Sybil attack detection method in online social network

The invention discloses a Sybil attack detection method in an online social network, and aims to provide a Sybil attack detection method in the online social network. The technical scheme is that the method comprises the steps of selecting some node as a verification node, carrying out path announce...

Full description

Saved in:
Bibliographic Details
Main Authors CAO JIENAN, CHEN LIANG, SHAO CHENGCHENG, CAO HUAYANG, CAI KAIYU, CHEN KAN, ZHENG QIANBING, REN HAO, ZHU PEIDONG, HU GANG
Format Patent
LanguageChinese
English
Published 21.05.2014
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention discloses a Sybil attack detection method in an online social network, and aims to provide a Sybil attack detection method in the online social network. The technical scheme is that the method comprises the steps of selecting some node as a verification node, carrying out path announcement by taking a member relationship as the basis, and building the relationship path to reach the verification node; removing a redundant path and a share path in the process of announcement by adopting a similar path choice method based on a path k; gathering all feasible paths to the verification node for carrying out the dependability check after the announcement ended, so as to prevent privately building or tampering the path; and finally, taking the quantity of trusted paths of each node as a verification standard, and verifying whether other nodes are Sybil nodes through the verification node. According to the Sybil attack detection method, the quantity of trusted paths of each node is used for judging wheth
Bibliography:Application Number: CN2014137921