A Network Clustering Algorithm for Sybil-Attack Resisting

The social network model has been regarded as a promising mechanism to defend against Sybil attack. This model assumes that honest peers and Sybil peers are connected by only a small number of attack edges. Detection of the attack edges plays a key role in restraining the power of Sybil peers. In th...

Full description

Saved in:
Bibliographic Details
Published inIEICE Transactions on Information and Systems Vol. E94.D; no. 12; pp. 2345 - 2352
Main Authors EGAWA, Ryusuke, TAKIZAWA, Hiroyuki, KOBAYASHI, Hiroaki, XU, Ling
Format Journal Article
LanguageEnglish
Published The Institute of Electronics, Information and Communication Engineers 2011
Subjects
Online AccessGet full text
ISSN0916-8532
1745-1361
1745-1361
DOI10.1587/transinf.E94.D.2345

Cover

Abstract The social network model has been regarded as a promising mechanism to defend against Sybil attack. This model assumes that honest peers and Sybil peers are connected by only a small number of attack edges. Detection of the attack edges plays a key role in restraining the power of Sybil peers. In this paper, an attack-resisting, distributed algorithm, named Random walk and Social network model-based clustering (RSC), is proposed to detect the attack edges. In RSC, peers disseminate random walk packets to each other. For each edge, the number of times that the packets pass this edge reflects the betweenness of this edge. RSC observes that the betweennesses of attack edges are higher than those of the non-attack edges. In this way, the attack edges can be identified. To show the effectiveness of RSC, RSC is integrated into an existing social network model-based algorithm called SOHL. The results of simulations with real world social network datasets show that RSC remarkably improves the performance of SOHL.
AbstractList The social network model has been regarded as a promising mechanism to defend against Sybil attack. This model assumes that honest peers and Sybil peers are connected by only a small number of attack edges. Detection of the attack edges plays a key role in restraining the power of Sybil peers. In this paper, an attack-resisting, distributed algorithm, named Random walk and Social network model-based clustering (RSC), is proposed to detect the attack edges. In RSC, peers disseminate random walk packets to each other. For each edge, the number of times that the packets pass this edge reflects the betweenness of this edge. RSC observes that the betweennesses of attack edges are higher than those of the non-attack edges. In this way, the attack edges can be identified. To show the effectiveness of RSC, RSC is integrated into an existing social network model-based algorithm called SOHL. The results of simulations with real world social network datasets show that RSC remarkably improves the performance of SOHL.
Author TAKIZAWA, Hiroyuki
XU, Ling
KOBAYASHI, Hiroaki
EGAWA, Ryusuke
Author_xml – sequence: 1
  fullname: EGAWA, Ryusuke
  organization: Cyberscience Center, Tohoku University
– sequence: 1
  fullname: TAKIZAWA, Hiroyuki
  organization: Graduate School of Information Sciences, Tohoku University
– sequence: 1
  fullname: KOBAYASHI, Hiroaki
  organization: Cyberscience Center, Tohoku University
– sequence: 1
  fullname: XU, Ling
  organization: Graduate School of Information Sciences, Tohoku University
BookMark eNp1kMtOwzAQRS0EEm3hC9hkySbBduLYXkZteUgFJB5ry0kmbVo3Kbarqn9PqtAiIbGaWZwzV3eG6LxpG0DohuCIMMHvvNWNq5sqmsokmkQ0TtgZGhCesJDEKTlHAyxJGgoW00s0dG6JMRGUsAGSWfACftfaVTA2W-fB1s08yMy8tbVfrIOqtcH7Pq9NmHmvi1XwBq52voOu0EWljYPrnzlCn_fTj_FjOHt9eBpns7BgJPFhIigvhaYlMF1IQplmDFJOtYg5z_NCy5ISCjnjgEuOJcexToFBLmWSCyjjEUr6u9tmo_c7bYza2Hqt7V4RrA711bG-ApmoUh3qd9ptr21s-7UF59W6dgUYoxtot65zCRaCUMo7NO7RwrbOWaj-D-j-qybHgOfeWjqv53BytPV1YeCvQ-jvcvBPXLHQVkETfwOCB43K
Cites_doi 10.1007/3-540-45748-8_24
10.1109/SP.2008.13
10.1145/1151659.1159945
10.1145/1435497.1435501
10.1016/j.socnet.2004.11.009
10.1007/11555827_18
10.1145/1851275.1851226
ContentType Journal Article
Copyright 2011 The Institute of Electronics, Information and Communication Engineers
Copyright_xml – notice: 2011 The Institute of Electronics, Information and Communication Engineers
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
DOI 10.1587/transinf.E94.D.2345
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1745-1361
EndPage 2352
ExternalDocumentID 10.1587/transinf.e94.d.2345
10_1587_transinf_E94_D_2345
article_transinf_E94_D_12_E94_D_12_2345_article_char_en
GroupedDBID -~X
5GY
ABJNI
ABZEH
ACGFS
ADNWM
AENEX
ALMA_UNASSIGNED_HOLDINGS
CS3
DU5
EBS
EJD
F5P
ICE
JSF
JSH
KQ8
OK1
P2P
RJT
RZJ
TN5
ZKX
1TH
AAYXX
AFFNX
C1A
CITATION
CKLRP
H13
RYL
VOH
ZE2
ZY4
7SC
8FD
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
ID FETCH-LOGICAL-c514t-4827d8a2de5ac9125a55e672a8377bbca9d212eb57e0d709703a6e5eb994b8ed3
IEDL.DBID UNPAY
ISSN 0916-8532
1745-1361
IngestDate Tue Aug 19 16:43:40 EDT 2025
Thu Oct 02 10:33:54 EDT 2025
Wed Oct 01 03:07:52 EDT 2025
Wed Sep 03 06:22:11 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 12
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c514t-4827d8a2de5ac9125a55e672a8377bbca9d212eb57e0d709703a6e5eb994b8ed3
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
OpenAccessLink https://proxy.k.utb.cz/login?url=https://www.jstage.jst.go.jp/article/transinf/E94.D/12/E94.D_12_2345/_pdf
PQID 1010881227
PQPubID 23500
PageCount 8
ParticipantIDs unpaywall_primary_10_1587_transinf_e94_d_2345
proquest_miscellaneous_1010881227
crossref_primary_10_1587_transinf_E94_D_2345
jstage_primary_article_transinf_E94_D_12_E94_D_12_2345_article_char_en
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2011-00-00
PublicationDateYYYYMMDD 2011-01-01
PublicationDate_xml – year: 2011
  text: 2011-00-00
PublicationDecade 2010
PublicationTitle IEICE Transactions on Information and Systems
PublicationTitleAlternate IEICE Trans. Inf. & Syst.
PublicationYear 2011
Publisher The Institute of Electronics, Information and Communication Engineers
Publisher_xml – name: The Institute of Electronics, Information and Communication Engineers
References [10] http://arxiv.org/archive/hep-th
[1] J. Douceur, “The sybil attack,” Peer-to-Peer Systems, pp.251-260, 2002.
[8] M. Newman, “A measure of betweenness centrality based on random walks,” Social Networks, vol.27, no.1, pp.39-54, 2005.
[4] C. Lesniewski-Laas, “A sybil-proof one-hop DHT,” Proc. 1st Workshop on Social Network Systems, SocialNets'08, pp.19-24, New York, NY, USA, 2008.
[6] H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, “SybilGuard: Defending against sybil attacks via social networks,” SIGCOMM Comput. Commun. Rev., vol.36, pp.267-278, 2006.
[11] http://snap.stanford.edu/data
[5] G. Danezis, C. Lesniewski-Laas, M. Kaashoek, and R. Anderson, “Sybil-resistant DHT routing,” Lect. Notes Comput. Sci., pp.305-318, 2005.
[9] Networkx. http://networkx.lanl.gov/contents.html
[2] H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, “SybilLimit: A near-optimal social network defense against sybil attacks,” IEEE Symposium on Security and Privacy, pp.3-17, 2008.
[7] C. Lesniewski-Laas and M.F. Kaashoek, “Whanau: A sybil-proof distributed hash table,” Symposium on Networked System Design and Implementation, San Jose, California, April 2010.
[3] B. Viswanath, A. Post, K.P. Gummadi, and A. Mislove, “An analysis of social network-based sybil defenses,” SIGCOMM Comput. Commun. Rev., vol.40, pp.363-374, Aug. 2010.
[12] H. Yu, P.B. Gibbons, M. Kaminsky, and F. Xiao, “SybilLimit: A near-optimal social network defense against sybilattacks,” Tech. Rep. TRA2/08, National Univ. of Singapore, School of Computing, March 2008. http://www.comp.nus.edu.sg/~yuhf/sybillimit-tr.pdf, 2008.
VISWANATH BIMAL (3) 2010; 40
11
1
12
2
4
5
6
7
8
9
10
References_xml – reference: [4] C. Lesniewski-Laas, “A sybil-proof one-hop DHT,” Proc. 1st Workshop on Social Network Systems, SocialNets'08, pp.19-24, New York, NY, USA, 2008.
– reference: [3] B. Viswanath, A. Post, K.P. Gummadi, and A. Mislove, “An analysis of social network-based sybil defenses,” SIGCOMM Comput. Commun. Rev., vol.40, pp.363-374, Aug. 2010.
– reference: [1] J. Douceur, “The sybil attack,” Peer-to-Peer Systems, pp.251-260, 2002.
– reference: [6] H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, “SybilGuard: Defending against sybil attacks via social networks,” SIGCOMM Comput. Commun. Rev., vol.36, pp.267-278, 2006.
– reference: [7] C. Lesniewski-Laas and M.F. Kaashoek, “Whanau: A sybil-proof distributed hash table,” Symposium on Networked System Design and Implementation, San Jose, California, April 2010.
– reference: [5] G. Danezis, C. Lesniewski-Laas, M. Kaashoek, and R. Anderson, “Sybil-resistant DHT routing,” Lect. Notes Comput. Sci., pp.305-318, 2005.
– reference: [8] M. Newman, “A measure of betweenness centrality based on random walks,” Social Networks, vol.27, no.1, pp.39-54, 2005.
– reference: [9] Networkx. http://networkx.lanl.gov/contents.html
– reference: [10] http://arxiv.org/archive/hep-th
– reference: [12] H. Yu, P.B. Gibbons, M. Kaminsky, and F. Xiao, “SybilLimit: A near-optimal social network defense against sybilattacks,” Tech. Rep. TRA2/08, National Univ. of Singapore, School of Computing, March 2008. http://www.comp.nus.edu.sg/~yuhf/sybillimit-tr.pdf, 2008.
– reference: [2] H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, “SybilLimit: A near-optimal social network defense against sybil attacks,” IEEE Symposium on Security and Privacy, pp.3-17, 2008.
– reference: [11] http://snap.stanford.edu/data
– ident: 1
  doi: 10.1007/3-540-45748-8_24
– ident: 2
  doi: 10.1109/SP.2008.13
– ident: 6
  doi: 10.1145/1151659.1159945
– ident: 4
  doi: 10.1145/1435497.1435501
– ident: 8
  doi: 10.1016/j.socnet.2004.11.009
– ident: 12
– ident: 11
– ident: 9
– ident: 7
– ident: 5
  doi: 10.1007/11555827_18
– ident: 10
– volume: 40
  start-page: 363
  issn: 0146-4833
  issue: 4
  year: 2010
  ident: 3
  doi: 10.1145/1851275.1851226
SSID ssj0018215
ssib036429076
ssib036429077
Score 1.8487763
Snippet The social network model has been regarded as a promising mechanism to defend against Sybil attack. This model assumes that honest peers and Sybil peers are...
SourceID unpaywall
proquest
crossref
jstage
SourceType Open Access Repository
Aggregation Database
Index Database
Publisher
StartPage 2345
SubjectTerms Algorithms
attack edge
Clustering
Computer simulation
Constraining
Networks
Performance enhancement
Random walk
social network
Social networks
sybil attack
Title A Network Clustering Algorithm for Sybil-Attack Resisting
URI https://www.jstage.jst.go.jp/article/transinf/E94.D/12/E94.D_12_2345/_article/-char/en
https://www.proquest.com/docview/1010881227
https://www.jstage.jst.go.jp/article/transinf/E94.D/12/E94.D_12_2345/_pdf
UnpaywallVersion publishedVersion
Volume E94.D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX IEICE Transactions on Information and Systems, 2011/12/01, Vol.E94.D(12), pp.2345-2352
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1745-1361
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0018215
  issn: 0916-8532
  databaseCode: KQ8
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3da9swED_WdLDtYd26jWYfxYM9Tnb8IVt6NG1D2VjYV6B7EpIlZ01dJzQ2o_vrd4ps0xb2MBgYbIwkSz-d735nn04A75AiGJqqEt0SnpKkZAlhZZKQuCyz0qQxWl3rKH6apafz5MMZPetSCm26sMol8qKFsSd_sfKX66ADMWis-kbggxOe-MdBGLkLEUYiihMaiLUud2A3pUjLR7A7n33Of2xz7YUpQbMUucWRlIRxGnYZiCjLhmZ9g61p3zZ1y0rddx26xUEftPVaXv-SVXXDHE33YNkPxEWhXPhto_zi950cj_9lpE_gcUdavdxVewr3TL0Pe_2GEF6nH_bh0Y3shs-A597MBZl7R1VrEzLgbS-vFqur8-bnpYd02ft2rc4rkjeNLC68r2ZjNU69eA7z6cn3o1PS7dRACiRcDbG5RDWTkTZUFhw5k6TUpFkk0f3NlCok12gijaKZmehswlHNSJQRozhPFDM6fgGjelWbA7uGPFFlWnJGJxJ9P80ly0zMmNRcGU0nY3jfz4xYu4QcwjoyOJGiR00gWOJ4i9QYpg7koXAH8d3CiOxwYSsO5ezqN1QhY3jbz77AN9D-VpG1WbUbGySHqjqMomwMZBCLv3cOpUzo7TNe_mP5V_DQfdK2x2sYNVeteYOcqFGHsPPxCzvsZP4P37gNcg
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3ha9QwFA96E5wfNp2OnU6p4EfTXtskbT6WbccQPEQ9mJ9C0qTnbl3v2LXI_Ot9uaRlG_hBEAotJUmTX17f-7325QWhD0ARDGWqAreEM0yqnOC8IgSnVZVVhqVgda2j-HnGzufk0wW98CmFNj6scgm8aGHsKVyswuU68iBGrVXfAHx0xkl4GsWJuxBxIpKU0EisdfUY7TAKtHyEduazL8WPba69mGEwS4lbHElxnLLYZyCieTY0GxpoTYe2qXtW6onr0D0O-rRr1vL2l6zrO-Zouo-W_UBcFMpV2LUqLH8_yPH4X0b6HO150hoUrtoL9Mg0B2i_3xAi8PrhAD27k93wJeJFMHNB5sFJ3dmEDHA7KOrF6uay_XkdAF0Ovt2qyxoXbSvLq-Cr2ViN0yxeofn07PvJOfY7NeASCFeLbS5RnctEGypLDpxJUmpYlkhwfzOlSsk1mEijaGYmOptwUDMSZMQozonKjU4P0ahZNebIriEnqmIVz-lEgu-nucwzk-a51FwZTSdj9LGfGbF2CTmEdWRgIkWPmgCwxOkWqTGaOpCHwh7ih4UB2eHCVhzK2dVvoELG6H0_-wLeQPtbRTZm1W1skByo6jhJsjHCg1j8vXMgZUJvn_H6H8u_Qbvuk7Y9jtGovenMW-BErXrnpf0PlMcMfQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Network+Clustering+Algorithm+for+Sybil-Attack+Resisting&rft.jtitle=IEICE+transactions+on+information+and+systems&rft.au=XU%2C+Ling&rft.au=EGAWA%2C+Ryusuke&rft.au=TAKIZAWA%2C+Hiroyuki&rft.au=KOBAYASHI%2C+Hiroaki&rft.date=2011&rft.issn=0916-8532&rft.eissn=1745-1361&rft.volume=E94-D&rft.issue=12&rft.spage=2345&rft.epage=2352&rft_id=info:doi/10.1587%2Ftransinf.E94.D.2345&rft.externalDBID=n%2Fa&rft.externalDocID=10_1587_transinf_E94_D_2345
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0916-8532&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0916-8532&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0916-8532&client=summon