Behaviors Analysis Based Sybil Detection in Social Networks

Wu Dapeng,Si Shushan,Yan Junjie,Wang Ruyan
DOI: https://doi.org/10.11999/JEIT170246
2017-01-01
Abstract:Sybil attackers can improve their own influence in social networks by creating a large number of illegal illusive identities then affect the social individuals' choice of relays and steal individuals' privacy, which seriously threatens the interests of social individuals. Based on the analysis of the Sybil's behaviors, a Sybil detection mechanism applied to social networks is proposed in this paper. The influence of nodes is calculated according to static similarity and dynamic similarity and then selecting the suspicious nodes based on the influence. Next, using the Hidden Markov Model (HMM) to infer the true identity of suspicious nodes by observing their abnormal behaviors, thus detecting the Sybil more precisely. Analysis results show that the proposed mechanism can effectively improve the recognition rate and reduce the false detection rate of the Sybil and thereby protecting the privacy and interests of social individuals better.
What problem does this paper attempt to address?