skip to main content
article

SybilGuard: defending against sybil attacks via social networks

Published:11 August 2006Publication History
Skip Abstract Section

Abstract

Peer-to-peer and other decentralized,distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack,a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the system,the malicious user is able to "out vote" the honest users in collaborative tasks such as Byzantine failure defenses. This paper presents SybilGuard, a novel protocol for limiting the corruptive influences of sybil attacks.Our protocol is based on the "social network "among user identities, where an edge between two identities indicates a human-established trust relationship. Malicious users can create many identities but few trust relationships. Thus, there is a disproportionately-small "cut" in the graph between the sybil nodes and the honest nodes. SybilGuard exploits this property to bound the number of identities a malicious user can create.We show the effectiveness of SybilGuard both analytically and experimentally.

References

  1. Center for Computational Analysis of Social and Organizational Systems (CASOS), 2006. http://www.casos.cs.cmu.edu/computational_tools/data.php.]]Google ScholarGoogle Scholar
  2. International Network for Social Network Analysis, 2006. http://www.insna.org/INSNA/data_inf.htm.]]Google ScholarGoogle Scholar
  3. I. Abraham and D. Malkhi. Probabilistic quorums for dynamic systems. In DISC, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Bazzi and G. Konjevod. On the establishment of distinct identities in overlay networks. In ACM PODC ,2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. W. J. Bolosky, J. R. Douceur, D. Ely,and M. Theimer. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. In ACM SIGMETRICS, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah. Gossip algorithms: Design, analysis and applications. In IEEE INFOCOM, 2005.]]Google ScholarGoogle ScholarCross RefCross Ref
  7. A. Cheng and E. Friedman. Sybilproof reputation mechanisms. In ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Danezis, C. Lesniewski-Laas, M. F. Kaashoek, and R. Anderson. Sybil-resistant DHT routing. In European Symposium On Research In Computer Security, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Douceur. The Sybil attack. In IPTPS, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust incentive techniques for peer-to-peer networks. In ACM Electronic Commerce, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. D. Flaxman. Expansion and lack thereof in randomly perturbed graphs. Manuscript under submission, 2006.]]Google ScholarGoogle Scholar
  12. J. Kleinberg. The small-world phenomenon: An algorithm perspective. In STOC, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Maniatis, M. Roussopoulos, T. Giuli, D. S. H. Rosenthal, and M. Baker. The LOCKSS peer-to-peer digital preservation system. ACM TOCS, 23(1), 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Mitzenmacher and E. Upfal. Probability and Computing. Cambridge University Press, 2005.]]Google ScholarGoogle ScholarCross RefCross Ref
  15. R. Morselli, B. Bhattacharjee, A. Srinivasan, and M. Marsh. Efficient lookup on unstructured topologies. In ACM PODC, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil attack in sensor networks: Analysis & defenses. In ACM/IEEE IPSN, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. S. E. Ng and H. Zhang. Predicting internet network distance with coordinates-based approaches. In IEEE INFOCOM, 2002.]]Google ScholarGoogle ScholarCross RefCross Ref
  18. B. Parno, A. Perrig, and V. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In ACM SIGCOMM, 2006.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Richardson, R. Agrawal, and P.Domingos. Trust management for the semantic web. In International Semantic Web Conference, 2003.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. N. Sastry, U. Shankar, and D. Wagner. Secure verification of location claims. In ACM Workshop on Wireless Security, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In ACM SIGCOMM, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Telling humans and computers apart. In Eurocrypt, 2003.]]Google ScholarGoogle Scholar
  24. K. Walsh and E. G. Sirer. Experience with an object reputation system for peer-to-peer filesharing. In USENIX NSDI, 2006.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(6684), 1998.]]Google ScholarGoogle Scholar
  26. Y. Xie, V. Sekar, D. Maltz, M. Reiter, and H. Zhang. Worm origin identification using random moonwalks. In IEEE Symposium on Security and Privacy, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending against sybil attacks via social networks. Technical Report IRP-TR-06-01, Intel Research Pittsburgh, June 2006. Also available at http://www.cs.cmu.edu/.yhf/sybilguard-tr.pdf.]]Google ScholarGoogle Scholar

Index Terms

  1. SybilGuard: defending against sybil attacks via social networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 36, Issue 4
      Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
      October 2006
      445 pages
      ISSN:0146-4833
      DOI:10.1145/1151659
      Issue’s Table of Contents
      • cover image ACM Conferences
        SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
        September 2006
        458 pages
        ISBN:1595933085
        DOI:10.1145/1159913

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 August 2006

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader