期刊论文详细信息
| ETRI Journal | |
| SybilBF: Defending against Sybil Attacks via Bloom Filters | |
| 关键词: security; Bloom filter; Sybil attack; | |
| Others : 1186067 DOI : 10.4218/etrij.11.0210.0431 |
|
PDF
|
|
【 摘 要 】
Distributed systems particularly suffer from Sybil attacks, where a malicious user creates numerous bogus nodes to influence the functions of the system. In this letter, we propose a Bloom filter-based scheme, SybilBF, to fight against Sybil attacks. A Bloom filter presents a set of Sybil nodes according to historical behavior, which can be disseminated to at least n∙(e–1)/e honest nodes. Our evaluation shows that SybilBF outperforms state of the art mechanisms improving SybilLimit by a factor of (1/e)gamma at least.
【 授权许可】
【 预 览 】
| Files | Size | Format | View |
|---|---|---|---|
| 20150520120838858.pdf | 232KB |
【 参考文献 】
- [1]J.R. Douceur, "The Sybil Attack," Proc. 1st Int. Workshop Peer-to-Peer Syst., Cambridge, MA, USA, Mar. 2002, pp. 251-260.
- [2]H. Yu et al., "SybilGuard: Defending against Sybil Attacks via Social Networks," IEEE/ACM Trans. Netw., vol. 16, no. 3, 2008, pp. 576-589.
- [3]H. Yu et al., "SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks," IEEE/ACM Trans. Netw., vol. 18, no. 3, 2010, pp. 885-898.
- [4]G. Danezis and P. Mittal, "SybilInfer: Detecting Sybil Nodes Using Social Networks," Proc. 16th Netw. Distrib. Syst. Security Symp., San Diego, California, USA, Feb. 2009.
- [5]N. Tran et al., "Sybil-Resilient Online Content Voting," Proc. 6th USENIX Symp. Netw. Syst. Design Implementation, Boston, MA, USA, Apr. 2009, pp. 15-28.
- [6]B. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," Commun. ACM, vol. 13, no. 7, 1970, pp. 422-426.
- [7]D. Guo et al., "The Dynamic Bloom Filters," IEEE Trans. Knowl. Data Eng., vol. 22, no. 1, 2010, pp. 120-133.
- [8]J. Leskovec et al., "Statistical Properties of Community Structure in Large Social and Information Networks," Proc. WWW, Beijing, China, Apr. 2008, pp. 695-704.
PDF