Using On-chain Data Modeling to Identify Sybil Attacks: Trusta Case Study