Loading…

Sybil Defense Techniques in Online Social Networks: A Survey

The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profi...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access 2017, Vol.5, p.1200-1219
Main Authors: Al-Qurishi, Muhammad, Al-Rakhami, Mabrook, Alamri, Atif, Alrubaian, Majed, Rahman, Sk Md Mizanur, Hossain, M. Shamim
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3
cites cdi_FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3
container_end_page 1219
container_issue
container_start_page 1200
container_title IEEE access
container_volume 5
creator Al-Qurishi, Muhammad
Al-Rakhami, Mabrook
Alamri, Atif
Alrubaian, Majed
Rahman, Sk Md Mizanur
Hossain, M. Shamim
description The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging, because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this paper, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks.
doi_str_mv 10.1109/ACCESS.2017.2656635
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2017_2656635</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7828091</ieee_id><doaj_id>oai_doaj_org_article_c737e87cf14147279b516ca3a1dd52cd</doaj_id><sourcerecordid>2455934855</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3</originalsourceid><addsrcrecordid>eNpNUMtOwzAQjBBIVKVfwCUS5xa_H4hLFV6VKjgEzpZjr8ElJMVpQf17UlIh9rKr0c7M7mTZOUYzjJG-nBfFbVnOCMJyRgQXgvKjbESw0FPKqTj-N59mk65bob5UD3E5yq7LXRXr_AYCNB3kz-Demvi5hS6PTf7U1LGBvGxdtHX-CJvvNr13V_k8L7fpC3Zn2UmwdQeTQx9nL3e3z8XDdPl0vyjmy6ljSG2mleQaVTogG4BpgYILFXJMMmcppZUAYEJpioLCANYRC95XXntNKu4VAB1ni0HXt3Zl1il-2LQzrY3mF2jTq7FpE10NxkkqQUkXMMNMEqkrjkXvY7H3nDjfa10MWuvU7v_cmFW7TU1_viGMc02Z4rzfosOWS23XJQh_rhiZfepmSN3sUzeH1HvW-cCKAPDHkIoopDH9AfrUfVs</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455934855</pqid></control><display><type>article</type><title>Sybil Defense Techniques in Online Social Networks: A Survey</title><source>IEEE Xplore Open Access Journals</source><creator>Al-Qurishi, Muhammad ; Al-Rakhami, Mabrook ; Alamri, Atif ; Alrubaian, Majed ; Rahman, Sk Md Mizanur ; Hossain, M. Shamim</creator><creatorcontrib>Al-Qurishi, Muhammad ; Al-Rakhami, Mabrook ; Alamri, Atif ; Alrubaian, Majed ; Rahman, Sk Md Mizanur ; Hossain, M. Shamim</creatorcontrib><description>The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging, because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this paper, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2017.2656635</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Browsing ; Context modeling ; Cybersecurity ; Deactivation ; Facebook ; Fraud ; Google ; Online services ; Online social networks ; Recommender systems ; Security systems ; Social network services ; Social networks ; Sybil attack and defense ; Sybil impact ; Taxonomy ; Trustworthiness ; Twitter ; YouTube</subject><ispartof>IEEE access, 2017, Vol.5, p.1200-1219</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3</citedby><cites>FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3</cites><orcidid>0000-0001-5906-9422</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7828091$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4022,27632,27922,27923,27924,54932</link.rule.ids></links><search><creatorcontrib>Al-Qurishi, Muhammad</creatorcontrib><creatorcontrib>Al-Rakhami, Mabrook</creatorcontrib><creatorcontrib>Alamri, Atif</creatorcontrib><creatorcontrib>Alrubaian, Majed</creatorcontrib><creatorcontrib>Rahman, Sk Md Mizanur</creatorcontrib><creatorcontrib>Hossain, M. Shamim</creatorcontrib><title>Sybil Defense Techniques in Online Social Networks: A Survey</title><title>IEEE access</title><addtitle>Access</addtitle><description>The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging, because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this paper, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks.</description><subject>Browsing</subject><subject>Context modeling</subject><subject>Cybersecurity</subject><subject>Deactivation</subject><subject>Facebook</subject><subject>Fraud</subject><subject>Google</subject><subject>Online services</subject><subject>Online social networks</subject><subject>Recommender systems</subject><subject>Security systems</subject><subject>Social network services</subject><subject>Social networks</subject><subject>Sybil attack and defense</subject><subject>Sybil impact</subject><subject>Taxonomy</subject><subject>Trustworthiness</subject><subject>Twitter</subject><subject>YouTube</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNUMtOwzAQjBBIVKVfwCUS5xa_H4hLFV6VKjgEzpZjr8ElJMVpQf17UlIh9rKr0c7M7mTZOUYzjJG-nBfFbVnOCMJyRgQXgvKjbESw0FPKqTj-N59mk65bob5UD3E5yq7LXRXr_AYCNB3kz-Demvi5hS6PTf7U1LGBvGxdtHX-CJvvNr13V_k8L7fpC3Zn2UmwdQeTQx9nL3e3z8XDdPl0vyjmy6ljSG2mleQaVTogG4BpgYILFXJMMmcppZUAYEJpioLCANYRC95XXntNKu4VAB1ni0HXt3Zl1il-2LQzrY3mF2jTq7FpE10NxkkqQUkXMMNMEqkrjkXvY7H3nDjfa10MWuvU7v_cmFW7TU1_viGMc02Z4rzfosOWS23XJQh_rhiZfepmSN3sUzeH1HvW-cCKAPDHkIoopDH9AfrUfVs</recordid><startdate>2017</startdate><enddate>2017</enddate><creator>Al-Qurishi, Muhammad</creator><creator>Al-Rakhami, Mabrook</creator><creator>Alamri, Atif</creator><creator>Alrubaian, Majed</creator><creator>Rahman, Sk Md Mizanur</creator><creator>Hossain, M. Shamim</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-5906-9422</orcidid></search><sort><creationdate>2017</creationdate><title>Sybil Defense Techniques in Online Social Networks: A Survey</title><author>Al-Qurishi, Muhammad ; Al-Rakhami, Mabrook ; Alamri, Atif ; Alrubaian, Majed ; Rahman, Sk Md Mizanur ; Hossain, M. Shamim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Browsing</topic><topic>Context modeling</topic><topic>Cybersecurity</topic><topic>Deactivation</topic><topic>Facebook</topic><topic>Fraud</topic><topic>Google</topic><topic>Online services</topic><topic>Online social networks</topic><topic>Recommender systems</topic><topic>Security systems</topic><topic>Social network services</topic><topic>Social networks</topic><topic>Sybil attack and defense</topic><topic>Sybil impact</topic><topic>Taxonomy</topic><topic>Trustworthiness</topic><topic>Twitter</topic><topic>YouTube</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Al-Qurishi, Muhammad</creatorcontrib><creatorcontrib>Al-Rakhami, Mabrook</creatorcontrib><creatorcontrib>Alamri, Atif</creatorcontrib><creatorcontrib>Alrubaian, Majed</creatorcontrib><creatorcontrib>Rahman, Sk Md Mizanur</creatorcontrib><creatorcontrib>Hossain, M. Shamim</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al-Qurishi, Muhammad</au><au>Al-Rakhami, Mabrook</au><au>Alamri, Atif</au><au>Alrubaian, Majed</au><au>Rahman, Sk Md Mizanur</au><au>Hossain, M. Shamim</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Sybil Defense Techniques in Online Social Networks: A Survey</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2017</date><risdate>2017</risdate><volume>5</volume><spage>1200</spage><epage>1219</epage><pages>1200-1219</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online. For example, this problem can affect content publishing, creation of friendships, messaging, profile browsing, and commenting. Moreover, fake identities are often created to disseminate spam, use the private information of other users, commit fraud, and so on. A malicious person can generate numerous fake accounts for these purposes to reach a large number of trustworthy users. Thus, these types of malicious accounts must be detected and deactivated as quickly as possible. However, this objective is challenging, because a fake account can exhibit trustworthy behaviors and have a type of name that will prevent it from being detected by the security system. In this paper, we provide a comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types. We first review existing Sybil attack definitions, including those in the context of online social networks. We then discuss a new taxonomy of Sybil attack defense schemes and methodologies. Finally, we compare the literature and identify areas for further research in Sybil attacks in online social networks.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2017.2656635</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0001-5906-9422</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2017, Vol.5, p.1200-1219
issn 2169-3536
2169-3536
language eng
recordid cdi_crossref_primary_10_1109_ACCESS_2017_2656635
source IEEE Xplore Open Access Journals
subjects Browsing
Context modeling
Cybersecurity
Deactivation
Facebook
Fraud
Google
Online services
Online social networks
Recommender systems
Security systems
Social network services
Social networks
Sybil attack and defense
Sybil impact
Taxonomy
Trustworthiness
Twitter
YouTube
title Sybil Defense Techniques in Online Social Networks: A Survey
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T12%3A35%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Sybil%20Defense%20Techniques%20in%20Online%20Social%20Networks:%20A%20Survey&rft.jtitle=IEEE%20access&rft.au=Al-Qurishi,%20Muhammad&rft.date=2017&rft.volume=5&rft.spage=1200&rft.epage=1219&rft.pages=1200-1219&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2017.2656635&rft_dat=%3Cproquest_cross%3E2455934855%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c408t-b7590b9f0afe4960fcfb0c474ca333b6ee468930f81eeac2aeddbd9d92b5d8ee3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2455934855&rft_id=info:pmid/&rft_ieee_id=7828091&rfr_iscdi=true