Skip to main content

2018 | OriginalPaper | Buchkapitel

Crowdsourcing Under Attack: Detecting Malicious Behaviors in Waze

verfasst von : Luis Sanchez, Erika Rosas, Nicolas Hidalgo

Erschienen in: Trust Management XII

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Social networks that use geolocalization enable receiving data from users in order to provide information based on their collective experience. Specifically, this article is interested in the social network Waze, a real-time navigation application for drivers. This application uses methods for identifying users that are open and free, where people are able to hide their identity by using a pseudonym. In this context, malicious behaviors can emerge, endangering the quality of the reports on which the application is based. We propose a method to detect malicious behavior on Waze, which crawls information from the application, aggregates it and models the data relationships in graphs. Using this model the data is analyzed according to the size of the graph: for large interaction graphs, we use a Sybil detection technique, while for small graphs we propose the use of a threshold-based mechanism to detect targeted behaviors. The results show that it is complex to use the large-scale Sybil attack detection techniques due to parameter tuning. However, good success rates can be achieved to tag users as honest and malicious if there are a small number of interactions between these groups of users. On the other hand, for small graphs, a straightforward analysis can be performed, since the graphs are sparse and the users have a limited number of connections between them, making clear the presence of outliers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Chang, S.H., Chen, Z.R.: Protecting mobile crowd sensing against Sybil attacks using cloud based trust management system. In: Mobile Information Systems 2016, p. 10 (2016) Chang, S.H., Chen, Z.R.: Protecting mobile crowd sensing against Sybil attacks using cloud based trust management system. In: Mobile Information Systems 2016, p. 10 (2016)
4.
Zurück zum Zitat Danezis, G., Mittal, P.: SybilInfer: detecting Sybil nodes using social networks. Technical report MSR-TR-2009-6, Microsoft, January 2009 Danezis, G., Mittal, P.: SybilInfer: detecting Sybil nodes using social networks. Technical report MSR-TR-2009-6, Microsoft, January 2009
5.
Zurück zum Zitat Dobrescu, R., Ionescu, F.: Large Scale Networks: Modeling and Simulation, 1st edn. CRC Press, Boca Raton (2016)CrossRef Dobrescu, R., Ionescu, F.: Large Scale Networks: Modeling and Simulation, 1st edn. CRC Press, Boca Raton (2016)CrossRef
7.
Zurück zum Zitat Feng, X., Li, C.y., Chen, D.x., Tang, J.: A method for defensing against multisource Sybil attacks in VANET. Peer-to-Peer Netw. Appl. 10(2), 305–314 (2017)CrossRef Feng, X., Li, C.y., Chen, D.x., Tang, J.: A method for defensing against multisource Sybil attacks in VANET. Peer-to-Peer Netw. Appl. 10(2), 305–314 (2017)CrossRef
8.
Zurück zum Zitat Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16(4), 2019–2036 (2014, Fourthquarter)CrossRef Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16(4), 2019–2036 (2014, Fourthquarter)CrossRef
9.
Zurück zum Zitat Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. J. Econ. Manag. Strateg. 10(2), 173–199 (2001)CrossRef Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. J. Econ. Manag. Strateg. 10(2), 173–199 (2001)CrossRef
11.
Zurück zum Zitat Gu, P., Khatoun, R., Begriche, Y., Serhrouchni, A.: Vehicle driving pattern based Sybil attack detection. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1282–1288, December 2016 Gu, P., Khatoun, R., Begriche, Y., Serhrouchni, A.: Vehicle driving pattern based Sybil attack detection. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1282–1288, December 2016
12.
Zurück zum Zitat Gu, P., Khatoun, R., Begriche, Y., Serhrouchni, A.: Support vector machine (SVM) based Sybil attack detection in vehicular networks. In: 2017 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6, March 2017 Gu, P., Khatoun, R., Begriche, Y., Serhrouchni, A.: Support vector machine (SVM) based Sybil attack detection in vehicular networks. In: 2017 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6, March 2017
13.
14.
Zurück zum Zitat Wei, W., Xu, F., Tan, C., Li, Q.: SybilDefender: defend against Sybil attacks in large social networks. In: 2012 Proceedings IEEE INFOCOM, pp. 1951–1959, March 2012 Wei, W., Xu, F., Tan, C., Li, Q.: SybilDefender: defend against Sybil attacks in large social networks. In: 2012 Proceedings IEEE INFOCOM, pp. 1951–1959, March 2012
15.
Zurück zum Zitat Xu, Z., Chen, B., Meng, X., Liu, L.: Towards efficient detection of Sybil attacks in location-based social networks. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1–7, November 2017 Xu, Z., Chen, B., Meng, X., Liu, L.: Towards efficient detection of Sybil attacks in location-based social networks. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1–7, November 2017
16.
Zurück zum Zitat Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against Sybil attacks via social networks. In. ACM SIGCOMM 2006, pp. 267–278. ACM Press (2006)CrossRef Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against Sybil attacks via social networks. In. ACM SIGCOMM 2006, pp. 267–278. ACM Press (2006)CrossRef
17.
Zurück zum Zitat Zhang, X., Zheng, H., Li, X., Du, S., Zhu, H.: You are where you have been: Sybil detection via geo-location analysis in OSNs. In: 2014 IEEE Global Communications Conference (GLOBECOM), pp. 698–703, December 2014 Zhang, X., Zheng, H., Li, X., Du, S., Zhu, H.: You are where you have been: Sybil detection via geo-location analysis in OSNs. In: 2014 IEEE Global Communications Conference (GLOBECOM), pp. 698–703, December 2014
Metadaten
Titel
Crowdsourcing Under Attack: Detecting Malicious Behaviors in Waze
verfasst von
Luis Sanchez
Erika Rosas
Nicolas Hidalgo
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-95276-5_7