Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …

Aiding the detection of fake accounts in large scale social online services

Q Cao, M Sirivianos, X Yang, T Pregueiro - 9th USENIX symposium on …, 2012 - usenix.org
Users increasingly rely on the trustworthiness of the information exposed on Online Social
Networks (OSNs). In addition, OSN providers base their business models on the …

Relationship-based access control: protection model and policy language

PWL Fong - Proceedings of the first ACM conference on Data and …, 2011 - dl.acm.org
Social Network Systems pioneer a paradigm of access control that is distinct from traditional
approaches to access control. Gates coined the term Relationship-Based Access Control …

Multiparty access control for online social networks: model and mechanisms

H Hu, GJ Ahn, J Jorgensen - IEEE transactions on knowledge …, 2012 - ieeexplore.ieee.org
Online social networks (OSNs) have experienced tremendous growth in recent years and
become a de facto portal for hundreds of millions of Internet users. These OSNs offer …

Sybilbelief: A semi-supervised learning approach for structure-based sybil detection

NZ Gong, M Frank, P Mittal - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Sybil attacks are a fundamental threat to the security of distributed systems. Recently, there
has been a growing interest in leveraging social networks to mitigate Sybil attacks. However …

A review of techniques to mitigate sybil attacks

N Balachandran, S Sanyal - arXiv preprint arXiv:1207.2617, 2012 - arxiv.org
Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a
malicious node masquerades as several different nodes, called Sybil nodes, simultaneously …

Detecting a compromised online user account

KS Srivastava - US Patent 9,117,074, 2015 - Google Patents
One or more techniques and/or systems are disclosed for detecting and/or mitigating a
potentially compromised online user account. One or more baselines can be established for …

Identifying application reputation based on resource accesses

RC Colvin, EJ Haber, A Bhatawdekar… - US Patent …, 2015 - Google Patents
Malware detection is often based on monitoring a local application binary and/or process,
such as detecting patterns of malicious code, unusual local resource utilization, or …

[PDF][PDF] Internet of Things Security: Layered classification of attacks and possible Countermeasures

O El Mouaatamid, M Lahmer, M Belkasmi - Electron. J. Inf. Technol, 2016 - revue-eti.net
Internet of Things is undoubtedly a well-known research area. In fact, ensuring security of
data exchange is among the great challenges of the Internet of things. In this paper, we …

Relationship-based access control policies and their policy languages

PWL Fong, I Siahaan - Proceedings of the 16th ACM symposium on …, 2011 - dl.acm.org
The Relationship-Based Access Control (ReBAC) model was recently proposed as a
general-purpose access control model. It supports the natural expression of parameterized …