Corpus ID: 2749452

Social Turing Tests: Crowdsourcing Sybil Detection

  title={Social Turing Tests: Crowdsourcing Sybil Detection},
  author={G. Wang and M. Mohanlal and Christo Wilson and Xiao Wang and M. J. Metzger and H. Zheng and B. Zhao},
  • G. Wang, M. Mohanlal, +4 authors B. Zhao
  • Published 2013
  • Computer Science, Physics
  • ArXiv
  • As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils that effectively befriend legitimate users, rendering most automated Sybil detection techniques ineffective. In this paper, we explore the feasibility of a crowdsourced Sybil detection system for OSNs. We conduct a large user study on the ability of humans to detect today's Sybil… CONTINUE READING
    150 Citations
    You Are How You Click: Clickstream Analysis for Sybil Detection
    • 246
    • PDF
    SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels
    • 10
    • PDF
    Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks
    • 25
    • PDF
    Sybil Defense Techniques in Online Social Networks: A Survey
    • 47
    Characterizing and detecting malicious crowdsourcing
    • 18
    • PDF
    Building a Task Blacklist for Online Social Systems
    Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers
    • 133
    • PDF
    SybilTrap: A graph‐based semi‐supervised Sybil defense scheme for online social networks
    • 6
    Detecting malicious campaigns in crowdsourcing platforms
    • Hongkyu Choi, Kyumin Lee, S. Webb
    • Computer Science
    • 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
    • 2016
    • 12
    • PDF


    Uncovering social network Sybils in the wild
    • 379
    • PDF
    Aiding the Detection of Fake Accounts in Large Scale Social Online Services
    • 400
    • Highly Influential
    • PDF
    Detecting and characterizing social spam campaigns
    • 316
    • PDF
    SybilGuard: Defending Against Sybil Attacks via Social Networks
    • 545
    • PDF
    Serf and turf: crowdturfing for fun and profit
    • 206
    • PDF
    SybilInfer: Detecting Sybil Nodes using Social Networks
    • 284
    • PDF
    SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
    • 321
    • PDF
    An analysis of social network-based Sybil defenses
    • 223
    • PDF
    Sybil-Resilient Online Content Voting
    • 309
    • PDF