Skip to main content

Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs

  • Conference paper
  • First Online:
Information Security Applications (WISA 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8267))

Included in the following conference series:

Abstract

Recent solutions to defend against the Sybil attack, in which a node generates multiple identities, using social networks. In these solutions, social networks are assumed to be fast mixing, and Sybil nodes—which disrupt the fast mixing property of social networks—are detected. Little is known about the cause of the mixing quality in social graphs, and how to improve it in slow mixing ones. In this work we relate the mixing time of social graphs to graph degeneracy, which captures cohesiveness of the graph. We experimentally show that fast-mixing graphs tend to have a larger single core whereas slow-mixing graphs tend to have smaller multiple cores. We then propose several heuristics to improve the mixing of slow-mixing graphs using their topological structures by augmenting them. We show that our heuristics greatly improve Sybil defenses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Avrachenkov, K., Ribeiro, B., Towsley, D.: Improving random walk estimation accuracy with uniform restarts. In: Kumar, R., Sivakumar, D. (eds.) WAW 2010. LNCS, vol. 6516, pp. 98–109. Springer, Heidelberg (2010)

    Google Scholar 

  2. Batagelj, V., Zaversnik, M.: An \(O(m)\) algorithm for cores decomposition of networks. Arxiv, preprint cs/0310049 (2003)

  3. Cai, Z., Jermaine, C.: The latent community model for detecting sybil attacks in social networks. In: NDSS (2012)

    Google Scholar 

  4. Danezis, G., Mittal, P.: SybilInfer: detecting sybil nodes using social networks. In: NDSS (2009)

    Google Scholar 

  5. Dellamico, M., Roudier, Y.: A measurement of mixing time in social networks. In: IWSTM (2009)

    Google Scholar 

  6. Douceur, John R.: The sybil attack. In: Druschel, Peter, Kaashoek, MFrans, Rowstron, Antony (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Google Scholar 

  7. Erdős, P., Hajnal, A.: On chromatic number of graphs and set-systems. Acta Math. Hung. 17(1), 61–99 (1966)

    Article  Google Scholar 

  8. Jerrum, M., Sinclair, A.: Conductance and the rapid mixing property for markov chains: the approximation of the permanent resolved. In: STOC, pp. 235–244. ACM (1988)

    Google Scholar 

  9. Lee, C.-H., Xu, X., Eun, D.Y.: Beyond random walk and metropolis-hastings samplers: why you should not backtrack for unbiased graph sampling. In: Harrison, P.G., Arlitt, M.F., Casale, G. (eds) SIGMETRICS, pp. 319–330. ACM (2012)

    Google Scholar 

  10. Lesniewski-Laas, C.: A Sybil-proof one-hop DHT. In: Proceedings of the 1st Workshop on SNS, pp. 19–24. ACM (2008)

    Google Scholar 

  11. Lesniewski-Laas, C.: Design and applications of a secure and decentralized distributed hash table. Ph.D thesis, Massachusetts Institute of Technology (2010)

    Google Scholar 

  12. Lesniewski-Lass, C., Kaashoek, M.F.: Whānau: a sybil-proof distributed hash table. In: NSDI, pp. 3–17 (2010)

    Google Scholar 

  13. Li, F., Mittal, P., Caesar, M., Borisov, N.: Sybilcontrol: practical sybil defense with computational puzzles. In: Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing, pp. 67–78. ACM (2012)

    Google Scholar 

  14. Lick, D., White, A.: k-Degenerate graphs. Can. J. Math. 22, 1082–1096 (1970)

    Article  MATH  MathSciNet  Google Scholar 

  15. Mittal, P., Caesar, M., Borisov, N.: X-Vine: secure and pseudonymous routing using social networks. In: NDSS (2012)

    Google Scholar 

  16. Mohaisen, A., Hopper, N., Kim, Y.: Designs to account for trust in social network-based sybil defenses. In: ACM CCS (2010)

    Google Scholar 

  17. Mohaisen, A., Hopper, N., Kim, Y.: Keep your friends close: Incorporating trust in social network-based sybil defenses. In: INFOCOM (2011)

    Google Scholar 

  18. Mohaisen, A., Luo, P., Li, Y., Kim, Y., Zhang, Z.: Measuring bias in the mixing time of social graphs due to graph sampling. In: MILCOM (2012)

    Google Scholar 

  19. Mohaisen, A., Tran, H., Hopper, N., Kim, Y: Understanding social network properties for trustworthy computing, In: SIMPLEX (2011)

    Google Scholar 

  20. Mohaisen, A., Tran, H., Hopper, N., Kim, Y.: Understanding the mixing patterns of social networks. Technical report, UMN (2011)

    Google Scholar 

  21. Mohaisen, A., Tran, H., Hopper, N., Kim, Y.: On the mixing time of directed social graphs and implications. In: ACM ASIACCS (2012)

    Google Scholar 

  22. Mohaisen, A., Yun, A., Kim, Y.: Measuring the mixing time of social graphs. In: IMC, pp. 383–389. ACM (2010)

    Google Scholar 

  23. Ribeiro, B.F., Towsley, D.F.: Estimating and sampling graphs with multidimensional random walks. In: IMC (2010)

    Google Scholar 

  24. Shi, L., Yu, S., Lou, W., Hou, Y.T.: Sybilshield: an agent-aided social network-based sybil defense among multiple communities. In: INFOCOM (2013)

    Google Scholar 

  25. Sinclair, A.: Improved bounds for mixing rates of mc and multicommodity flow. Comb., Prob. & Comp. 1, 351–370 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  26. Yang, C., Harkreader, R.C., Zhang, J., Shin, S., Gu, G.: Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: WWW (2012)

    Google Scholar 

  27. Yu, H.: Sybil defenses via social networks: a tutorial and survey. SIGACT News 42(3), 80–101 (2011)

    Article  Google Scholar 

  28. Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social net defense against sybil attacks. In: S&P (2008)

    Google Scholar 

  29. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against sybil attacks via social networks. In: SIGCOMM (2006)

    Google Scholar 

  30. Yu, H., Shi, C., Kaminsky, M., Gibbons, P.B., Xiao, F.: Dsybil: optimal sybil-resistance for recommendation systems. In: IEEE Symposium on Security and Privacy (2009)

    Google Scholar 

  31. Zhou, Z., Zhang, N., Gong, Z., Das, G.: Faster random walks by rewiring online social networks on-the-fly. In: ICDE (2013)

    Google Scholar 

Download references

Acknowledgement

Part of this work appears in our unpublished prior study in [20]. The first author would like to thank Y. Kim, N. Hopper, and H. Tran for their help with the prior work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aziz Mohaisen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Mohaisen, A., Hollenbeck, S. (2014). Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs. In: Kim, Y., Lee, H., Perrig, A. (eds) Information Security Applications. WISA 2013. Lecture Notes in Computer Science(), vol 8267. Springer, Cham. https://doi.org/10.1007/978-3-319-05149-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05149-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05148-2

  • Online ISBN: 978-3-319-05149-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics