Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sybil attack detection method based on node attention and forwarding characteristics and electronic equipment

An attack detection and node technology, applied in the field of Sybil attack detection, can solve problems such as poor robustness, and achieve the effect of improving accuracy

Active Publication Date: 2021-05-25
BEIHANG UNIV
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For this reason, the first object of the present invention is to propose a Sybil attack detection method based on node attention and forwarding characteristics, by utilizing the characteristics of user behavior characteristics and user tags being correlated, an initial trust value is generated based on user behavior characteristics, and in Based on the social graph, the initial trust value is added to construct a weighted strong social graph to detect Sybil nodes according to the weighted strong social graph, thus solving the limitations of the initial trust value setting of the detection method based on the graph structure and the detection method based on node characteristics The problem of poor feature robustness improves the accuracy of Sybil detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sybil attack detection method based on node attention and forwarding characteristics and electronic equipment
  • Sybil attack detection method based on node attention and forwarding characteristics and electronic equipment
  • Sybil attack detection method based on node attention and forwarding characteristics and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Embodiments of the present invention are described in detail below, examples of which are shown in the accompanying drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0014] Sybil attacks refer to attackers using a large number of false identities they create to carry out malicious activities and destroy system functions. As a basic attack in distributed systems, Sybil attack was common in sensor networks in the early stage, and was widely used in social networks in the later stage. Since social networks have no limit on the number of identities created by users and lack of effective identity authentication mechanisms, social networks are vulnerable to Sybil attacks. Attackers us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Sybil attack detection method and electronic equipment based on node attention and forwarding characteristics, and the detection method comprises the steps: obtaining social network user behavior data, and extracting a node feature vector and a node pair feature vector from the social network user behavior data based on the node attention and forwarding characteristics; inputting the node feature vector into a preset node classifier to obtain an initial trust value of the node, and inputting the node pair feature vector into a preset node pair classifier to obtain an initial trust value of the node pair; constructing a weighted strong social graph according to a preset social graph and the initial trust values of the node pairs; and carrying out trust propagation in the weighted strong social graph according to the initial trust values of the nodes by using a random walk algorithm to obtain a Sybil node set and a benign node set. According to the method, the user behavior information is integrated in the graph structure of the social network, so that the Sybil detection accuracy and practicability are effectively improved, and the method is simple and easy to implement.

Description

technical field [0001] The invention relates to the technical field of computer and information security, in particular to a Sybil attack detection method and electronic equipment based on node attention and forwarding features. Background technique [0002] Sybil attack refers to an attack method in which attackers use a large number of false identities created by them (that is, Sybil identities) to carry out malicious activities and destroy system functions. At present, the mainstream detection methods of Sybil attacks in social networks are divided into two categories, namely detection methods based on graph structure and detection methods based on node characteristics. [0003] However, the above mainstream Sybil attack detection methods all have certain limitations. Among them, the detection method based on the graph structure relies too much on the structural assumption, which does not hold true in the real social network, thus greatly reducing the effectiveness of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1416
Inventor 毛剑李响林其箫刘建伟
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products