Sybil Attack Detection based on Group Clustering for Social Networks

碩士 === 國立成功大學 === 電腦與通信工程研究所 === 102 === Recently, social network has become more popular in the Internet. In some social network, such as eBay, Google+ ... etc, have a score mechanism that scores for a set of objects (e.g. service providers, services, goods or entities). We call that the reputation...

Full description

Bibliographic Details
Main Authors: Ming-YuHuang, 黃明鈺
Other Authors: Hui-Tang Lin
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/wz3ur3
id ndltd-TW-102NCKU5652080
record_format oai_dc
spelling ndltd-TW-102NCKU56520802019-05-15T21:42:46Z http://ndltd.ncl.edu.tw/handle/wz3ur3 Sybil Attack Detection based on Group Clustering for Social Networks 於社群網路運用分群機制以偵測女巫攻擊之研究與實作 Ming-YuHuang 黃明鈺 碩士 國立成功大學 電腦與通信工程研究所 102 Recently, social network has become more popular in the Internet. In some social network, such as eBay, Google+ ... etc, have a score mechanism that scores for a set of objects (e.g. service providers, services, goods or entities). We call that the reputation system. A malicious user use a lot of multiple virtual identity attempt to influence the operation of the trust system that called Sybil Attack. We also call these nodes which the malicious user created are Sybil Nodes. The thesis proposed the different approach to detect the Sybil Nodes in social network. The defense strategies developed by the relationship in the social network. We calculate the similarity as the relations strength between nodes by these relationships and clustering the all nodes. After the clustering, we identify the group by Spectral analysis. By using the method, we could identify the Sybil group in the social network, the detect Sybil Nodes rate is above 95 %. Hui-Tang Lin 林輝堂 2014 學位論文 ; thesis 46 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 電腦與通信工程研究所 === 102 === Recently, social network has become more popular in the Internet. In some social network, such as eBay, Google+ ... etc, have a score mechanism that scores for a set of objects (e.g. service providers, services, goods or entities). We call that the reputation system. A malicious user use a lot of multiple virtual identity attempt to influence the operation of the trust system that called Sybil Attack. We also call these nodes which the malicious user created are Sybil Nodes. The thesis proposed the different approach to detect the Sybil Nodes in social network. The defense strategies developed by the relationship in the social network. We calculate the similarity as the relations strength between nodes by these relationships and clustering the all nodes. After the clustering, we identify the group by Spectral analysis. By using the method, we could identify the Sybil group in the social network, the detect Sybil Nodes rate is above 95 %.
author2 Hui-Tang Lin
author_facet Hui-Tang Lin
Ming-YuHuang
黃明鈺
author Ming-YuHuang
黃明鈺
spellingShingle Ming-YuHuang
黃明鈺
Sybil Attack Detection based on Group Clustering for Social Networks
author_sort Ming-YuHuang
title Sybil Attack Detection based on Group Clustering for Social Networks
title_short Sybil Attack Detection based on Group Clustering for Social Networks
title_full Sybil Attack Detection based on Group Clustering for Social Networks
title_fullStr Sybil Attack Detection based on Group Clustering for Social Networks
title_full_unstemmed Sybil Attack Detection based on Group Clustering for Social Networks
title_sort sybil attack detection based on group clustering for social networks
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/wz3ur3
work_keys_str_mv AT mingyuhuang sybilattackdetectionbasedongroupclusteringforsocialnetworks
AT huángmíngyù sybilattackdetectionbasedongroupclusteringforsocialnetworks
AT mingyuhuang yúshèqúnwǎnglùyùnyòngfēnqúnjīzhìyǐzhēncènǚwūgōngjīzhīyánjiūyǔshízuò
AT huángmíngyù yúshèqúnwǎnglùyùnyòngfēnqúnjīzhìyǐzhēncènǚwūgōngjīzhīyánjiūyǔshízuò
_version_ 1719119283917684736