preview

The evaluation of links amongst the users of a social network is one of the most common and

Better Essays

The evaluation of links amongst the users of a social network is one of the most common and convenient method to detect mechanisms. \textbf{Social-Graph} based techniques majorly make use of these links to detect Sybils in the network. A social-graph like its name suggests is a graph of all the users and the relationships among themselves in the given social network. The social graph used in Sybil-detection mechanism tries to analyze the network in a different aspect than the regular graph. The social-graph based techniques consider all the users of the network as the \textbf{nodes} in the graph and the users which can be trusted are called the \textbf{honest nodes}. \textbf{Sybil nodes} are the nodes that are or can be a potential threat …show more content…

\cite{Gen3}
Social-graph based techniques represent the graph as \textbf{G=(V,E)} where G represents the graph, V represents the nodes in the graph and E represents the edges of the graph.\cite{gen5graph} The social- graph based mechanisms first divides the node set V into two disjoint sets- one which are real users and the second set which consists of likely Sybil users. The Sybil set consists of all the Sybil nodes and the edges between them and the non-Sybil region consists of the non-Sybil nodes and all the connections between the real nodes. It is assumed that the non-Sybil region of the network is tightly connected and has dense connections among its nodes as they trust each other. Hence the time taken to form connections between nodes, also called the mixing time of the region, is very small when compared with time taken to mix with the Sybil region.\cite{gen5graph} For example, the probability that a real user accepts a friend request from another real user in Facebook is much higher than the probability of the request being accepted from an unknown or fake user. Thus Sybil accounts find it difficult to build connections with the real user. This results in limited number of edges between the nodes in non-Sybil and the Sybil region. These edges are also called attack edges.
\textbf{Different detection mechanisms:}
SybilGuard was one of the first techniques to be developed for

Get Access