the graphs to identify the identities Of Sybil. In application-specific information and take advantage of the graph structure and transaction history to limit the influence an attacker can get when using multiple identities. In this article, we look more closely at the design objectives, models, assumptions, assurances, and limitations of both Sybil's social network-based defence systems categories.


Video on Exploring the design space of Sybil's defences based on social networks :
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar on a near optimal social network defence against sybil attacks, social networking sites in sybil attack in ppt, social web design, design of space truss, exploring risk dimensions in indian software industry ppt, space vehicle design,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Exploring the design space of social network-based Sybil defenses - by jaseela123d - 15-02-2017, 02:55 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Critical State-Based Filtering System for Securing SCADA Network Protocols 1 856 14-02-2017, 12:48 PM
Last Post: jaseela123d
  Design of Intranet Mail System nit_cal 14 11,477 19-05-2015, 11:17 AM
Last Post: seminar report asees
  Cyber Space Management System project topics 3 4,195 15-05-2015, 04:30 PM
Last Post: seminar report asees
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,580 10-01-2015, 11:13 PM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,268 19-09-2014, 12:52 AM
Last Post: [email protected]
  IEEE Project on Network Simulation using OMNeT++ 3.2 for M.Tech and B.Tech VickyBujju 3 3,050 03-06-2013, 11:13 AM
Last Post: computer topic
  Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-B Projects9 3 3,031 15-04-2013, 11:14 AM
Last Post: computer topic
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,938 18-03-2013, 12:25 PM
Last Post: computer topic
  Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation seminar class 2 3,320 02-02-2013, 02:08 PM
Last Post: seminar details
  The Wireless Sensor Network for Home-Care System Using ZigBee smart paper boy 1 1,975 31-01-2013, 11:34 AM
Last Post: seminar details

Forum Jump: