Please use this identifier to cite or link to this item: https://doi.org/10.1109/SP.2009.26
DC FieldValue
dc.titleDsybil: Optimal Sybil-resistance for recommendation systems
dc.contributor.authorYu, H.
dc.contributor.authorShi, C.
dc.contributor.authorKaminsky, M.
dc.contributor.authorGibbons, P.B.
dc.contributor.authorXiao, F.
dc.date.accessioned2013-07-04T07:59:03Z
dc.date.available2013-07-04T07:59:03Z
dc.date.issued2009
dc.identifier.citationYu, H., Shi, C., Kaminsky, M., Gibbons, P.B., Xiao, F. (2009). Dsybil: Optimal Sybil-resistance for recommendation systems. Proceedings - IEEE Symposium on Security and Privacy : 283-298. ScholarBank@NUS Repository. https://doi.org/10.1109/SP.2009.26
dc.identifier.isbn9780769536330
dc.identifier.issn10816011
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/40207
dc.description.abstractRecommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of sybil identities to vote. Defending against sybil attacks is often quite challenging, and the nature of recommendation systems makes it even harder. This paper presents DSybil, a novel defense for diminishing the influence of sybil identities in recommendation systems. DSybil provides strong provable guarantees that hold even under the worst-case attack and are optimal. DSybil can defend against an unlimited number of sybil identities over time. DSybil achieves its strong guarantees by i) exploiting the heavy-tail distribution of the typical voting behavior of the honest identities, and ii) carefully identifying whether the system is already getting "enough help" from the (weighted) voters already taken into account or whether more "help" is needed. Our evaluation shows that DSybil would continue to provide high-quality recommendations even when a millionnode botnet uses an optimal strategy to launch a sybil attack. © 2009 IEEE.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/SP.2009.26
dc.sourceScopus
dc.typeConference Paper
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1109/SP.2009.26
dc.description.sourcetitleProceedings - IEEE Symposium on Security and Privacy
dc.description.page283-298
dc.identifier.isiut000273336900019
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.