To see the other types of publications on this topic, follow the link: Sybil attack.

Dissertations / Theses on the topic 'Sybil attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 26 dissertations / theses for your research on the topic 'Sybil attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Tefera, Mismaku Hiruy. "Attacks on structured P2P overlay networks : Simulating Sybil Attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-21166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saoud, Zohra. "Approche robuste pour l’évaluation de la confiance des ressources sur le Web." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE1331/document.

Full text
Abstract:
Cette thèse en Informatique s'inscrit dans le cadre de gestion de la confiance et plus précisément des systèmes de recommandation. Ces systèmes sont généralement basés sur les retours d'expériences des utilisateurs (i.e., qualitatifs/quantitatifs) lors de l'utilisation des ressources sur le Web (ex. films, vidéos et service Web). Les systèmes de recommandation doivent faire face à trois types d'incertitude liés aux évaluations des utilisateurs, à leur identité et à la variation des performances des ressources au fil du temps. Nous proposons une approche robuste pour évaluer la confiance en ten
APA, Harvard, Vancouver, ISO, and other styles
3

Vora, Adnan Zoeb. "Efficient Location Verification, Neighbor Discovery and Routing in Ad Hoc Wireless Networks." Kent State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=kent1254767819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cappelleri, Vincenzo-Maria. "Randomness, Age, Work: Ingredients for Secure Distributed Hash Tables." Doctoral thesis, Università degli studi di Padova, 2017. http://hdl.handle.net/11577/3423231.

Full text
Abstract:
Distributed Hash Tables (DHTs) are a popular and natural choice when dealing with dynamic resource location and routing. DHTs basically provide two main functions: saving (key, value) records in a network environment and, given a key, find the node responsible for it, optionally retrieving the associated value. However, all predominant DHT designs suffer a number of security flaws that expose nodes and stored data to a number of malicious attacks, ranging from disrupting correct DHT routing to corrupting data or making it unavailable. Thus even if DHTs are a standard layer for some mainstream
APA, Harvard, Vancouver, ISO, and other styles
5

Martucci, Leonardo Augusto. "Identity and Anonymity in Ad Hoc Networks." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-3981.

Full text
Abstract:
In ad hoc networks every device is responsible for its own basic computer services, including packet routing, data forwarding, security, and privacy. Most of the protocols used in wired networks are not suitable for ad hoc networks, since they were designed for static environments with defined borders and highly specialized devices, such as routers, authentication servers, and firewalls. This dissertation concentrates on the achievement of privacy-friendly identifiersand anonymous communication in ad hoc networks. In particular, the objective is to offer means for better anonymous communicatio
APA, Harvard, Vancouver, ISO, and other styles
6

Cordeiro, Weverton Luis da Costa. "Limiting fake accounts in large-scale distributed systems through adaptive identity management." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/90442.

Full text
Abstract:
Sistemas online como Facebook, Twitter, Digg, e comunidades BitTorrent (entre vários outros) oferecem um processo leve para a obtenção de identidades (por exemplo, confirmar um endereço de e-mail válido; os requisitos podem variar dependendo do sistema), de modo que os usuários possam cadastrar-se facilmente nos mesmos. Tal conveniência vem com um preço, no entanto: com um pequeno esforço, um atacante pode obter uma grande quantidade de contas falsas (ataque Sybil), e utilizá-las para executar atividades maliciosas (que possam prejudicar os usuários legítimos) ou obter vantagens indevidas. É e
APA, Harvard, Vancouver, ISO, and other styles
7

Cholez, Thibault. "Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus." Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00608907.

Full text
Abstract:
L'objectif de cette thèse est de concevoir et d'appliquer de nouvelles méthodes de supervision capables d'appréhender les problèmes de sécurité affectant les données au sein des réseaux P2P structurés (DHT). Ceux-ci sont de deux types. D'une part les réseaux P2P sont utilisés pour diffuser des contenus illégaux dont l'activité est difficile à superviser. D'autre part, l'indexation des contenus légitimes peut être corrompue (attaque Sybil). Nous proposons tout d'abord une méthode de supervision des contenus basée sur l'insertion de sondes et le contrôle du mécanisme d'indexation du réseau. Cell
APA, Harvard, Vancouver, ISO, and other styles
8

Cholez, Thibault. "Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus." Electronic Thesis or Diss., Nancy 1, 2011. http://www.theses.fr/2011NAN10036.

Full text
Abstract:
L'objectif de cette thèse est de concevoir et d'appliquer de nouvelles méthodes de supervision capables d'appréhender les problèmes de sécurité affectant les données au sein des réseaux P2P structurés (DHT). Ceux-ci sont de deux types. D'une part les réseaux P2P sont utilisés pour diffuser des contenus illégaux dont l'activité est difficile à superviser. D'autre part, l'indexation des contenus légitimes peut être corrompue (attaque Sybil).Nous proposons tout d'abord une méthode de supervision des contenus basée sur l'insertion de sondes et le contrôle du mécanisme d'indexation du réseau. Celle
APA, Harvard, Vancouver, ISO, and other styles
9

Tan, Enhua. "Spam Analysis and Detection for User Generated Content in Online Social Networks." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1365520334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barbu, Filimon. "Detection of and Prevention from Sybil Attacks in Internet of Things - a literature review." Thesis, Högskolan i Halmstad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Qianlong. "Blockchain-Empowered Secure Machine Learning and Applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1625183576139299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Fredriksson, Tony, and Niklas Ljungberg. "Security in low power wireless networks : Evaluating and mitigating routing attacks in a reactive, on demand ad-hoc routing protocol." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-145362.

Full text
Abstract:
Using low energy devices to communicate over the air presents many challenges to reach security as resources in the world of Internet Of Things (IoT) are limited. Any extra overhead of computing or radio transmissions that extra security might add affects cost of both increased computing time and energy consumption which are all scarce resources in IoT. This thesis details the current state of security mechanisms built into the commercially available protocol stacks Zigbee, Z-wave, and Bluetooth Low Energy, and collects implemented and proposed solutions to common ways of attacking systems bui
APA, Harvard, Vancouver, ISO, and other styles
13

Gu, Pengwenlong. "Détection des comportements malveillants dans les réseaux véhiculaires." Electronic Thesis or Diss., Paris, ENST, 2018. https://pastel.hal.science/tel-03689506.

Full text
Abstract:
Dans cette thèse, nous nous sommes concentrés sur deux problèmes majeurs de la couche PHY et de la couche d'application: les attaques jamming de radiofréquence et les attaques Sybil. En particulier, nous avons adopté trois méthodes différentes de machine learning pour la détection des nœuds Sybil: Distance based clustering, Support Vector Machine (SVM) et k-nearest neighbours (kNN). Basé sur la base de la variation entre les véhicules légitimes et les nœuds Sybil dans leurs formes de conduite, les nœuds virtuels inexistants peuvent être détectés. Pour les attaques jamming de radiofréquence, no
APA, Harvard, Vancouver, ISO, and other styles
14

Luo, Yuhang. "Efficiency Study of Sybil Attack on P2P Botnets." Thesis, 2012. http://spectrum.library.concordia.ca/973787/1/Luo_MSc_S2012.pdf.

Full text
Abstract:
Abstract Efficiency Study of Sybil Attack on P2P Botnets Yuhang Luo The main objective of this thesis is to modeling and analysis of Kademlia based Botnets in order to study the efficiency of Sybil attack on such botnets. We start by researching the structure of Kademlia and specially its look-up procedure, i.e. the process how a node find a desired target node in the Botnet. For the simplicity of analysis, two assumptions are made: a) node ID space is full filled; b) a Sybil node replies a fake triple when it is queried.With these assumptions, the probability jumping functions and ju
APA, Harvard, Vancouver, ISO, and other styles
15

Guo, Feng. "Analysis of Sybil Attack in Kademlia based P2P Botnets." Thesis, 2013. http://spectrum.library.concordia.ca/978139/1/Guo_MSc_F2013.pdf.

Full text
Abstract:
This thesis focused on Sybil attack analysis in Peer-to-Peer botnet based on Kademlia network protocol and architecture. With the consideration of the node space may not be full, each node location was assumed to have a probability p to be taken. The objective of this research is to theoretically evaluate such botnet/network’s robustness under two types of malicious attack - random Sybil attack and fake target attack. Probability of successfully finding a target node that can be possibly locating anywhere in the network is taken as the main evaluation factor. With different key parameters, mat
APA, Harvard, Vancouver, ISO, and other styles
16

Ming-YuHuang and 黃明鈺. "Sybil Attack Detection based on Group Clustering for Social Networks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/wz3ur3.

Full text
Abstract:
碩士<br>國立成功大學<br>電腦與通信工程研究所<br>102<br>Recently, social network has become more popular in the Internet. In some social network, such as eBay, Google+ ... etc, have a score mechanism that scores for a set of objects (e.g. service providers, services, goods or entities). We call that the reputation system. A malicious user use a lot of multiple virtual identity attempt to influence the operation of the trust system that called Sybil Attack. We also call these nodes which the malicious user created are Sybil Nodes. The thesis proposed the different approach to detect the Sybil Nodes in social netw
APA, Harvard, Vancouver, ISO, and other styles
17

"Detecting Sybil Nodes in Static and Dynamic Networks." Doctoral diss., 2010. http://hdl.handle.net/2286/R.I.8797.

Full text
Abstract:
abstract: Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, a reputation system is used for the nodes, built through observing its interactions with its peers. The construction makes every node a part of a distributed authority that keeps records on the reputation and behavior of the nodes. Re
APA, Harvard, Vancouver, ISO, and other styles
18

Verigin, Adam Louis. "Evaluating the Effectiveness of Sybil Attacks Against Peer-to-Peer Botnets." Thesis, 2013. http://hdl.handle.net/1828/5095.

Full text
Abstract:
Botnets are networks of computers which have been compromised by malicious software which enables a remotely located adversary to control them and focus their collective power on specific tasks. Botnets pose a significant global threat, with tangible political, economic and military ramifications and have resultingly become a field of significant interest within the cyber-security research community. While a number of effective defence techniques have been devised for botnets utilizing centralized command and control infrastructures, few of these techniques are suitable for defending against l
APA, Harvard, Vancouver, ISO, and other styles
19

OUEDRAOGO, Abdoul Mouhaimini, and 魏海明. "Wireless Sensor Network Security: A Sybil Attack Detection using IPV6, MAC Address and Salt." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/g36ya7.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊管理研究所<br>106<br>Today internet becomes very scalable and sometimes difficult to manage. However, to the best of our knowledge, wireless communication systems are recognizing as less secure and exposed to numerous attacks. The usage of Wireless Sensor Networks(WSNs) in different fields is possible nowadays due to the ease of their deployment and the reduction of their cost. Wireless Sensor Networks are growing considerably and they are useful to our daily life. Nevertheless, we need to provide a high security to the WSNs because of the sensitivity that the sensor nodes carry o
APA, Harvard, Vancouver, ISO, and other styles
20

Cheng, Sheng-Hong, and 鄭勝鴻. "Defense and Detection of Sybil Attack Using Byzantine Agreement Algorithm in Mobile Ad Hoc Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/24pgmr.

Full text
Abstract:
碩士<br>淡江大學<br>資訊工程學系碩士班<br>106<br>The topology of mobile ad hoc networks (MANET) is dynamic, can be quickly configured, and lacks features such as wireless APs and adapters. Due to these benefits, a MANET system is able to be applied to specific situations, such as search and rescue operations, military use or emergency operations. Based on the routing protocol, node connections provide information to each other and can jointly establish a complete transmission path independently. But security is a major issue in MANET systems. Because MANET system are open and perform on a non-centralized inf
APA, Harvard, Vancouver, ISO, and other styles
21

Sirivianos, Michael. "Toward Attack-Resistant Distributed Information Systems by Means of Social Trust." Diss., 2010. http://hdl.handle.net/10161/2282.

Full text
Abstract:
<p>Trust has played a central role in the design of open distributed systems that span distinct administrative domains. When components of a distributed system can assess the trustworthiness of their peers, they are in a better position to interact with them. There are numerous examples of distributed systems that employ trust inference techniques to regulate the interactions of their components including peer-to-peer file sharing systems, web site and email server reputation services and web search engines.</p> <p>The recent rise in popularity of Online Social Networking (OSN) services
APA, Harvard, Vancouver, ISO, and other styles
22

Padhan, Sanjeeb Kumar, and Soumya Ranjan Mund. "A power efficient method against misbehaving node in reputation system to prevent sybil attack in mobile ad-hoc network." Thesis, 2012. http://ethesis.nitrkl.ac.in/3827/1/Final_Year_Project(Sanjeeb_and_Soumya).pdf.

Full text
Abstract:
Mobile ad-hoc network has become a very important field of study for students and researchers owing to its wide application. In mobile ad-hoc network all nodes are responsible for routing and forwarding of packets, hence all nodes are required to act selflessly for proper functioning of mobile ad-hoc network. The presence of selfish behavior in a node can degrade the performance of the mobile ad hoc network to a large extent. Several works have been done for identification and punishment of the misbehaving nodes in mobile ad hoc network. We propose here a method where some selected neighbors a
APA, Harvard, Vancouver, ISO, and other styles
23

Jan, Mian Ahmad. "Energy-efficient routing and secure communication in wireless sensor networks." Thesis, 2016. http://hdl.handle.net/10453/43497.

Full text
Abstract:
University of Technology Sydney. Faculty of Engineering and Information Technology.<br>Wireless Sensor Networks (WSNs) consist of miniature sensor nodes deployed to gather vital information about an area of interest. The ability of these networks to monitor remote and hostile locations has attracted a significant amount of research over the past decade. As a result of this research, WSNs have found their presence in a variety of applications such as industrial automation, habitat monitoring, healthcare, military surveillance and transportation. These networks have the ability to operate in hum
APA, Harvard, Vancouver, ISO, and other styles
24

Wu, Kung-Han, and 吳恭漢. "Study on Detection of Sybil Attacks in Wireless Sensor Networks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/15845731698494670648.

Full text
Abstract:
碩士<br>國立臺北教育大學<br>資訊科學系碩士班<br>104<br>The advent of the digital age has brought explosive development of communication technologies and mobile computing devices, such as smart phone and tablet PC, are widely used. These devices are usually embedded with multiple sensors, such as GPS and digital compass sensors. These new technologies can be used to collect data from the surrounding environment to a central controller so as to develop different applications. Therefore, security is an important issue in wireless sensor networks. Wireless sensor network mainly suffers security threats from a varie
APA, Harvard, Vancouver, ISO, and other styles
25

Chang, Wen-Chung, and 張文中. "Detecting Sybil Attacks with Neighboring Information in Wireless Sensor Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/86053560474594668082.

Full text
Abstract:
碩士<br>國立成功大學<br>電腦與通信工程研究所<br>95<br>As widely used in the military and civilians, security has become an important issue in Wireless Sensor Networks (WSNs). The Sybil attack is a notorious attack in sensor and peer-to-peer networks. In the Sybil attack, a malicious node illegitimately claims a lot of identities to other nodes and try to disturb the networks by those forged identities. Most previous solutions focus on authentication-based mechanisms which share some encryption keys and verify the identities of each other. Different from previous solutions, this thesis proposed a method which ne
APA, Harvard, Vancouver, ISO, and other styles
26

Govender, Servapalan. "A framework for evaluating countermeasures against sybil attacks in wireless sensor networks." Diss., 2011. http://hdl.handle.net/2263/26241.

Full text
Abstract:
Although Wireless Sensor Networks (WSNs) have found a niche in numerous applications, they are constrained by numerous factors. One of these important factors is security in WSNs. There are various types of security attacks that WSNs are susceptible to. The focus of this study is centred on Sybil attacks, a denial of service attack. In this type of attack, rogue nodes impersonate valid nodes by falsely claiming to possess authentic identities, thereby rendering numerous core WSN operations ineffective. The diverse nature of existing solutions poses a difficult problem for system engineers want
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!