A Network Clustering Algorithm for Sybil-Attack Resisting
The social network model has been regarded as a promising mechanism to defend against Sybil attack. This model assumes that honest peers and Sybil peers are connected by only a small number of attack edges. Detection of the attack edges plays a key role in restraining the power of Sybil peers. In th...
Saved in:
| Published in | IEICE Transactions on Information and Systems Vol. E94.D; no. 12; pp. 2345 - 2352 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
The Institute of Electronics, Information and Communication Engineers
2011
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0916-8532 1745-1361 1745-1361 |
| DOI | 10.1587/transinf.E94.D.2345 |
Cover
| Abstract | The social network model has been regarded as a promising mechanism to defend against Sybil attack. This model assumes that honest peers and Sybil peers are connected by only a small number of attack edges. Detection of the attack edges plays a key role in restraining the power of Sybil peers. In this paper, an attack-resisting, distributed algorithm, named Random walk and Social network model-based clustering (RSC), is proposed to detect the attack edges. In RSC, peers disseminate random walk packets to each other. For each edge, the number of times that the packets pass this edge reflects the betweenness of this edge. RSC observes that the betweennesses of attack edges are higher than those of the non-attack edges. In this way, the attack edges can be identified. To show the effectiveness of RSC, RSC is integrated into an existing social network model-based algorithm called SOHL. The results of simulations with real world social network datasets show that RSC remarkably improves the performance of SOHL. |
|---|---|
| AbstractList | The social network model has been regarded as a promising mechanism to defend against Sybil attack. This model assumes that honest peers and Sybil peers are connected by only a small number of attack edges. Detection of the attack edges plays a key role in restraining the power of Sybil peers. In this paper, an attack-resisting, distributed algorithm, named Random walk and Social network model-based clustering (RSC), is proposed to detect the attack edges. In RSC, peers disseminate random walk packets to each other. For each edge, the number of times that the packets pass this edge reflects the betweenness of this edge. RSC observes that the betweennesses of attack edges are higher than those of the non-attack edges. In this way, the attack edges can be identified. To show the effectiveness of RSC, RSC is integrated into an existing social network model-based algorithm called SOHL. The results of simulations with real world social network datasets show that RSC remarkably improves the performance of SOHL. |
| Author | TAKIZAWA, Hiroyuki XU, Ling KOBAYASHI, Hiroaki EGAWA, Ryusuke |
| Author_xml | – sequence: 1 fullname: EGAWA, Ryusuke organization: Cyberscience Center, Tohoku University – sequence: 1 fullname: TAKIZAWA, Hiroyuki organization: Graduate School of Information Sciences, Tohoku University – sequence: 1 fullname: KOBAYASHI, Hiroaki organization: Cyberscience Center, Tohoku University – sequence: 1 fullname: XU, Ling organization: Graduate School of Information Sciences, Tohoku University |
| BookMark | eNp1kMtOwzAQRS0EEm3hC9hkySbBduLYXkZteUgFJB5ry0kmbVo3Kbarqn9PqtAiIbGaWZwzV3eG6LxpG0DohuCIMMHvvNWNq5sqmsokmkQ0TtgZGhCesJDEKTlHAyxJGgoW00s0dG6JMRGUsAGSWfACftfaVTA2W-fB1s08yMy8tbVfrIOqtcH7Pq9NmHmvi1XwBq52voOu0EWljYPrnzlCn_fTj_FjOHt9eBpns7BgJPFhIigvhaYlMF1IQplmDFJOtYg5z_NCy5ISCjnjgEuOJcexToFBLmWSCyjjEUr6u9tmo_c7bYza2Hqt7V4RrA711bG-ApmoUh3qd9ptr21s-7UF59W6dgUYoxtot65zCRaCUMo7NO7RwrbOWaj-D-j-qybHgOfeWjqv53BytPV1YeCvQ-jvcvBPXLHQVkETfwOCB43K |
| Cites_doi | 10.1007/3-540-45748-8_24 10.1109/SP.2008.13 10.1145/1151659.1159945 10.1145/1435497.1435501 10.1016/j.socnet.2004.11.009 10.1007/11555827_18 10.1145/1851275.1851226 |
| ContentType | Journal Article |
| Copyright | 2011 The Institute of Electronics, Information and Communication Engineers |
| Copyright_xml | – notice: 2011 The Institute of Electronics, Information and Communication Engineers |
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D ADTOC UNPAY |
| DOI | 10.1587/transinf.E94.D.2345 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1745-1361 |
| EndPage | 2352 |
| ExternalDocumentID | 10.1587/transinf.e94.d.2345 10_1587_transinf_E94_D_2345 article_transinf_E94_D_12_E94_D_12_2345_article_char_en |
| GroupedDBID | -~X 5GY ABJNI ABZEH ACGFS ADNWM AENEX ALMA_UNASSIGNED_HOLDINGS CS3 DU5 EBS EJD F5P ICE JSF JSH KQ8 OK1 P2P RJT RZJ TN5 ZKX 1TH AAYXX AFFNX C1A CITATION CKLRP H13 RYL VOH ZE2 ZY4 7SC 8FD JQ2 L7M L~C L~D ADTOC UNPAY |
| ID | FETCH-LOGICAL-c514t-4827d8a2de5ac9125a55e672a8377bbca9d212eb57e0d709703a6e5eb994b8ed3 |
| IEDL.DBID | UNPAY |
| ISSN | 0916-8532 1745-1361 |
| IngestDate | Tue Aug 19 16:43:40 EDT 2025 Thu Oct 02 10:33:54 EDT 2025 Wed Oct 01 03:07:52 EDT 2025 Wed Sep 03 06:22:11 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 12 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c514t-4827d8a2de5ac9125a55e672a8377bbca9d212eb57e0d709703a6e5eb994b8ed3 |
| Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://www.jstage.jst.go.jp/article/transinf/E94.D/12/E94.D_12_2345/_pdf |
| PQID | 1010881227 |
| PQPubID | 23500 |
| PageCount | 8 |
| ParticipantIDs | unpaywall_primary_10_1587_transinf_e94_d_2345 proquest_miscellaneous_1010881227 crossref_primary_10_1587_transinf_E94_D_2345 jstage_primary_article_transinf_E94_D_12_E94_D_12_2345_article_char_en |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2011-00-00 |
| PublicationDateYYYYMMDD | 2011-01-01 |
| PublicationDate_xml | – year: 2011 text: 2011-00-00 |
| PublicationDecade | 2010 |
| PublicationTitle | IEICE Transactions on Information and Systems |
| PublicationTitleAlternate | IEICE Trans. Inf. & Syst. |
| PublicationYear | 2011 |
| Publisher | The Institute of Electronics, Information and Communication Engineers |
| Publisher_xml | – name: The Institute of Electronics, Information and Communication Engineers |
| References | [10] http://arxiv.org/archive/hep-th [1] J. Douceur, “The sybil attack,” Peer-to-Peer Systems, pp.251-260, 2002. [8] M. Newman, “A measure of betweenness centrality based on random walks,” Social Networks, vol.27, no.1, pp.39-54, 2005. [4] C. Lesniewski-Laas, “A sybil-proof one-hop DHT,” Proc. 1st Workshop on Social Network Systems, SocialNets'08, pp.19-24, New York, NY, USA, 2008. [6] H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, “SybilGuard: Defending against sybil attacks via social networks,” SIGCOMM Comput. Commun. Rev., vol.36, pp.267-278, 2006. [11] http://snap.stanford.edu/data [5] G. Danezis, C. Lesniewski-Laas, M. Kaashoek, and R. Anderson, “Sybil-resistant DHT routing,” Lect. Notes Comput. Sci., pp.305-318, 2005. [9] Networkx. http://networkx.lanl.gov/contents.html [2] H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, “SybilLimit: A near-optimal social network defense against sybil attacks,” IEEE Symposium on Security and Privacy, pp.3-17, 2008. [7] C. Lesniewski-Laas and M.F. Kaashoek, “Whanau: A sybil-proof distributed hash table,” Symposium on Networked System Design and Implementation, San Jose, California, April 2010. [3] B. Viswanath, A. Post, K.P. Gummadi, and A. Mislove, “An analysis of social network-based sybil defenses,” SIGCOMM Comput. Commun. Rev., vol.40, pp.363-374, Aug. 2010. [12] H. Yu, P.B. Gibbons, M. Kaminsky, and F. Xiao, “SybilLimit: A near-optimal social network defense against sybilattacks,” Tech. Rep. TRA2/08, National Univ. of Singapore, School of Computing, March 2008. http://www.comp.nus.edu.sg/~yuhf/sybillimit-tr.pdf, 2008. VISWANATH BIMAL (3) 2010; 40 11 1 12 2 4 5 6 7 8 9 10 |
| References_xml | – reference: [4] C. Lesniewski-Laas, “A sybil-proof one-hop DHT,” Proc. 1st Workshop on Social Network Systems, SocialNets'08, pp.19-24, New York, NY, USA, 2008. – reference: [3] B. Viswanath, A. Post, K.P. Gummadi, and A. Mislove, “An analysis of social network-based sybil defenses,” SIGCOMM Comput. Commun. Rev., vol.40, pp.363-374, Aug. 2010. – reference: [1] J. Douceur, “The sybil attack,” Peer-to-Peer Systems, pp.251-260, 2002. – reference: [6] H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, “SybilGuard: Defending against sybil attacks via social networks,” SIGCOMM Comput. Commun. Rev., vol.36, pp.267-278, 2006. – reference: [7] C. Lesniewski-Laas and M.F. Kaashoek, “Whanau: A sybil-proof distributed hash table,” Symposium on Networked System Design and Implementation, San Jose, California, April 2010. – reference: [5] G. Danezis, C. Lesniewski-Laas, M. Kaashoek, and R. Anderson, “Sybil-resistant DHT routing,” Lect. Notes Comput. Sci., pp.305-318, 2005. – reference: [8] M. Newman, “A measure of betweenness centrality based on random walks,” Social Networks, vol.27, no.1, pp.39-54, 2005. – reference: [9] Networkx. http://networkx.lanl.gov/contents.html – reference: [10] http://arxiv.org/archive/hep-th – reference: [12] H. Yu, P.B. Gibbons, M. Kaminsky, and F. Xiao, “SybilLimit: A near-optimal social network defense against sybilattacks,” Tech. Rep. TRA2/08, National Univ. of Singapore, School of Computing, March 2008. http://www.comp.nus.edu.sg/~yuhf/sybillimit-tr.pdf, 2008. – reference: [2] H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, “SybilLimit: A near-optimal social network defense against sybil attacks,” IEEE Symposium on Security and Privacy, pp.3-17, 2008. – reference: [11] http://snap.stanford.edu/data – ident: 1 doi: 10.1007/3-540-45748-8_24 – ident: 2 doi: 10.1109/SP.2008.13 – ident: 6 doi: 10.1145/1151659.1159945 – ident: 4 doi: 10.1145/1435497.1435501 – ident: 8 doi: 10.1016/j.socnet.2004.11.009 – ident: 12 – ident: 11 – ident: 9 – ident: 7 – ident: 5 doi: 10.1007/11555827_18 – ident: 10 – volume: 40 start-page: 363 issn: 0146-4833 issue: 4 year: 2010 ident: 3 doi: 10.1145/1851275.1851226 |
| SSID | ssj0018215 ssib036429076 ssib036429077 |
| Score | 1.8487763 |
| Snippet | The social network model has been regarded as a promising mechanism to defend against Sybil attack. This model assumes that honest peers and Sybil peers are... |
| SourceID | unpaywall proquest crossref jstage |
| SourceType | Open Access Repository Aggregation Database Index Database Publisher |
| StartPage | 2345 |
| SubjectTerms | Algorithms attack edge Clustering Computer simulation Constraining Networks Performance enhancement Random walk social network Social networks sybil attack |
| Title | A Network Clustering Algorithm for Sybil-Attack Resisting |
| URI | https://www.jstage.jst.go.jp/article/transinf/E94.D/12/E94.D_12_2345/_article/-char/en https://www.proquest.com/docview/1010881227 https://www.jstage.jst.go.jp/article/transinf/E94.D/12/E94.D_12_2345/_pdf |
| UnpaywallVersion | publishedVersion |
| Volume | E94.D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| ispartofPNX | IEICE Transactions on Information and Systems, 2011/12/01, Vol.E94.D(12), pp.2345-2352 |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1745-1361 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0018215 issn: 0916-8532 databaseCode: KQ8 dateStart: 20080101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3da9swED_WdLDtYd26jWYfxYM9Tnb8IVt6NG1D2VjYV6B7EpIlZ01dJzQ2o_vrd4ps0xb2MBgYbIwkSz-d735nn04A75AiGJqqEt0SnpKkZAlhZZKQuCyz0qQxWl3rKH6apafz5MMZPetSCm26sMol8qKFsSd_sfKX66ADMWis-kbggxOe-MdBGLkLEUYiihMaiLUud2A3pUjLR7A7n33Of2xz7YUpQbMUucWRlIRxGnYZiCjLhmZ9g61p3zZ1y0rddx26xUEftPVaXv-SVXXDHE33YNkPxEWhXPhto_zi950cj_9lpE_gcUdavdxVewr3TL0Pe_2GEF6nH_bh0Y3shs-A597MBZl7R1VrEzLgbS-vFqur8-bnpYd02ft2rc4rkjeNLC68r2ZjNU69eA7z6cn3o1PS7dRACiRcDbG5RDWTkTZUFhw5k6TUpFkk0f3NlCok12gijaKZmehswlHNSJQRozhPFDM6fgGjelWbA7uGPFFlWnJGJxJ9P80ly0zMmNRcGU0nY3jfz4xYu4QcwjoyOJGiR00gWOJ4i9QYpg7koXAH8d3CiOxwYSsO5ezqN1QhY3jbz77AN9D-VpG1WbUbGySHqjqMomwMZBCLv3cOpUzo7TNe_mP5V_DQfdK2x2sYNVeteYOcqFGHsPPxCzvsZP4P37gNcg |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3ha9QwFA96E5wfNp2OnU6p4EfTXtskbT6WbccQPEQ9mJ9C0qTnbl3v2LXI_Ot9uaRlG_hBEAotJUmTX17f-7325QWhD0ARDGWqAreEM0yqnOC8IgSnVZVVhqVgda2j-HnGzufk0wW98CmFNj6scgm8aGHsKVyswuU68iBGrVXfAHx0xkl4GsWJuxBxIpKU0EisdfUY7TAKtHyEduazL8WPba69mGEwS4lbHElxnLLYZyCieTY0GxpoTYe2qXtW6onr0D0O-rRr1vL2l6zrO-Zouo-W_UBcFMpV2LUqLH8_yPH4X0b6HO150hoUrtoL9Mg0B2i_3xAi8PrhAD27k93wJeJFMHNB5sFJ3dmEDHA7KOrF6uay_XkdAF0Ovt2qyxoXbSvLq-Cr2ViN0yxeofn07PvJOfY7NeASCFeLbS5RnctEGypLDpxJUmpYlkhwfzOlSsk1mEijaGYmOptwUDMSZMQozonKjU4P0ahZNebIriEnqmIVz-lEgu-nucwzk-a51FwZTSdj9LGfGbF2CTmEdWRgIkWPmgCwxOkWqTGaOpCHwh7ih4UB2eHCVhzK2dVvoELG6H0_-wLeQPtbRTZm1W1skByo6jhJsjHCg1j8vXMgZUJvn_H6H8u_Qbvuk7Y9jtGovenMW-BErXrnpf0PlMcMfQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Network+Clustering+Algorithm+for+Sybil-Attack+Resisting&rft.jtitle=IEICE+transactions+on+information+and+systems&rft.au=XU%2C+Ling&rft.au=EGAWA%2C+Ryusuke&rft.au=TAKIZAWA%2C+Hiroyuki&rft.au=KOBAYASHI%2C+Hiroaki&rft.date=2011&rft.issn=0916-8532&rft.eissn=1745-1361&rft.volume=E94-D&rft.issue=12&rft.spage=2345&rft.epage=2352&rft_id=info:doi/10.1587%2Ftransinf.E94.D.2345&rft.externalDBID=n%2Fa&rft.externalDocID=10_1587_transinf_E94_D_2345 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0916-8532&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0916-8532&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0916-8532&client=summon |