What is it about?
This research looks at how people (or computers) can use multiple fake identities, known as Sybils, to hide their importance in a network. Network analysis tools often rely on "centrality" measures to find the most influential or important nodes, such as key individuals in social networks or critical servers on the Internet. We show how an attacker can split themselves into several connected identities and rearrange their connections in a way that makes them appear less important, even though their role in the network has not changed.
Featured Image
Photo by John Cardamone on Unsplash
Why is it important?
Many real-world systems, from online platforms and communication networks to security and intelligence analysis, depend on network metrics to identify key players and detect threats. Our findings show that these methods can be deliberately misled by adversaries who control multiple identities, potentially hiding influential or malicious entities. Understanding this vulnerability is essential for improving the reliability of network analysis tools and for designing more robust systems that can better protect security and privacy in online environments.
Perspectives
I find it fascinating how figures like Juan Pujol García or Sidney Reilly managed to operate by becoming multiple people at once, effectively hiding in plain sight. What used to be the domain of espionage is now something anyone can attempt online. This made me wonder: what if the tools we use to identify the most important or suspicious actors in a network can be tricked in the same way? In this work, I explore how influence can be concealed by "splitting" into multiple identities, and how surprisingly effective that strategy can be.
Marcin Waniek
Uniwersytet Warszawski
Read the Original
This page is a summary of: Sybil Attacks on Centrality Measures, April 2026, ACM (Association for Computing Machinery),
DOI: 10.1145/3774904.3792561.
You can read the full text:
Contributors
The following have contributed to this page







