IEEE Access (Jan 2020)

A Content-Based Method for Sybil Detection in Online Social Networks via Deep Learning

  • Tianyu Gao,
  • Jin Yang,
  • Wenjun Peng,
  • Luyu Jiang,
  • Yihao Sun,
  • Fangchuan Li

DOI
https://doi.org/10.1109/ACCESS.2020.2975877
Journal volume & issue
Vol. 8
pp. 38753 – 38766

Abstract

Read online

Online social networks (OSNs) are generally susceptible to Sybil attack, which causes a series of cybersecurity problems and privacy violations. Malicious attackers can create massive Sybils and further utilize those fake identities to launch various Sybil attacks. Therefore, Sybil detection in OSNs has become an urgent security research problem for both academia and industries. The existing content-based methods to detect Sybils base on the combination of manual-design features and machine learning algorithms, which requires lots of professional experiences and human effort. These methods divide the Sybil detection problem into two piece-wise sub-problems, which prevents us from getting the optimal solution. In this work, we propose a novel content-based method to detect Sybils. The proposed method is an end-to-end classification model that extracts features directly from the input data, and then output the classification results in a unified framework. The proposed method includes three main parts: first, the self-normalizing convolutional neural network (CNN) is adopted to extract lower features from the multi-dimensional input data; second, the bidirectional self-normalizing LSTM network (bi-SN-LSTM) is developed to extract higher features from the compressed feature map sequence; third, the dense layer and softmax classifier are stacked to output the classification results. Unlike the traditional bidirectional long short-term memory network (bi-LSTM), the proposed bi-SN-LSTM network utilizes SELU as the activation function of its recurrent step, which provides unbounded changes to the state value. Through the case study of the real-world dataset, the comparison experiments demonstrate that our method significantly outperforms other state-of-the-art methods.

Keywords