The evaluation of links amongst the users of a social network is one of the most common and convenient method to detect mechanisms. \textbf{Social-Graph} based techniques majorly make use of these links to detect Sybils in the network. A social-graph like its name suggests is a graph of all the users and the relationships among themselves in the given social network. The social graph used in Sybil-detection mechanism tries to analyze the network in a different aspect than the regular graph. The social-graph based techniques consider all the users of the network as the \textbf{nodes} in the graph and the users which can be trusted are called the \textbf{honest nodes}. \textbf{Sybil nodes} are the nodes that are or can be a potential threat …show more content…
\cite{Gen3}
Social-graph based techniques represent the graph as \textbf{G=(V,E)} where G represents the graph, V represents the nodes in the graph and E represents the edges of the graph.\cite{gen5graph} The social- graph based mechanisms first divides the node set V into two disjoint sets- one which are real users and the second set which consists of likely Sybil users. The Sybil set consists of all the Sybil nodes and the edges between them and the non-Sybil region consists of the non-Sybil nodes and all the connections between the real nodes. It is assumed that the non-Sybil region of the network is tightly connected and has dense connections among its nodes as they trust each other. Hence the time taken to form connections between nodes, also called the mixing time of the region, is very small when compared with time taken to mix with the Sybil region.\cite{gen5graph} For example, the probability that a real user accepts a friend request from another real user in Facebook is much higher than the probability of the request being accepted from an unknown or fake user. Thus Sybil accounts find it difficult to build connections with the real user. This results in limited number of edges between the nodes in non-Sybil and the Sybil region. These edges are also called attack edges.
\textbf{Different detection mechanisms:}
SybilGuard was one of the first techniques to be developed for
In the article, "The Ultimate Social Network," Jennifer Ackerman presented data to challenge the first thoughts that people are independent, depending just on the human body to control interior capacities. She stated that the adjustments in the human microbiome are contributing to higher rates of obesity and autoimmune system disorders, prompting it to address regardless of whether we are in charge of our own body.
Social Networking in a more analytical context is defined as a community of network members which are technically called Nodes. Nodes most commonly differentiate as persons or organisations; if a singular unit can be connected this can be identified as a node. The connections of nodes are usually made based on relations of common interest. Network analysts study the pattern of attraction towards masses of nodes that are connected and this is the structure of how a social network is formed (Scott, Carrington 2011, pp. 11-12).
First test was performed in order to calculate the recognition percentage of malicious nodes which we saw high performance of our suggested method than other methods. In this test , we increased the number of Sybil peers from 10 to 40 percent and obtained the recognition rate of Sybil attackers through simulation. Based on this test, as the number of Sybil peers increases , false alarm rate will increase and the rate of Sybil attacker detection will decrease.
The text is written by Elizabeth Cohen. The text is about how people use more time on Facebook than on social activities. Newton has a daughter on 12 years old. Newton cannot help her daughter with the homework, because she spends too much time on Facebook. Another example is Paula Pile, who is a therapist. Paula has three clients with different Facebook issues. That conclude that Facebook leads people from the real world into the network world, because people enjoy more time on Facebook than in real life. Newton checks her Facebook-site many times in a day, for social updates about her friends, she checks Facebook everywhere at work and home. Facebook can give people a wrong
A Sybil attack is a type of security threat that claims multiple identities in a single node of a network. Most networks rely on baseline assumption that there is one to one correspondence between identity and an individual, where each computer represents one identity. A Sybil attack happens when an insecure computer is hijacked to claim multiple identities.
The roots of theoretical constructs of SNA in graph theory has led to the use of mathematical concepts being borrowed and built upon to suit its needs. As mentioned before, a graph is a collection of nodes, strung together by edges. Hence, to get from one node to the next, one needs to travel along the edges. The number of edges traversed to reach from one node to another forms the notion of distance in graphs. More specifically, the geodesic distance, d(u,v), between two nodes is defined as the length of the shortest path between them (Bouttier et al. 2003). The conceptualization of ‘distance’ as the number of intermediate edges between nodes, capture the way nodes are embedded in the network (Hanneman & Riddle 2005, p.77). In terms of a social systems, being friends with an important person is always beneficial, as it potentially makes you ‘closer’ to many people in the network [Needs explanation?]. In SNA, the edges connecting two vertices are usually un-weighted. However, in certain application scenarios, the edges may have weights associated with them to represent factors like strength of a tie, or probability of forming a tie, or in case of spatial social networks, the geographic distance between the nodes. The weights on the edges adds another layer to the conceptualization of distance, and the geodesic distance calculation then, needs to account for the weights of the edges. If there is no path connecting the two vertices, i.e., if they belong to different connected
The global financial crisis that started in mid-2008 affected many industries, including the aviation industry. Fewer business and leisure travelers were flying due to the economic recession. Corporations and government agencies issued orders, as part of an austerity drive, for less travel or, when absolutely necessary for their senior employees, for economy-class travel. This became an opportunity for
People are frequently influenced by the information provided to them. There is a need to analyze the relationships and ties between various such entities in various disciplines. Comprehending the relationships between entities forms the basis for Social Network Analysis. Social networks are graph structures which represent interactions amongst people or entities.
According to Nicholas Christakis, social networks are like the pairs of people connected. Through his studies, he realized that socially connected people get embedded in other sorts of relationships such as marriage, friendship, or even spousal. He discovered that these connections are vast, and all of us are embedded in the broader set of relationships with each other. Therefore, social networks are the complex things of beauty that are so elaborate, so sophisticated and so ubiquitous.
Hard Times is the tenth novel by Charles Dickens, The book appraises English society and is aimed at highlighting the social and economic pressures of the times. Hard Times is not a delicate book . has not usually been regarded as one of Dickens 's finest novels and It is also not a difficult book: Dickens wanted all his readers to catch his point exactly, and the moral theme of the novel is very explicitly articulated time and again. There are no hidden meanings in Hard Times, and the book is an interesting case of a great writer subordinating his art to a moral and social purpose. Even if it is not Dickens’s most popular novel, it is still an important expression of the values he thought were fundamental to human
ef{fig:LCC_attack} shows the topological resilience of Facebook social network and other complex networks from different network domains. The topological resilience of their corresponding
However, very little existing research has studied the relationship of people to information technology networks. This work plans to contribute to the body of research that exists about social engineering to try to define and understand the problem of social engineering so eventually solutions can exist that will increase the security of knowledge and eliminate the security hole people so often create.
In order to understand the structure of a complex social network, three random graph models have been used [10]. For an overall comparative study, the basic centrality measures, clustering coefficient, average path length, and the degree distribution were studied for the original network model as well as for the random graph models.
The assumption of knowing that someone is connected to someone you already know and trust can be one of the most basic reasons to create a new relationship or form new connections. Social networks act as bridges to people or groups who were once disconnected. These connections can be used to share information or opportunities.
Social networking sites are currently the most popular and most accessed websites on the internet. According to Boshmaf et al. these websites have attracted more than a billion active users [1]. This is almost a seventh of the world’s population and attackers want to exploit this for their own personal gains.