GAUR: a method to detect Sybil groups in peer-to-peer overlays

@article{Haribabu2012GAURAM,
  title={GAUR: a method to detect Sybil groups in peer-to-peer overlays},
  author={K. Haribabu and C. Hota and Arindam Paul},
  journal={Int. J. Grid Util. Comput.},
  year={2012},
  volume={3},
  pages={145-156}
}
Sybil attack is an important problem as the peer-to-peer networks grow in size and become prominent means for distributing multimedia. In order to validate the feasibility of using psychometric tests as an approach to detect Sybils in their entirety as Sybil groups, an experiment is conducted by taking the tests on a population of considerable size. Selected people were given multiple questionnaires corresponding to multiple identities in the network. The survey data is analysed using DBSCAN… Expand
3 Citations

References

SHOWING 1-10 OF 65 REFERENCES
Detecting Sybils in Peer-to-Peer Overlays Using Psychometric Analysis Methods
  • K. Haribabu, Arindam Paul, C. Hota
  • Computer Science
  • 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications
  • 2011
  • 2
Detecting Sybils in Peer-to-Peer Overlays Using Neural Networks and CAPTCHAs
  • 7
Detecting Sybils in Peer-to-Peer File Replication Systems
  • 3
  • PDF
Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration
  • J. Dinger, H. Hartenstein
  • Computer Science
  • First International Conference on Availability, Reliability and Security (ARES'06)
  • 2006
  • 130
  • Highly Influential
  • PDF
Limiting Sybil Attacks in Structured P2P Networks
  • 121
  • PDF
Sybil-Resistant DHT Routing
  • 183
  • PDF
The Eigentrust algorithm for reputation management in P2P networks
  • 3,729
  • PDF
A Survey of Peer-to-Peer Security Issues
  • 296
  • PDF
Limiting Sybil Attacks in Structured Peer-to-Peer Networks
  • 37
  • PDF
SyMon: Defending large structured P2P systems against Sybil attack
  • B. Jyothi, D. Ram
  • Computer Science
  • 2009 IEEE Ninth International Conference on Peer-to-Peer Computing
  • 2009
  • 17
...
1
2
3
4
5
...