Preprint Article Version 1 This version is not peer-reviewed

Enhancing Security in Social Networks through ML: Detecting and Mitigating Sybil Attacks

Version 1 : Received: 3 August 2024 / Approved: 7 August 2024 / Online: 8 August 2024 (11:44:28 CEST)

How to cite: Cárdenas-Haro, J. A.; Salem, M.; Aldaco-Gastélum, A. N.; López-Avitia, R.; Dawson, M. Enhancing Security in Social Networks through ML: Detecting and Mitigating Sybil Attacks. Preprints 2024, 2024080542. https://doi.org/10.20944/preprints202408.0542.v1 Cárdenas-Haro, J. A.; Salem, M.; Aldaco-Gastélum, A. N.; López-Avitia, R.; Dawson, M. Enhancing Security in Social Networks through ML: Detecting and Mitigating Sybil Attacks. Preprints 2024, 2024080542. https://doi.org/10.20944/preprints202408.0542.v1

Abstract

This study contributes to the Sybil nodes detecting algorithm in Online Social Networks (OSNs). As major communication platforms, online social networks get significantly guarded from malicious activity. A thorough literature review identified various detection and prevention Sybil attack algorithms. Additional exploration of distinct reputation systems and their practical application led to the study’s discovery of machine learning algorithms, i.e., the KNN, Support Vector Machines, and Random Forest algorithms. The study details the data cleansing process for the employed dataset in its process for optimizing the computational demands required to train machine learning algorithms, achieved through dataset partitioning. Such a process led to explaining and analysis of conducting experiments and comparing their results. Such experiments demonstrate the algorithm’s ability to detect Sybil nodes in OSNs (100% accuracy in SVM, 99.6% in Random Forest, and 97% in KNN algorithms); thus concluding by proposing future research opportunities.

Keywords

machine learning; sybil attacks; online social networks; cybersecurity; random forest; support vector machine; KNN 

Subject

Computer Science and Mathematics, Artificial Intelligence and Machine Learning

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.