CFP last date
20 June 2024
Reseach Article

An Anti-Image Technique for Sybil Detection in Web Data

by Abhishek Gaur, Ratnesh Kumar Dubey, Vineet Ricchariya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 24
Year of Publication: 2015
Authors: Abhishek Gaur, Ratnesh Kumar Dubey, Vineet Ricchariya

Abhishek Gaur, Ratnesh Kumar Dubey, Vineet Ricchariya . An Anti-Image Technique for Sybil Detection in Web Data. International Journal of Computer Applications. 121, 24 ( July 2015), 5-8. DOI=10.5120/21871-4439

@article{ 10.5120/21871-4439,
author = { Abhishek Gaur, Ratnesh Kumar Dubey, Vineet Ricchariya },
title = { An Anti-Image Technique for Sybil Detection in Web Data },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 24 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-8 },
numpages = {9},
url = { },
doi = { 10.5120/21871-4439 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:07:16.600193+05:30
%A Abhishek Gaur
%A Ratnesh Kumar Dubey
%A Vineet Ricchariya
%T An Anti-Image Technique for Sybil Detection in Web Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 24
%P 5-8
%D 2015
%I Foundation of Computer Science (FCS), NY, USA

Today from security point of view, the increasing demand of network connectivity makes the system insecure. So we need a complement that can cope / prevent the security breaches in system. Unfortunately, in many environments, it may not be feasible to render the computer system immune to all type of intrusions. The motivation behind this project is to develop a complement system i. e. Sybil detection that can prevent all possible breaks-ins. In Sybil attack each node can be preferred to as a separate webpage that the spammer creates, and each of these webpages interlink to each other thus forming a network similar to link farms. The spamming webpages link to other nodes and thus create a huge linked for improving popularity. In this paper we are introduce anti-image spamming technique for preventing to Sybil attack to attackers . Our objective is to work on to the real time research desired scenario where the work is needed to be done. Sybil attack is one of the scenario where a work has been done to deal with Sybil attack efficiently in some of the field but still there are more has to be done which we want to carry forward with the help of spamming image detection and prevention technique with the help of image anti-spamming technique. In this paper we present result analysis based on the Sybil detected by different technique performed by us.

  1. Neil Zhenqiang Gong, Student Member, IEEE, Mario Frank, and Prateek Mittal, Member, IEEE "SybilBelief: A Semi-Supervised Learning Approachfor Structure-Based Sybil Detection" IEEE Transactions On Information Forensics And Security, Vol. 9, No. 6, June 2014.
  2. Bimal Viswanath, Mainack Mondal, Allen Clement, Peter Druschel, Krishna P. Gummadi, Alan Mislove, and Ansley Post, "Exploring the design space of social network-based Sybil defenses", IEEE 2012.
  3. C. Lesniewski-Laas and M. F. Kaashoek. Whanau: A sybil-proof distributed hash table. In Proc. NSDI'10, San Jose, CA, Apr 2010.
  4. B. Vishwanath, A. Post, K. Gummadi and A. Mislove. An analysis of social network-based Sybil defenses. In Proc. Of ACM SIGCOMM, 2010.
  5. C. Zhang and J. Sun. Privacy and Security for Online Social Networks: Challenges and Opportunities. In IEEE Network, 2010.
  6. J. Douceur. The sybil attack. In Proceedings of the First International Workshop on Peer-to-Peer Systems 200, Cambridge, MA, March 2002.
  7. I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM 2001, August 2001.
  8. A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In IFIP/ACM Middleware. Heidelberg, Germany, 2001.
  9. S. Ratnasamy, P. Francis, M. Handley, and R. Karp. A scalable contentaddressable network. In SIGCOMM 2001.
  10. E. Sit and R. Morris. Security considerations for peer-to peer distributed hash table. In 1st International Workshop on Peer-to-Peer Systems, Cambridge, MA, March 2002.
  11. M. Srivatsa and L. Liu. Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In ACSAC 2004.
  12. AXinwen Fu and Zhen Ling, "One Cell is Enough to Break Tor's Anonymity" in Internet Measurement Comference, 2009, pp. 29–42.
  13. George forman,Evan Kirshenbaum "Extremely fast feature extraction for classification and indexing," in LabsHp.
  14. Julinda Gllavata1, Ralph Ewerth1and Bernd Freisleben1,2"A robust algorithm for text detection in image" University of Marburg.
  15. Babloo Saha and Shuchi Sharma, "Steganographic Techniques of Data Hiding using Digital Images" in Defence Science Journal, Vol. 62, No. 1, January 2012, pp. 11-18, DOI: 10. 14429/dsj. 62. 1436.
  16. Clark F. Olson and Daniel P. Huttenlocher , "Automatic Target Recognition byMatching Oriented Edge Pixels" IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 6, NO. 1, JANUARY 1997.
  17. http://wis. ewi. tudelft. nl/umap2011/#dataset.
  18. http://www. jfree. org/jfreechart/api/javadoc/org/jfree/chart/package-summary. html.
Index Terms

Computer Science
Information Sciences


Anti-image spamming Sybil attack Social Network OCR Technique