Sybil attacks and their defenses in the internet of things
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
Aiding the detection of fake accounts in large scale social online services
Users increasingly rely on the trustworthiness of the information exposed on Online Social
Networks (OSNs). In addition, OSN providers base their business models on the …
Networks (OSNs). In addition, OSN providers base their business models on the …
Relationship-based access control: protection model and policy language
PWL Fong - Proceedings of the first ACM conference on Data and …, 2011 - dl.acm.org
Social Network Systems pioneer a paradigm of access control that is distinct from traditional
approaches to access control. Gates coined the term Relationship-Based Access Control …
approaches to access control. Gates coined the term Relationship-Based Access Control …
Multiparty access control for online social networks: model and mechanisms
Online social networks (OSNs) have experienced tremendous growth in recent years and
become a de facto portal for hundreds of millions of Internet users. These OSNs offer …
become a de facto portal for hundreds of millions of Internet users. These OSNs offer …
Sybilbelief: A semi-supervised learning approach for structure-based sybil detection
Sybil attacks are a fundamental threat to the security of distributed systems. Recently, there
has been a growing interest in leveraging social networks to mitigate Sybil attacks. However …
has been a growing interest in leveraging social networks to mitigate Sybil attacks. However …
A review of techniques to mitigate sybil attacks
N Balachandran, S Sanyal - arXiv preprint arXiv:1207.2617, 2012 - arxiv.org
Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a
malicious node masquerades as several different nodes, called Sybil nodes, simultaneously …
malicious node masquerades as several different nodes, called Sybil nodes, simultaneously …
Detecting a compromised online user account
KS Srivastava - US Patent 9,117,074, 2015 - Google Patents
One or more techniques and/or systems are disclosed for detecting and/or mitigating a
potentially compromised online user account. One or more baselines can be established for …
potentially compromised online user account. One or more baselines can be established for …
Identifying application reputation based on resource accesses
RC Colvin, EJ Haber, A Bhatawdekar… - US Patent …, 2015 - Google Patents
Malware detection is often based on monitoring a local application binary and/or process,
such as detecting patterns of malicious code, unusual local resource utilization, or …
such as detecting patterns of malicious code, unusual local resource utilization, or …
[PDF][PDF] Internet of Things Security: Layered classification of attacks and possible Countermeasures
Internet of Things is undoubtedly a well-known research area. In fact, ensuring security of
data exchange is among the great challenges of the Internet of things. In this paper, we …
data exchange is among the great challenges of the Internet of things. In this paper, we …
Relationship-based access control policies and their policy languages
The Relationship-Based Access Control (ReBAC) model was recently proposed as a
general-purpose access control model. It supports the natural expression of parameterized …
general-purpose access control model. It supports the natural expression of parameterized …