4.2 Evaluation Criteria
The main criteria to measure the effectiveness include
precision, recall, F-measure. Suppose a is the number
of spammers correctly labelled and b is the number of
spammers mis-labelled as normal. Value c is number
of non-spammers classified as spammers (false
alarm) and d is number of non-spammers correctly
classified. Then precision p is a/(a+c) and recall r is
a/(a+b). The F-measure is 2pr/(p+r). True positive
rate measures and false negative rate are other
criteria. We also compare the runtimes of the
algorithms.
4.3 Automatic Generation of Sybils and
Simulation of Group Attacks
Of course, we can manually create some valid emails
and use them to join the social network platforms to
create some accounts we can control. The problem is
that the number of sybil accounts is limited and time
consuming. We need automate this procedure to
generate large number of controllable accounts. The
vendors may have restrictions or are able to detect
these events. More research is required.
5 CONCLUSION
In this work we have proposed and investigated a
comprehensive disruption detection technique that
can integrate the otherwise separate detection
strategies that use only part of available information.
We propose two such schemes: weighted linear
model and voting model. A system architecture that
supports the two new algorithms is also proposed.
Though the final detailed implementation and
experiments are not completed, we expect our new
exploratory algorithms and prototype will greatly
advance the disruption detection technology.
REFERENCES
Douceur, J. R., Druschel, P., 2002. "The Sybil attack" in
Peer-to-Peer Systems, Heidelberg, Germany:Springer,
pp. 251-260, 2002.
Yu, H., Kaminsky, M., Gibbons, P. B., Flaxman, A. D.,
2008. "SybilGuard: Defending against Sybil attacks via
social networks", IEEE/ACM Trans. Netw., vol. 16, no.
3, pp. 576-589, Jun. 2008.
Yu, H., Gibbons, P. B., Kaminsky, M., Xiao, F., 2010.
"SybilLimit: A near-optimal social network defence
against Sybil attacks", IEEE/ACM Trans. Netw., vol.
18, no. 3, pp. 885-898, Jun. 2010.
Danezis, G., Mittal, P., 2009. "SybilInfer: Detecting Sybil
nodes using social networks", Proc. NDSS, pp. 1-15,
2009.
Tran, N., Li, J., Subramanian, L., Chow, S. S., 2011.
"Optimal Sybil-resilient node admission control", Proc.
IEEE INFOCOM, pp. 3218-3226, Apr. 2011.
Shi, L., Yu, S., Lou, W., Hou, Y. T., 2013. "Sybilshield:
An agent-aided social network-based Sybil defence
among multiple communities", Proc. IEEE INFOCOM,
pp. 1034-1042, Apr. 2013.
Wei, W., Xu, F., Tan, C. C., Li, Q., 2013. "SybilDefender:
A defense mechanism for Sybil attacks in large social
networks", IEEE Trans. Parallel Distrib. Syst., vol. 24,
no. 12, pp. 2492-2502, Dec. 2013.
Cao, Q., Yang, X., 2013. "Sybilfence: Improving social-
graphbased Sybil defenses with user negative
feedback", 2013, [online] Available:
https://arxiv.org/abs/1304.3819.
Tran, D. N., Min, B., Li, J., Subramanian, L., 2009. "Sybil-
resilient online content voting", Proc. NSDI, pp. 15-28,
2009.
Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B. Y., Dai,
Y., 2014. "Uncovering social network Sybils in the
wild", ACM Trans. Knowl. Discovery Data (TKDD),
vol. 8, no. 1, 2014.
Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B. Y.,
2010. "Detecting and characterizing social spam
campaigns", Proc. 10th ACM SIGCOMM Conf.
Internet Meas., pp. 35-47, 2010.
Yanbin, Z., 2010. "Detecting and characterizing spam
campaigns in online social networks" in Fall LERSAIS
IA Seminar, Pittsburgh, PA, USA, 2010.
Mukherjee, A. et al.,2013. "Spotting opinion spammers
using behavioral footprints", Proc. 19th ACM SIGKDD
Int. Conf. Knowl. Discovery Data Mining, vol. 2013,
pp. 632-640.
Gong, N. Z., Frank, M., Mittal, P., 2014. "SybilBelief: A
semi-supervised learning approach for structure-based
Sybil detection", IEEE Trans. Inf. Forensics Security,
vol. 9, no. 6, pp. 976-987, Jun. 2014.
Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T., 2012.
"Aiding the detection of fake accounts in large scale
social online services", Proc. 9th USENIX Symp. Netw.
Syst. Design Implement. (NSDI), pp. 197-210, 2012.
Wang, G., Konolige, T., Wilson, C., Wang, X., Zheng, H.,
Zhao, B. Y., 2013. "You are how you click: Clickstream
analysis for Sybil detection", Proc. USENIX Secur., pp.
1-15, 2013.
Wang, G. et al., 2012. "Social turing tests: Crowdsourcing
Sybil detection", 2012, [online] Available:
https://arxiv.org/abs/1205.3856.
Misra, S., Tayeen, A. S. M., Xu, W., 2016. "SybilExposer:
An effective scheme to detect Sybil communities in
online social networks", Proc. IEEE Int. Conf.
Commun. (ICC), pp. 1-6, May 2016.
Tan, Enhua, Guo, Lei, Chen, Songqing, Zhang, Xiaodong,
and Zhao,Yihong., 2013. UNIK: unsupervised social
network spam detection. In Proceedings of the 22nd
A Comprehensive Framework for Detecting Sybils and Spammers on Social Networks
235