id author title date pages extension mime words sentences flesch summary cache txt en-wikipedia-org-9073 Sybil attack - Wikipedia .html text/html 2240 299 60 In a Sybil attack, the attacker subverts the reputation system of a network service by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. Known approaches to Sybil attack prevention include identity validation, social trust graph algorithms, or economic costs, personhood validation, and application-specific defenses. Practical network applications and services often use a variety of identity proxies to achieve limited Sybil attack resistance, such as telephone number verification, credit card verification, or even based on the IP address of a client. 6th ACM Conference on Data and Application Security and Privacy (CODASPY).CS1 maint: uses authors parameter (link) 30th IEEE Symposium on Security and Privacy.CS1 maint: uses authors parameter (link) 7th USENIX Symposium on Network Systems Design and Implementation (NSDI).CS1 maint: uses authors parameter (link) 7th USENIX Symposium on Network Systems Design and Implementation (NSDI).CS1 maint: uses authors parameter (link) ./cache/en-wikipedia-org-9073.html ./txt/en-wikipedia-org-9073.txt