• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Sybilguard: Defending against sybil attacks via social networks (2006)

Cached

  • Download as a PDF

Download Links

  • [cs.baylor.edu]
  • [cs.ecs.baylor.edu]
  • [www.csee.usf.edu]
  • [cs.ecs.baylor.edu]
  • [www.math.cmu.edu]
  • [www.cs.umd.edu]
  • [www.cs.utah.edu]
  • [www.icir.org]
  • [www.eng.utah.edu]
  • [www.eng.utah.edu]
  • [www.csd.uoc.gr]
  • [conferences.sigcomm.org]
  • [www.math.cmu.edu]
  • [www.csd.uoc.gr]
  • [www.eng.utah.edu]
  • [www.comp.nus.edu.sg]
  • [www.pittsburgh.intel-research.net]
  • [www.comp.nus.edu]
  • [www.comp.nus.edu.sg]
  • [www.comp.nus.edu]
  • [people.cs.vt.edu]
  • [people.cs.vt.edu]
  • [www.comp.nus.edu.sg]
  • [www.cs.utexas.edu]
  • [an.kaist.ac.kr]
  • [cs.ucsb.edu]
  • [www.cs.ucsb.edu]
  • [www0.comp.nus.edu.sg]
  • [www.cs.utexas.edu]
  • [www.comp.nus.edu]
  • [www.cs.utexas.edu]
  • [www.cs.ucsb.edu]
  • [www.cs.utexas.edu]
  • [www.ccs.neu.edu]
  • [www.comp.nus.edu.sg]
  • [www.cs.utexas.edu]
  • [www.comp.nus.edu]
  • [www.cs.utexas.edu]
  • [www.cs.utexas.edu]
  • [www0.comp.nus.edu.sg]
  • [www.cs.ucsb.edu]
  • [www.comp.nus.edu.sg]
  • [www.pittsburgh.intel-research.net]
  • [info.pittsburgh.intel-research.net]
  • [pittsburgh.intel-research.net]
  • [www1.cs.columbia.edu]
  • [www.cs.columbia.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Haifeng Yu , Michael Kaminsky , Phillip B. Gibbons , Abraham Flaxman
Venue:In ACM SIGCOMM ’06
Citations:321 - 6 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Yu06sybilguard:defending,
    author = {Haifeng Yu and Michael Kaminsky and Phillip B. Gibbons and Abraham Flaxman},
    title = {Sybilguard: Defending against sybil attacks via social networks},
    booktitle = {In ACM SIGCOMM ’06},
    year = {2006},
    pages = {267--278},
    publisher = {ACM Press}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the system, the malicious user is able to “out vote” the honest users in collaborative tasks such as Byzantine failure defenses. This paper presents SybilGuard, anovelprotocolfor limiting the corruptive influences of sybil attacks. Our protocol is based on the “social network ” among user identities, where an edge between two identities indicates a human-established trust relationship. Malicious users can create many identities but few trust relationships. Thus, there is a disproportionately-small “cut ” in the graph between the sybil nodes and the honest nodes. SybilGuard exploits this property to bound the number of identities a malicious user can create. We show the effectiveness of SybilGuard both analytically and experimentally.

Keyphrases

sybil attack    social network    malicious user    user identity    byzantine failure    collaborative task    sybil node    distinct node    large fraction    multiple fake identity    disproportionately-small cut    corruptive influence    many identity    trust relationship    human-established trust relationship   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University