We use cookies to improve your experience with our site.
蒋竞, 单子非, 王潇, 张莉, 代亚非. 真实环境下虚假团体的测量研究[J]. 计算机科学技术学报, 2015, 30(6): 1344-1357. DOI: 10.1007/s11390-015-1602-6
引用本文: 蒋竞, 单子非, 王潇, 张莉, 代亚非. 真实环境下虚假团体的测量研究[J]. 计算机科学技术学报, 2015, 30(6): 1344-1357. DOI: 10.1007/s11390-015-1602-6
Jing Jiang, Zi-Fei Shan, Xiao Wang, Li Zhang, Ya-Fei Dai. Understanding Sybil Groups in the Wild[J]. Journal of Computer Science and Technology, 2015, 30(6): 1344-1357. DOI: 10.1007/s11390-015-1602-6
Citation: Jing Jiang, Zi-Fei Shan, Xiao Wang, Li Zhang, Ya-Fei Dai. Understanding Sybil Groups in the Wild[J]. Journal of Computer Science and Technology, 2015, 30(6): 1344-1357. DOI: 10.1007/s11390-015-1602-6

真实环境下虚假团体的测量研究

Understanding Sybil Groups in the Wild

  • 摘要: 女巫攻击是在线社交网络中一种著名和强大的攻击。在女巫攻击中, 恶意攻击者制造一组由多个虚假用户构成的虚假团体, 然后控制他们去攻击系统。由于主流社交网络的数据保密政策, 研究人员很难获取海量真实环境下的虚假团体数据集。通过深入理解虚假团体, 不仅可以了解真实环境下的恶意行为, 还可以指导设计安全机制。本文对大型社交网络人人网的虚假团体进行测量研究。本文从不同角度分析虚假团体, 包括个人信息、社交关系和恶意行为。本文主要的发现包括: (1)虚假团体的用户信息经常不完整, 并且质量较差。(2)虚假团体在连接结构方面有特殊的演化模式, 例如突然增加节点、缺少非单点之间的合并。(3)一些虚假团体之间存在紧密关系, 进而形成虚假社区。这些虚假社区有海量虚假用户, 造成巨大的潜在威胁。(4)虚假团体的一些虚假用户在注册很长时间后才被封禁。这些虚假团体的特点可以被用来改进社交网络的安全机制, 抵抗女巫攻击。具体地讲, 我们建议在线社交网络应该(1)使用本文的方法检查信息的完整性和质量。(2)基于社区连接结构的动态性, 识别虚假团体。(3)仔细监控、检查虚假社区, 防止勾结攻击。(4)即使虚假团体长期表现正常, 仍然需要检查, 防止潜在的恶意行为。

     

    Abstract: Sybil attacks are one kind of well-known and powerful attacks against online social networks (OSNs). In a sybil attack, a malicious attacker generates a sybil group consisting of multiple sybil users, and controls them to attack the system. However, data confidentiality policies of major social network providers have severely limited researchers' access to large-scale datasets of sybil groups. A deep understanding of sybil groups can provide important insights into the characteristics of malicious behavior, as well as numerous practical implications on the design of security mechanisms. In this paper, we present an initial study to measure sybil groups in a large-scale OSN, Renren. We analyze sybil groups at different levels, including individual information, social relationships, and malicious activities. Our main observations are: 1) user information in sybil groups is usually incomplete and in poor quality; 2) sybil groups have special evolution patterns in connectivity structure, including bursty actions to add nodes, and a monotonous merging pattern that lacks non-singleton mergings; 3) several sybil groups have strong relationships with each other and compose sybil communities, and these communities cover a large number of users and pose great potential threats; 4) some sybil users are not banned until a long time after registration in some sybil groups. The characteristics of sybil groups can be leveraged to improve the security mechanisms in OSNs to defend against sybil attacks. Specifically, we suggest that OSNs should 1) check information completeness and quality, 2) learn from dynamics of community connectivity structure to detect sybil groups, 3) monitor sybil communities and inspect them carefully to prevent collusion, and 4) inspect sybil groups that behave normally even for a long time to prevent potential malicious behaviors.

     

/

返回文章
返回