期刊论文详细信息
ETRI Journal
SybilBF: Defending against Sybil Attacks via Bloom Filters
关键词: security;    Bloom filter;    Sybil attack;   
Others  :  1186067
DOI  :  10.4218/etrij.11.0210.0431
PDF
【 摘 要 】

Distributed systems particularly suffer from Sybil attacks, where a malicious user creates numerous bogus nodes to influence the functions of the system. In this letter, we propose a Bloom filter-based scheme, SybilBF, to fight against Sybil attacks. A Bloom filter presents a set of Sybil nodes according to historical behavior, which can be disseminated to at least n∙(e–1)/e honest nodes. Our evaluation shows that SybilBF outperforms state of the art mechanisms improving SybilLimit by a factor of (1/e)gamma at least.

【 授权许可】

   

【 预 览 】
附件列表
Files Size Format View
20150520120838858.pdf 232KB PDF download
【 参考文献 】
  • [1]J.R. Douceur, "The Sybil Attack," Proc. 1st Int. Workshop Peer-to-Peer Syst., Cambridge, MA, USA, Mar. 2002, pp. 251-260.
  • [2]H. Yu et al., "SybilGuard: Defending against Sybil Attacks via Social Networks," IEEE/ACM Trans. Netw., vol. 16, no. 3, 2008, pp. 576-589.
  • [3]H. Yu et al., "SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks," IEEE/ACM Trans. Netw., vol. 18, no. 3, 2010, pp. 885-898.
  • [4]G. Danezis and P. Mittal, "SybilInfer: Detecting Sybil Nodes Using Social Networks," Proc. 16th Netw. Distrib. Syst. Security Symp., San Diego, California, USA, Feb. 2009.
  • [5]N. Tran et al., "Sybil-Resilient Online Content Voting," Proc. 6th USENIX Symp. Netw. Syst. Design Implementation, Boston, MA, USA, Apr. 2009, pp. 15-28.
  • [6]B. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," Commun. ACM, vol. 13, no. 7, 1970, pp. 422-426.
  • [7]D. Guo et al., "The Dynamic Bloom Filters," IEEE Trans. Knowl. Data Eng., vol. 22, no. 1, 2010, pp. 120-133.
  • [8]J. Leskovec et al., "Statistical Properties of Community Structure in Large Social and Information Networks," Proc. WWW, Beijing, China, Apr. 2008, pp. 695-704.
  文献评价指标  
  下载次数:8次 浏览次数:7次