SybilTrap: A graph‐based semi‐supervised Sybil defense scheme for online social networks

Sybil attacks are increasingly prevalent in online social networks. A malicious user can generate a huge number of fake accounts to produce spam, impersonate other users, commit fraud, and reach many legitimate users. For security reasons, such fake accounts have to be detected and deactivated immediately. Various defense schemes have been proposed to deal with fake accounts. However, most identify fake accounts using only the structure of social graphs, leading to poor performance. In this paper, we propose a new and scalable defense scheme, SybilTrap. SybilTrap uses a semi‐supervised technique that automatically integrates the underlying features of user activities with the social structure into one system. Unlike other machine learning–based approaches, the proposed defense scheme works on unlabeled data, and it is effective in detecting targeted attacks, because it manipulates different levels of features of user profiles. We evaluate SybilTrap on a dataset collected from Twitter. We show that our proposed scheme is able to accurately detect Sybil nodes as well as huge conspiracies among them.

[1]  Yazan Boshmaf,et al.  A Quick Survey of Social Network-based Sybil Defenses , 2012 .

[2]  Muhammad Al-Qurishi,et al.  Reputation‐based credibility analysis of Twitter social network users , 2017, Concurr. Comput. Pract. Exp..

[3]  Aziz Mohaisen,et al.  Measuring the mixing time of social graphs , 2010, IMC '10.

[4]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[5]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[6]  Lakshminarayanan Subramanian,et al.  Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.

[7]  Konstantin Beznosov,et al.  Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs , 2016, Comput. Secur..

[8]  Peng Gao,et al.  SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection , 2015, ArXiv.

[9]  Xiao Wang,et al.  Understanding Sybil Groups in the Wild , 2015, Journal of Computer Science and Technology.

[10]  M. Shamim Hossain,et al.  Relational User Attribute Inference in Social Media , 2015, IEEE Transactions on Multimedia.

[11]  Zhuhua Cai,et al.  The Latent Community Model for Detecting Sybil Attacks in Social Networks , 2011 .

[12]  Xiao Wang,et al.  VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils , 2016, IEEE Transactions on Dependable and Secure Computing.

[13]  Muhammad Al-Qurishi,et al.  A novel prevention mechanism for Sybil attack in online social network , 2015, 2015 2nd World Symposium on Web Applications and Networking (WSWAN).

[14]  Chris Jermaine,et al.  The Latent Community Model for Detecting Sybils in Social Networks , 2012, NDSS.

[15]  Ben Y. Zhao,et al.  User interactions in social networks and their implications , 2009, EuroSys '09.

[16]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[17]  Krishna P. Gummadi,et al.  An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.

[18]  Guandong Xu,et al.  Intelligent Sybil Attack Detection on Abnormal Connectivity Behavior in Mobile Social Networks , 2015, KMO.

[19]  William G. Kennedy,et al.  Social Computing, Behavioral-Cultural Modeling and Prediction , 2013, Lecture Notes in Computer Science.

[20]  M. Shamim Hossain,et al.  A Location-Based Mobile Crowdsensing Framework Supporting a Massive Ad Hoc Social Network Environment , 2017, IEEE Communications Magazine.

[21]  Aziz Mohaisen,et al.  Keep your friends close: Incorporating trust into social network-based Sybil defenses , 2011, 2011 Proceedings IEEE INFOCOM.

[22]  Gang Wang,et al.  Northeastern University , 2021, IEEE Pulse.

[23]  Muhammad Al-Qurishi,et al.  Sybil Defense Techniques in Online Social Networks: A Survey , 2017, IEEE Access.

[24]  M. Shamim Hossain,et al.  Collaborative analysis model for trending images on social networks , 2017, Future Gener. Comput. Syst..

[25]  Jie Zhang,et al.  Improving Sybil Detection via Graph Pruning and Regularization Techniques , 2015, ACML.

[26]  Prateek Mittal,et al.  SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection , 2013, IEEE Transactions on Information Forensics and Security.

[27]  M. Shamim Hossain,et al.  Social Event Classification via Boosted Multimodal Supervised Latent Dirichlet Allocation , 2015, ACM Trans. Multim. Comput. Commun. Appl..

[28]  Silvio Lattanzi,et al.  SoK: The Evolution of Sybil Defense via Social Networks , 2013, 2013 IEEE Symposium on Security and Privacy.

[29]  Hossein Hamooni,et al.  Identifying Correlated Bots in Twitter , 2016, SocInfo.

[30]  Gang Wang,et al.  Social Turing Tests: Crowdsourcing Sybil Detection , 2012, NDSS.

[31]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[32]  Yu Wang,et al.  Statistical Features-Based Real-Time Detection of Drifted Twitter Spam , 2017, IEEE Transactions on Information Forensics and Security.

[33]  Prateek Mittal,et al.  SybilControl: practical sybil defense with computational puzzles , 2012, STC '12.

[34]  Muhammad Al-Qurishi,et al.  A Credibility Analysis System for Assessing Information on Twitter , 2018, IEEE Transactions on Dependable and Secure Computing.

[35]  Krishna P. Gummadi,et al.  Ostra: Leveraging Trust to Thwart Unwanted Communication , 2008, NSDI.

[36]  Krishna P. Gummadi,et al.  Canal: scaling social network-based Sybil tolerance schemes , 2012, EuroSys '12.

[37]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[38]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[39]  Satyajayant Misra,et al.  SybilExposer: An effective scheme to detect Sybil communities in online social networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[40]  Konstantin Beznosov,et al.  Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs , 2015, NDSS.

[41]  Xiaowei Yang,et al.  SybilFence: Improving Social-Graph-Based Sybil Defenses with User Negative Feedback , 2013, ArXiv.

[42]  Fengyuan Xu,et al.  SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[43]  Silvio Lattanzi,et al.  Communities, Random Walks, and Social Sybil Defense , 2014, Internet Math..