Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

For further details contact:

N.RAJASEKARAN B.E M.S 9841091117,9840103301.

Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,

Published in: Education
  • Be the first to comment

  • Be the first to like this


  1. 1. Impulse Technologies Beacons U to World of technology 044-42133143, 98401 03301,9841091117 Exploring The Design Space Of Social Network-Based Sybil Defenses Abstract Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glance, existing social network-based Sybil defense schemes can be divided into two categories: Sybil detection and Sybil tolerance. These two categories of systems both leverage global properties of the underlying social graph, but they rely on different assumptions and provide different guarantees: Sybil detection schemes are application-independent and rely only on the graph structure to identify Sybil identities, while Sybil tolerance schemes rely on application-specific information and leverage the graph structure and transaction history to bound the leverage an attacker can gain from using multiple identities. In this paper, we take a closer look at the design goals, models, assumptions, guarantees, and limitations of both categories of social network-based Sybil defense systems. Your Own Ideas or Any project from any company can be Implementedat Better price (All Projects can be done in Java or DotNet whichever the student wants) 1