{"id":"https://openalex.org/W2075529230","doi":"https://doi.org/10.1145/2810103.2813693","title":"Exploiting Temporal Dynamics in Sybil Defenses","display_name":"Exploiting Temporal Dynamics in Sybil Defenses","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W2075529230","doi":"https://doi.org/10.1145/2810103.2813693","mag":"2075529230"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813693","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2810103.2813693","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2813693&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2813693&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103101104","display_name":"Changchang Liu","orcid":"https://orcid.org/0000-0003-3111-0782"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Changchang Liu","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA","Princeton University , Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Princeton University , Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024596435","display_name":"Peng Gao","orcid":"https://orcid.org/0000-0001-6331-9383"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Gao","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA","Princeton University , Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Princeton University , Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035719182","display_name":"Matthew Wright","orcid":"https://orcid.org/0000-0002-8489-6347"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Wright","raw_affiliation_strings":["University of Texas at Arlington, Arlington, TX, USA","[University of Texas at Arlington, Arlington, TX, USA]"],"affiliations":[{"raw_affiliation_string":"University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]},{"raw_affiliation_string":"[University of Texas at Arlington, Arlington, TX, USA]","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015619835","display_name":"Prateek Mittal","orcid":"https://orcid.org/0000-0002-4057-0118"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prateek Mittal","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA","Princeton University , Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Princeton University , Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103101104"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":16.4688,"has_fulltext":true,"cited_by_count":33,"citation_normalized_percentile":{"value":0.98879497,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"805","last_page":"816"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.9235707521438599},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7053822875022888},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6817803382873535},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.681037962436676},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.5762467384338379},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.473343163728714},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4564391076564789},{"id":"https://openalex.org/keywords/social-graph","display_name":"Social graph","score":0.44342249631881714},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4310513138771057},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4244343638420105},{"id":"https://openalex.org/keywords/social-dynamics","display_name":"Social dynamics","score":0.41406935453414917},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.407539963722229},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22075560688972473},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.21970632672309875},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.17223888635635376},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16729745268821716},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09423771500587463}],"concepts":[{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.9235707521438599},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7053822875022888},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6817803382873535},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.681037962436676},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.5762467384338379},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.473343163728714},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4564391076564789},{"id":"https://openalex.org/C2777522414","wikidata":"https://www.wikidata.org/wiki/Q648457","display_name":"Social graph","level":3,"score":0.44342249631881714},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4310513138771057},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4244343638420105},{"id":"https://openalex.org/C67469775","wikidata":"https://www.wikidata.org/wiki/Q304922","display_name":"Social dynamics","level":2,"score":0.41406935453414917},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.407539963722229},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22075560688972473},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.21970632672309875},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.17223888635635376},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16729745268821716},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09423771500587463}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2810103.2813693","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2810103.2813693","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2813693&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2810103.2813693","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2810103.2813693","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2813693&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3784506589","display_name":"TWC: Medium: Collaborative: Aspire: Leveraging Automated Synthesis Technologies for Enhancing System Security","funder_award_id":"1409415","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4175954068","display_name":"CAREER: anon.next: Privacy-Enabled Routing in the Next-Generation Internet","funder_award_id":"0954133","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G541942238","display_name":null,"funder_award_id":"1423163","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2075529230.pdf","grobid_xml":"https://content.openalex.org/works/W2075529230.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W1502591710","https://openalex.org/W1513623122","https://openalex.org/W1520914943","https://openalex.org/W1551760018","https://openalex.org/W1560502112","https://openalex.org/W1587819022","https://openalex.org/W1603565383","https://openalex.org/W1650252156","https://openalex.org/W1820393415","https://openalex.org/W1922737625","https://openalex.org/W2005556331","https://openalex.org/W2008620264","https://openalex.org/W2047443612","https://openalex.org/W2049607688","https://openalex.org/W2092277251","https://openalex.org/W2098395374","https://openalex.org/W2099399367","https://openalex.org/W2101890615","https://openalex.org/W2118765159","https://openalex.org/W2120111750","https://openalex.org/W2124142520","https://openalex.org/W2127503167","https://openalex.org/W2133299088","https://openalex.org/W2135264770","https://openalex.org/W2136486572","https://openalex.org/W2142772221","https://openalex.org/W2150941206","https://openalex.org/W2153204928","https://openalex.org/W2153644028","https://openalex.org/W2163898372","https://openalex.org/W2163949443","https://openalex.org/W2168508162","https://openalex.org/W2236870451","https://openalex.org/W2350778671","https://openalex.org/W4240443285"],"related_works":["https://openalex.org/W2488373863","https://openalex.org/W2509798866","https://openalex.org/W2609459414","https://openalex.org/W3087817160","https://openalex.org/W2006375909","https://openalex.org/W2005890293","https://openalex.org/W2956735966","https://openalex.org/W2404614860","https://openalex.org/W4232900735","https://openalex.org/W203384014"],"abstract_inverted_index":{"Sybil":[0,43,100,134,198,262],"attacks":[1,110,226],"present":[2],"a":[3,14,63,96],"significant":[4],"threat":[5],"to":[6,24,40,83,117,128,137,168,257,271],"many":[7],"Internet":[8],"systems":[9,54],"and":[10,28,76,104,140,151,175,185,209,218,222,230,240,277],"applications,":[11],"in":[12,21,66,153,261,275],"which":[13],"single":[15,64],"adversary":[16],"inserts":[17],"multiple":[18],"colluding":[19],"identities":[20,135],"the":[22,34,48,57,84,92,106,114,122,130,145,154,158,177,188,192,200,241,266,273],"system":[23,274],"compromise":[25],"its":[26],"security":[27,50,189],"privacy.":[29],"Recent":[30],"work":[31],"has":[32],"advocated":[33],"use":[35],"of":[36,47,52,59,95,98,108,121,144,148,157,191,224],"social-network-based":[37,99],"trust":[38],"relationships":[39],"defend":[41],"against":[42,164,195,207,216],"attacks.":[44],"However,":[45],"most":[46],"prior":[49],"analyses":[51],"such":[53,172],"examine":[55,105],"only":[56],"case":[58],"social":[60,70,159,232],"networks":[61],"at":[62],"instant":[65],"time.":[67],"In":[68,86],"practice,":[69],"network":[71,233],"connections":[72,131,149],"change":[73,129],"over":[74,183],"time,":[75],"attackers":[77],"can":[78,179,202],"also":[79],"cause":[80],"limited":[81],"changes":[82],"networks.":[85],"this":[87],"work,":[88],"we":[89,235],"focus":[90],"on":[91],"temporal":[93,254],"dynamics":[94,147,255],"variety":[97],"defenses.":[101],"We":[102,161],"describe":[103,236],"effect":[107],"novel":[109],"based":[111],"on:":[112],"(a)":[113],"attacker's":[115],"ability":[116,127],"modify":[118],"Sybil-controlled":[119],"parts":[120],"social-network":[123],"graph,":[124],"(b)":[125],"his":[126,133],"that":[132,163,243,253],"maintain":[136],"honest":[138,155],"users,":[139],"(c)":[141],"taking":[142],"advantage":[143],"regular":[146],"forming":[150],"breaking":[152],"part":[156],"network.":[160],"find":[162],"some":[165],"defenses":[166],"meant":[167],"be":[169,245,258,269],"fully":[170],"distributed,":[171],"as":[173],"SybilLimit":[174],"Persea,":[176],"attacker":[178,201,267],"make":[180],"dramatic":[181],"gains":[182],"time":[184],"greatly":[186],"undermine":[187,272],"guarantees":[190],"system.":[193],"Even":[194],"centrally":[196],"controlled":[197],"defenses,":[199],"eventually":[203],"evade":[204],"detection":[205],"(e.g.":[206,215],"SybilInfer":[208],"SybilRank)":[210],"or":[211,264],"create":[212],"denial-of-service":[213],"conditions":[214],"Ostra":[217],"SumUp).":[219],"After":[220],"analysis":[221],"simulation":[223],"these":[225],"using":[227],"both":[228],"synthetic":[229],"real-world":[231],"topologies,":[234],"possible":[237],"defense":[238,263],"strategies":[239],"trade-offs":[242],"should":[244],"explored.":[246],"It":[247],"is":[248],"clear":[249],"from":[250],"our":[251],"findings":[252],"need":[256],"accounted":[259],"for":[260],"else":[265],"will":[268],"able":[270],"unexpected":[276],"possibly":[278],"dangerous":[279],"ways.":[280]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
