Intelligent Sybil attack detection on abnormal connectivity behavior in mobile social networks

Anand CHINCHORE, Frank JIANG, Guandong XU

Research output: Chapter in Book/Report/Conference proceedingChapters

9 Citations (Scopus)

Abstract

There have been a large number of researches on mobile networks in the literature, focusing on a variety of secured applications over the network, including the use of their connections, fake identification and attacks on social group. These applications are created for the intention to collect confidential information, money laundering, blackmailing and to perform other crime activity. The purpose of this research is to identify the behavior of the honest node (network account) and fake node (network account) on mobile social network. 

In this research, the behavior survey of these nodes is carried out and further analysed with the help of graph-based Sybil detection system. This paper particularly studies Sybil attacks and its defense system for IoT (Internet-of-Things) environment. To be implied, the identification of each forged Sybil node is to be tracked on the basis of nodes connectivity and their timing of connectivity as well as frequency among each other. Sybil node has a forged identity in different locations and also reports its virtual location information to servers. Copyright © 2015 Springer International Publishing Switzerland.

Original languageEnglish
Title of host publicationKnowledge management in organizations: 10th International Conference, KMO 2015, Maribor, Slovenia, August 24-28, 2015, proceedings
EditorsLorna UDEN, Marjan HERIČKO, I-Hsien TING
Place of PublicationCham
PublisherSpringer
Pages602-617
ISBN (Electronic)9783319210094
ISBN (Print)9783319210087
DOIs
Publication statusPublished - 2015

Citation

Chinchore, A., Jiang, F., & Xu, G. (2015). Intelligent Sybil attack detection on abnormal connectivity behavior in mobile social networks. In L. Uden, M. Heričko, & I.-H. Ting (Eds.), Knowledge management in organizations: 10th International Conference, KMO 2015, Maribor, Slovenia, August 24-28, 2015, proceedings (pp. 602-617). Springer. https://doi.org/10.1007/978-3-319-21009-4_45

Keywords

  • Sybil attack
  • Mobile social network
  • Anomaly detection

Fingerprint

Dive into the research topics of 'Intelligent Sybil attack detection on abnormal connectivity behavior in mobile social networks'. Together they form a unique fingerprint.