Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
dc.contributor.author | Muhammad Taha Yousaf, 01-243212-014 | |
dc.date.accessioned | 2023-12-19T04:12:51Z | |
dc.date.available | 2023-12-19T04:12:51Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://hdl.handle.net/123456789/16841 | |
dc.description | Supervised by Dr. Saba Mahmood | en_US |
dc.description.abstract | Online social networks (OSNs) like Facebook and Twitter have become increasingly popular, offering a wide range of virtual interaction techniques and real-world social connections. The users of social media increasing day-by-day, these networks are expected to expand as mobile device usage and mobile social networks become more popular. However, Sybil attacks are a growing security issue in OSNs, where attackers use various methods to target large populations, creating fake identities and accessing networks. We carried out the comparison between ”Content based”, and ”user behavior based and graph based hybrid approach” to detect the Sybil’s attacks in OSNs. For user behavior and graph based approach, we extract the features from dataset and then find the behavior-similarities between the nodes and find the betweenness centrality between nodes. Behavior similarities values assigned to the edges as weights. and betweenness centrality value assigned to nodes. To detect Sybil nodes we define the threshold 20%, the behavior similarities value less then the threshold value, the edge become a Sybil edge whereas the to detect sybil nodes, the value of betweenness centrality less the threshold, the node become a Sybil node. For content based approach, we detect Sybil nodes in OSNs.Content based approach utilizes Machine Learning algorithms suc as Naive Basiyan, Multi Laye precepton, KNN, Random Forest, Logistic regression, SVC and ADA Boost. The Random Forest Algorithms perform well from all these algorithms to identifies Sybil nodes with high accuracy, precision and recall. we compared these two approaches to identify the attack edges and sybil nodes in social networks and the results revealed that the user behavior based and graph based hybrid technique perform well in term to identify the Sybil attacks with accuracy of 98.87%. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Computer Sciences | en_US |
dc.relation.ispartofseries | MS(CS);T-02076 | |
dc.subject | Detection | en_US |
dc.subject | Sybil Attacks | en_US |
dc.subject | Online Social Networks | en_US |
dc.title | Detection of Sybil Attacks in Online Social Networks | en_US |
dc.type | Thesis | en_US |