TY - GEN
T1 - Designs to account for trust in social network-based Sybil defenses
AU - Mohaisen, Abedelaziz
AU - Hopper, Nicholas
AU - Kim, Yongdae
PY - 2010
Y1 - 2010
N2 - Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs. The performance of these defenses depends on the quality of the algorithmic property and assuming a strong trust model in the underlying graph. While it is natural to think of trust value associated with the social graphs, Sybil defenses have used the social graphs without this consideration. In this paper we study paramagnetic designs to tune the performance of Sybil defenses by accounting for trust in social graphs and modeling the trust as modified random walks. Our designs are motivated by the observed relationship between the algorithmic property required for the defenses to perform well and a hypothesized trust value in the underlying graphs.
AB - Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs. The performance of these defenses depends on the quality of the algorithmic property and assuming a strong trust model in the underlying graph. While it is natural to think of trust value associated with the social graphs, Sybil defenses have used the social graphs without this consideration. In this paper we study paramagnetic designs to tune the performance of Sybil defenses by accounting for trust in social graphs and modeling the trust as modified random walks. Our designs are motivated by the observed relationship between the algorithmic property required for the defenses to perform well and a hypothesized trust value in the underlying graphs.
KW - Social networks
KW - Sybil attack
KW - Trust
UR - http://www.scopus.com/inward/record.url?scp=78650005953&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78650005953&partnerID=8YFLogxK
U2 - 10.1145/1866307.1866407
DO - 10.1145/1866307.1866407
M3 - Conference contribution
AN - SCOPUS:78650005953
SN - 9781450302449
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 714
EP - 716
BT - CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security
T2 - 17th ACM Conference on Computer and Communications Security, CCS'10
Y2 - 4 October 2010 through 8 October 2010
ER -