Loading…
Sybil Defense Techniques in Online Social Networks: A Survey
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profi...
Saved in:
Published in: | IEEE access 2017, Vol.5, p.1200-1219 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3 |
---|---|
cites | cdi_FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3 |
container_end_page | 1219 |
container_issue | |
container_start_page | 1200 |
container_title | IEEE access |
container_volume | 5 |
creator | Al-Qurishi, Muhammad Al-Rakhami, Mabrook Alamri, Atif Alrubaian, Majed Rahman, Sk Md Mizanur Hossain, M. Shamim |
description | The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging, because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this paper, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks. |
doi_str_mv | 10.1109/ACCESS.2017.2656635 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2017_2656635</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7828091</ieee_id><doaj_id>oai_doaj_org_article_c737e87cf14147279b516ca3a1dd52cd</doaj_id><sourcerecordid>2455934855</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3</originalsourceid><addsrcrecordid>eNpNUMtOwzAQjBBIVKVfwCUS5xa_H4hLFV6VKjgEzpZjr8ElJMVpQf17UlIh9rKr0c7M7mTZOUYzjJG-nBfFbVnOCMJyRgQXgvKjbESw0FPKqTj-N59mk65bob5UD3E5yq7LXRXr_AYCNB3kz-Demvi5hS6PTf7U1LGBvGxdtHX-CJvvNr13V_k8L7fpC3Zn2UmwdQeTQx9nL3e3z8XDdPl0vyjmy6ljSG2mleQaVTogG4BpgYILFXJMMmcppZUAYEJpioLCANYRC95XXntNKu4VAB1ni0HXt3Zl1il-2LQzrY3mF2jTq7FpE10NxkkqQUkXMMNMEqkrjkXvY7H3nDjfa10MWuvU7v_cmFW7TU1_viGMc02Z4rzfosOWS23XJQh_rhiZfepmSN3sUzeH1HvW-cCKAPDHkIoopDH9AfrUfVs</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455934855</pqid></control><display><type>article</type><title>Sybil Defense Techniques in Online Social Networks: A Survey</title><source>IEEE Xplore Open Access Journals</source><creator>Al-Qurishi, Muhammad ; Al-Rakhami, Mabrook ; Alamri, Atif ; Alrubaian, Majed ; Rahman, Sk Md Mizanur ; Hossain, M. Shamim</creator><creatorcontrib>Al-Qurishi, Muhammad ; Al-Rakhami, Mabrook ; Alamri, Atif ; Alrubaian, Majed ; Rahman, Sk Md Mizanur ; Hossain, M. Shamim</creatorcontrib><description>The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging, because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this paper, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2017.2656635</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Browsing ; Context modeling ; Cybersecurity ; Deactivation ; Facebook ; Fraud ; Google ; Online services ; Online social networks ; Recommender systems ; Security systems ; Social network services ; Social networks ; Sybil attack and defense ; Sybil impact ; Taxonomy ; Trustworthiness ; Twitter ; YouTube</subject><ispartof>IEEE access, 2017, Vol.5, p.1200-1219</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3</citedby><cites>FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3</cites><orcidid>0000-0001-5906-9422</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7828091$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4022,27632,27922,27923,27924,54932</link.rule.ids></links><search><creatorcontrib>Al-Qurishi, Muhammad</creatorcontrib><creatorcontrib>Al-Rakhami, Mabrook</creatorcontrib><creatorcontrib>Alamri, Atif</creatorcontrib><creatorcontrib>Alrubaian, Majed</creatorcontrib><creatorcontrib>Rahman, Sk Md Mizanur</creatorcontrib><creatorcontrib>Hossain, M. Shamim</creatorcontrib><title>Sybil Defense Techniques in Online Social Networks: A Survey</title><title>IEEE access</title><addtitle>Access</addtitle><description>The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging, because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this paper, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks.</description><subject>Browsing</subject><subject>Context modeling</subject><subject>Cybersecurity</subject><subject>Deactivation</subject><subject>Facebook</subject><subject>Fraud</subject><subject>Google</subject><subject>Online services</subject><subject>Online social networks</subject><subject>Recommender systems</subject><subject>Security systems</subject><subject>Social network services</subject><subject>Social networks</subject><subject>Sybil attack and defense</subject><subject>Sybil impact</subject><subject>Taxonomy</subject><subject>Trustworthiness</subject><subject>Twitter</subject><subject>YouTube</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNUMtOwzAQjBBIVKVfwCUS5xa_H4hLFV6VKjgEzpZjr8ElJMVpQf17UlIh9rKr0c7M7mTZOUYzjJG-nBfFbVnOCMJyRgQXgvKjbESw0FPKqTj-N59mk65bob5UD3E5yq7LXRXr_AYCNB3kz-Demvi5hS6PTf7U1LGBvGxdtHX-CJvvNr13V_k8L7fpC3Zn2UmwdQeTQx9nL3e3z8XDdPl0vyjmy6ljSG2mleQaVTogG4BpgYILFXJMMmcppZUAYEJpioLCANYRC95XXntNKu4VAB1ni0HXt3Zl1il-2LQzrY3mF2jTq7FpE10NxkkqQUkXMMNMEqkrjkXvY7H3nDjfa10MWuvU7v_cmFW7TU1_viGMc02Z4rzfosOWS23XJQh_rhiZfepmSN3sUzeH1HvW-cCKAPDHkIoopDH9AfrUfVs</recordid><startdate>2017</startdate><enddate>2017</enddate><creator>Al-Qurishi, Muhammad</creator><creator>Al-Rakhami, Mabrook</creator><creator>Alamri, Atif</creator><creator>Alrubaian, Majed</creator><creator>Rahman, Sk Md Mizanur</creator><creator>Hossain, M. Shamim</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-5906-9422</orcidid></search><sort><creationdate>2017</creationdate><title>Sybil Defense Techniques in Online Social Networks: A Survey</title><author>Al-Qurishi, Muhammad ; Al-Rakhami, Mabrook ; Alamri, Atif ; Alrubaian, Majed ; Rahman, Sk Md Mizanur ; Hossain, M. Shamim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Browsing</topic><topic>Context modeling</topic><topic>Cybersecurity</topic><topic>Deactivation</topic><topic>Facebook</topic><topic>Fraud</topic><topic>Google</topic><topic>Online services</topic><topic>Online social networks</topic><topic>Recommender systems</topic><topic>Security systems</topic><topic>Social network services</topic><topic>Social networks</topic><topic>Sybil attack and defense</topic><topic>Sybil impact</topic><topic>Taxonomy</topic><topic>Trustworthiness</topic><topic>Twitter</topic><topic>YouTube</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Al-Qurishi, Muhammad</creatorcontrib><creatorcontrib>Al-Rakhami, Mabrook</creatorcontrib><creatorcontrib>Alamri, Atif</creatorcontrib><creatorcontrib>Alrubaian, Majed</creatorcontrib><creatorcontrib>Rahman, Sk Md Mizanur</creatorcontrib><creatorcontrib>Hossain, M. Shamim</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al-Qurishi, Muhammad</au><au>Al-Rakhami, Mabrook</au><au>Alamri, Atif</au><au>Alrubaian, Majed</au><au>Rahman, Sk Md Mizanur</au><au>Hossain, M. Shamim</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Sybil Defense Techniques in Online Social Networks: A Survey</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2017</date><risdate>2017</risdate><volume>5</volume><spage>1200</spage><epage>1219</epage><pages>1200-1219</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging, because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this paper, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2017.2656635</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0001-5906-9422</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2017, Vol.5, p.1200-1219 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_crossref_primary_10_1109_ACCESS_2017_2656635 |
source | IEEE Xplore Open Access Journals |
subjects | Browsing Context modeling Cybersecurity Deactivation Fraud Online services Online social networks Recommender systems Security systems Social network services Social networks Sybil attack and defense Sybil impact Taxonomy Trustworthiness YouTube |
title | Sybil Defense Techniques in Online Social Networks: A Survey |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T12%3A35%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Sybil%20Defense%20Techniques%20in%20Online%20Social%20Networks:%20A%20Survey&rft.jtitle=IEEE%20access&rft.au=Al-Qurishi,%20Muhammad&rft.date=2017&rft.volume=5&rft.spage=1200&rft.epage=1219&rft.pages=1200-1219&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2017.2656635&rft_dat=%3Cproquest_cross%3E2455934855%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2455934855&rft_id=info:pmid/&rft_ieee_id=7828091&rfr_iscdi=true |