Project Login
Registration No:
Password:
MAIL ALERTS SMS ALERTS
 
     
   
     

Exploring The Design Space Of Social Network-Based Sybil Defenses.

Platform : Image Processing

IEEE Projects Years : 2012

Exploring The Design Space Of Social Network-Based Sybil Defenses.

Abstract
Recently, there has been significant research interest in leveraging social
networks to defend against Sybil attacks. While much of this work may
appear similar at first glance, existing social network-based Sybil
defense schemes can be divided into two categories: Sybil detection and
Sybil tolerance. These two categories of systems both leverage global
properties of the underlying social graph, but they rely on different
assumptions and provide different guarantees: Sybil detection schemes
are application-independent and rely only on the graph structure to
identify Sybil identities, while Sybil tolerance schemes rely on
application-specific information and leverage the graph structure and
transaction history to bound the leverage an attacker can gain from using
multiple identities. In this paper, we take a closer look at the design
goals, models, assumptions, guarantees, and limitations of both
categories of social network-based Sybil defense systems.
Architecture Diagram
Server
Check Connection at
the Time of Response
Send the
Request
Send the
Request
User
Sybil User
Give the
Response
Disconnect
the Sybil User
Sybil Guard
Existing System
Sybil defense means use others IP address for our communication.
It create major problem in the network. In Existing system Packets are
filter by using Distributed Packet filtering method used here. Denial of
service (DOS) attack is major issue in the network, this at tack create
confuse while detect ing attacker . Inter domain ip spoofing
can’ t detecting here. Because source router do the detecting
work based on the source router connection, if attacker use address
of some other system which using same source router for reaching
destination that’s why problem for finding attacker.
Disadvantages:
· IP create confuse while detecting attacker.
· If attacker use address of some other system which using
different IP.
Proposed System
Sybil defense schemes have been designed for identity-based
social systems. Each user is intended to have a single identity, and users
establish friendship links to the identities of other users they recognize in
the system, thereby building a social network. Sybil defenses use this
social network as a basis for identifying users with multiple identities.
We call a user with multiple identities a Sybil user and each identity
he/she uses a Sybil identity.
Advantages:
· It’s for identity-based social systems.
· Users have a single identity and user can create their own
account by referring the existing user.
· And users have to provide some government proof to
identifying non-Sybil user.
Modules
1. Registration
2. Sybil detection
3. Non-Sybil detection
4. Uploading content
5. Sybil Guard
1. Registration
In this module the user going to create their business account via referring
their friends user id. It is possible once their friends were an existing user of our
organization. And the user has to mention all the details of the registration forms
needed.
2. Sybil Detection
Sybil detection schemes have been designed for identity-based social
systems. Each user is intended to have a single identity, and users establish
friendship links to the identities of other users they recognize in the system,
thereby building a social network. Sybil detection uses this social network as a
basis for identifying users with multiple identities. We call a user with multiple
identities a Sybil user and each identity she uses a Sybil identity. The goal of Sybil
detection is to label identities in the system as either Sybil (‘untrustworthy’) or
non-Sybil (‘trustworthy’) with high accuracy.
3. Non- Sybil Detection
T h e s y s t em h a s h o n e s t h uma n b e i n g s a s h o n e s t u s e r s ,
e a c h wi t h o n e h o n e s t ident i ty or user . Hones t user obeys the
protocol . The sys tem a l so has one or more malicious human beings
as malicious users, each with one or more identities/ user. To unify
terminology, we call all identities created by malicious users as Sybil
identities or users. All Sybil users are colluding and are controlled by an
adversary. A compromised honest user is completely controlled by the adversary
and hence is considered as a Sybil user and not as an honest user.
4. Uploading content
In this module Admin going to upload the videos and give the rating of that
videos. In the uploaded video will store on the application path and the details
stored on the data table. When we need to play the video by the user the video
details get from the data table and look out the given application path then play the
video.
5. Sybil Guard
In this module we are going to identify the user whether it is Sybil user or
normal user. This identity process will be done by comparing the identity with
registered user Id. If it doesn’t match, the user will be treated as Sybil
user. The goal of Sybil detection is to label identities in the system as either Sybil
(‘untrustworthy’) or non-Sybil (‘trustworthy’) with high accuracy. T h e s y s t em
h a s h o n e s t h uma n b e i n g s a s h o n e s t u s e r s , e a c h wi t h o n e
h o n e s t ident i ty or user . Hones t user obeys the protocol .
HARDWARE & SOFTWARE REQUIREMENTS:
HARDWARE REQUIREMENTS:
· System : Pentium IV 2.4 GHz.
· Hard Disk : 40 GB.
· Floppy Drive : 1.44 Mb.
· Monitor : 15 VGA Color.
· Mouse : Logitech.
· Ram : 512 MB.
SOFTWARE REQUIREMENTS:
· Operating system : Windows XP Professional.
· Coding Language : C#.NET


NOW GET PROJECTS ! GET TRAINED ! GET PLACED !

IEEE, NON-IEEE, REAL TIME LIVE ACADEMIC PROJECTS,

PROJECTS WITH COMPLETE COURSES,SOFT SKILLS & PLACEMENTS

ALLOVER INDIA & WORLD WIDE,

HOSTEL FACILITY AVAILABLE FOR GIRLS & BOYS SEPARATELY,

CALL: 08985129129 ,  E-Mail Id: support@ascentit.in

REGISTER FOR PROJECTS NOW ! GET DISCOUNT
   
1