Call For Paper

Volume 3 Issue 10

October 2017

Submit Paper Here
Upcoming Conference
Download Paper Format
Copyright Form
NEWS & UPDATES
News for Authors:

We have started accepting articles by online means directly through website. Its our humble request to all the researchers to go and check the new method of article submission on below link: Submit Manuscript

Follow us on Social Media:

Dear Researchers, to get in touch with the recent developments in the technology and research and to gain free knowledge like , share and follow us on various social media. Facebook

title

IMPROVED SECURITY MECHANISM FOR SOCIAL NETWORK SYBIL ATTACK

Author(s):

Suchita M. Bonde

Keywords:

Sybil attack, Sybil Defender, IP log.

Abstract

from last many years people were concerned about the security of social area network. In this social area network people create multiple bogus identities. To overcome this drawback, Sybil Defender mechanism is used along with the two ways security technique is use. Malicious users can create many identities but few trust relationships. Thus, there is a disproportionately small cut in the graph between the Sybil nodes and the honest nodes. Sybil Guard exploits this property to bound the number of identities a malicious user can create. The proposed system involves sybil identification technique along with the concept of the two way security mechanism. This two way security mechanism divide the password in two server and according to fake clustering, IP differentiation, IP log technique is used to identify where the user is sybil or genuine user. Due to this we can easily identify the sybil user. We show the effectiveness of Sybil Guard both analytically and experimentally.

Other Details

Paper ID: IJSARTV
Published in: Volume : 3, Issue : 10
Publication Date: 10/1/2017

Article Preview




Download Article