期刊文献+

社交网络中的Sybil攻击检测方案研究

Study on Sybil attack detection scheme in social network
下载PDF
导出
摘要 社交网络中的Sybil攻击行为已经变得越来越难以识别,因此如何有效的检测社交网络中的Sybil攻击行为,进而设计相应的防御方案来避免网络遭受攻击,已经成为当下网络安全领域研究的热点.相应的Sybil攻击检测技术也在不断的研究中得到发展和完善.文章对近年来Sybil攻击识别技术的研究动态和最新进展进行了综述,对其使用的检测方法和评价指标进行了分析比较,并对社交网络中的Sybil识别技术的发展趋势和应用前景进行了预测. The Sybil attack in social network has become more and more difficult to detect,so it has been a hot spot of current network security to detect Sybil attack in social network effectively and design the corresponding defense scheme to avoid network attack.The corresponding Sybil attack detection technology has also been developed and improved in the following researches.This paper has been review the research trends and the latest progress of Sybil attack identification technology in recent years,analyzes the detection methods and compares the evaluation indicators,then the development trend and application prospect of Sybil attack detect technology in social network are predicted.
作者 樊卫昌 Fan Weichang(Nanjing University of Posts and Telecommunications,School of communication and information engineering,Naiying,210003)
机构地区 南京邮电大学
出处 《信息通信》 2020年第2期22-23,27,共3页 Information & Communications
基金 国家“十三五”预研基金项目(31513010202) 中国航空工业集团公司创新基金(2010BD63111)。
关键词 Sybil攻击识别技术 图论 监督学习 半监督学习 无监督学习 Sybil attack detect technology graph theory supervised learning semi-supervised learning unsupervised learning
  • 相关文献

参考文献5

二级参考文献22

  • 1赵卓翔,王轶彤,田家堂,周泽学.社会网络中基于标签传播的社区发现新算法[J].计算机研究与发展,2011,48(S3):8-15. 被引量:37
  • 2Le Zhang,Jingbo Zhu,Tianshun Yao.An evaluation of statistical spam filtering techniques[J].ACM Transactions on Asian Language Information Processing (TALIP).2004(4)
  • 3Chu Z,Gianvecchio S,Wang H.Who is Tweeting on Twitter: Human, Bot,or Cyborg. Proceedings of the26th Annual Computer SecurityApplications Conference . 2010
  • 4Kyumin Lee,Brian David Eoff,James Caverlee.Seven months with the devils: Along-term study of content polluters on twitter. AAAI Int’’l Conference on Weblogsand Social Media (ICWSM) . 2011
  • 5C. Grier,K. Thomas,V. Paxson, et al.@spam: the underground on140characters or less. ACM conference on Computer and communications security . 2010
  • 6Fabricio Benevenuto,Tiago Rodrigues,Meeyoung Cha,Virgilio Almeida.Characterizing User Behaviorin Online Social Networks. IMC’’09 . 2009
  • 7Yang C,Harkreader R C,Gu G.Die free or live hard? empirical evaluation and newdesign for fighting evolving twitter spammers. Recent Advances in IntrusionDetection . 2011
  • 8Gao H,Chen Y,Lee K,et al.Towards online spam filtering in social networks. Symposium on Network and Distributed System Security (NDSS) . 2012
  • 9Sangho Lee,Jong Kim.WARNING BIRD:Detecting Suspicious URLs in Twitter Stream. Network & Distributed System Security (NDSS) . 2012
  • 10Song J,Lee S,Kim J.Spam filtering in twitter using senderreceiver relationship. Recent Advances in Intrusion Detection . 2011

共引文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部