{"id":"https://openalex.org/W2045683786","doi":"https://doi.org/10.1109/ifipnetworking.2014.6857128","title":"On the state of OSN-based Sybil defenses","display_name":"On the state of OSN-based Sybil defenses","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2045683786","doi":"https://doi.org/10.1109/ifipnetworking.2014.6857128","mag":"2045683786"},"language":"en","primary_location":{"id":"doi:10.1109/ifipnetworking.2014.6857128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ifipnetworking.2014.6857128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IFIP Networking Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017112220","display_name":"David K\u00f6ll","orcid":"https://orcid.org/0000-0002-6531-4284"},"institutions":[{"id":"https://openalex.org/I74656192","display_name":"University of G\u00f6ttingen","ror":"https://ror.org/01y9bpm73","country_code":"DE","type":"education","lineage":["https://openalex.org/I74656192"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"David Koll","raw_affiliation_strings":["Georg-August-Universitat Gottingen, Gottingen, Niedersachsen, DE","University of G\u00f6ttingen, G\u00f6ttingen Germany"],"affiliations":[{"raw_affiliation_string":"Georg-August-Universitat Gottingen, Gottingen, Niedersachsen, DE","institution_ids":[]},{"raw_affiliation_string":"University of G\u00f6ttingen, G\u00f6ttingen Germany","institution_ids":["https://openalex.org/I74656192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100361875","display_name":"Jun Li","orcid":"https://orcid.org/0000-0002-5308-5672"},"institutions":[{"id":"https://openalex.org/I181233156","display_name":"University of Oregon","ror":"https://ror.org/0293rh119","country_code":"US","type":"education","lineage":["https://openalex.org/I181233156"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jun Li","raw_affiliation_strings":["University of Oregon School of Law, Eugene, OR, US","University of Oregon, Eugene, OR, USA,"],"affiliations":[{"raw_affiliation_string":"University of Oregon School of Law, Eugene, OR, US","institution_ids":["https://openalex.org/I181233156"]},{"raw_affiliation_string":"University of Oregon, Eugene, OR, USA,","institution_ids":["https://openalex.org/I181233156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084747530","display_name":"Joshua Stein","orcid":"https://orcid.org/0000-0001-6455-1221"},"institutions":[{"id":"https://openalex.org/I181233156","display_name":"University of Oregon","ror":"https://ror.org/0293rh119","country_code":"US","type":"education","lineage":["https://openalex.org/I181233156"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joshua Stein","raw_affiliation_strings":["University of Oregon School of Law, Eugene, OR, US","University of Oregon, Eugene, OR, USA,"],"affiliations":[{"raw_affiliation_string":"University of Oregon School of Law, Eugene, OR, US","institution_ids":["https://openalex.org/I181233156"]},{"raw_affiliation_string":"University of Oregon, Eugene, OR, USA,","institution_ids":["https://openalex.org/I181233156"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018318168","display_name":"Xiaoming Fu","orcid":"https://orcid.org/0000-0002-8012-4753"},"institutions":[{"id":"https://openalex.org/I74656192","display_name":"University of G\u00f6ttingen","ror":"https://ror.org/01y9bpm73","country_code":"DE","type":"education","lineage":["https://openalex.org/I74656192"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Xiaoming Fu","raw_affiliation_strings":["Georg-August-Universitat Gottingen, Gottingen, Niedersachsen, DE","University of G\u00f6ttingen, G\u00f6ttingen Germany"],"affiliations":[{"raw_affiliation_string":"Georg-August-Universitat Gottingen, Gottingen, Niedersachsen, DE","institution_ids":[]},{"raw_affiliation_string":"University of G\u00f6ttingen, G\u00f6ttingen Germany","institution_ids":["https://openalex.org/I74656192"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017112220"],"corresponding_institution_ids":["https://openalex.org/I74656192"],"apc_list":null,"apc_paid":null,"fwci":8.9985,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.97434815,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.8643462657928467},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6932734251022339},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6119369864463806},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5948948860168457},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4910774230957031},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19927635788917542},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1552906334400177},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.12146860361099243},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.0878058671951294}],"concepts":[{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.8643462657928467},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6932734251022339},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6119369864463806},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5948948860168457},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4910774230957031},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19927635788917542},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1552906334400177},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.12146860361099243},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0878058671951294},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/ifipnetworking.2014.6857128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ifipnetworking.2014.6857128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IFIP Networking Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.569.749","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.569.749","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.net.informatik.uni-goettingen.de/publications/1883/Sybil_Networking2014.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.716.2208","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.716.2208","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://user.informatik.uni-goettingen.de/%7Edkoll/files/pubs/networking14.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1513623122","https://openalex.org/W1520914943","https://openalex.org/W1551760018","https://openalex.org/W1587819022","https://openalex.org/W1822655612","https://openalex.org/W1922737625","https://openalex.org/W1989643196","https://openalex.org/W1992685726","https://openalex.org/W2001706110","https://openalex.org/W2006375909","https://openalex.org/W2052378529","https://openalex.org/W2099399367","https://openalex.org/W2110801527","https://openalex.org/W2110903679","https://openalex.org/W2120111750","https://openalex.org/W2124142520","https://openalex.org/W2127503167","https://openalex.org/W2131681506","https://openalex.org/W2139144138","https://openalex.org/W2146008005","https://openalex.org/W2152760593","https://openalex.org/W2153305401","https://openalex.org/W2153644028","https://openalex.org/W2168508162","https://openalex.org/W2963484628","https://openalex.org/W3099768174","https://openalex.org/W3152062380","https://openalex.org/W6630812040","https://openalex.org/W6633006935","https://openalex.org/W6635139941","https://openalex.org/W6638475069","https://openalex.org/W6684716366"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2340192855","https://openalex.org/W2741062270","https://openalex.org/W2326507185","https://openalex.org/W2165491783","https://openalex.org/W2783409857","https://openalex.org/W3107051568","https://openalex.org/W2783856708"],"abstract_inverted_index":{"A":[0],"Sybil":[1,21,38,65,145,204,215],"attack":[2,110,134,221],"can":[3,23,127,283],"inject":[4],"many":[5,133],"forged":[6],"identities":[7],"(called":[8],"Sybils)":[9],"to":[10,25,102,131,151,158,203,223,244],"subvert":[11],"a":[12,26,35,56,91,118,214,218,227,234,246,263,271],"target":[13],"system.":[14],"Because":[15],"of":[16,29,37,53,143,220,270],"the":[17,48,141,168,176,180,190,197,258,268,278],"severe":[18],"damage":[19],"that":[20,46,117,195,266],"attacks":[22],"cause":[24],"wide":[27],"range":[28],"networking":[30],"applications,":[31],"there":[32,231],"has":[33],"been":[34],"proliferation":[36],"defense":[39,66,254],"schemes.":[40],"Of":[41],"particular":[42],"attention":[43],"are":[44,68,79,201],"those":[45],"explore":[47],"online":[49],"social":[50,272],"networks":[51],"(OSNs)":[52],"users":[54,107,282],"in":[55,59,208,237,251,253],"victim":[57],"system":[58],"different":[60,81],"ways.":[61],"Unfortunately,":[62],"while":[63],"effective":[64,75],"solutions":[67,78],"urgently":[69],"needed,":[70],"it":[71,96],"is":[72,97,149,232],"unclear":[73],"how":[74,164],"these":[76,184],"OSN-based":[77,144,171],"under":[80,174,189,196,257],"contexts.":[82],"For":[83],"example,":[84],"all":[85],"current":[86],"approaches":[87,172,185],"have":[88,114],"focused":[89],"on":[90],"common,":[92],"classical":[93,177,191],"scenario":[94,120,178,199],"where":[95,124],"difficult":[98],"for":[99],"an":[100,125],"attacker":[101,126],"link":[103],"Sybils":[104,256],"with":[105,274],"honest":[106],"and":[108,162,179,230],"create":[109],"edges;":[111],"however,":[112],"researchers":[113],"found":[115],"recently":[116],"modern":[119,181,198,259],"also":[121],"becomes":[122],"typical":[123],"employ":[128],"simple":[129],"strategies":[130],"obtain":[132],"edges.":[135],"In":[136],"this":[137],"work":[138,284],"we":[139,193,261],"analyze":[140],"state":[142],"defenses.":[146],"Our":[147,240],"objective":[148],"not":[150],"design":[152],"yet":[153],"another":[154],"solution,":[155],"but":[156],"rather":[157],"thoroughly":[159],"analyze,":[160],"measure,":[161],"compare":[163],"well":[165,188],"or":[166],"inadequate":[167],"well-known":[169],"existing":[170],"perform":[173,187],"both":[175],"scenario.":[182],"Although":[183],"mostly":[186],"scenario,":[192,260],"find":[194],"they":[200],"vulnerable":[202],"attacks.":[205],"As":[206],"shown":[207],"our":[209],"quantitative":[210],"analysis,":[211],"very":[212],"often":[213],"only":[216,233],"needs":[217],"handful":[219],"edges":[222],"disguise":[224],"itself":[225],"as":[226],"benign":[228],"node,":[229],"limited":[235],"success":[236],"tolerating":[238],"Sybils.":[239],"study":[241],"further":[242],"points":[243],"capabilities":[245],"new":[247,264],"solution":[248],"must":[249],"possess;":[250],"particular,":[252],"against":[255],"anticipate":[262],"approach":[265],"enriches":[267],"structure":[269],"graph":[273],"more":[275,285],"information":[276],"about":[277],"relations":[279],"between":[280],"its":[281],"effectively.":[286]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
