Web3 Sybil avoidance using network latency

نویسندگان

چکیده

Web3 is emerging as the new Internet-interaction model that facilitates direct collaboration between strangers without a need for prior trust network participants and central authorities. However, one of its shortcomings lack defense mechanism against ability single user to generate surplus identities, known Sybil attack. has attack problem because it uses peer sampling establish connections users. We evaluate promising but under-explored direction avoidance using latency measurements, according which two identities with equal latencies are suspected be operated from same node, thus likely Sybils. Network measurements have desirable properties: they only malleable by attackers adding latency, do not require any participants. Our basic SybilSys avoids if actively exploit their malleability. present an enhanced version protects targeted attacks variant flow correlation attack, we name TrafficJamTrigger. show how message flows Round-Trip Time can used expose patterns propose six classifiers recognize these patterns. experiments show, through both emulation real-world deployment, serve fundamental role Web3, effectively establishing real users even in face networks consisting 99%

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Sybil Attacks in Image Sensor Network Using Cognitive Intelligence

Wireless Sensor Network (WSN) is applied in many indoor and outdoor applications, such as military, building security surveillance system, environmental monitoring, health-care etc. In this paper, an Image Sensor Network (ISN) under Sybil attack is analyzed and a novel detection mechanism using hypothesis testing with Cognitive Intelligence is proposed. The performance of the application solely...

متن کامل

assessment of the efficiency of s.p.g.c refineries using network dea

data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...

SybilInfer: Detecting Sybil Nodes using Social Networks

SybilInfer is an algorithm for labelling nodes in a social network as honest users or Sybils controlled by an adversary. At the heart of SybilInfer lies a probabilistic model of honest social networks, and an inference engine that returns potential regions of dishonest nodes. The Bayesian inference approach to Sybil detection comes with the advantage label has an assigned probability, indicatin...

متن کامل

Thwarting Sybil Attack using ElGamal Algorithm

MANET is an independent and infrastructureless network comprising of self configurable mobile nodes connected via wireless links. MANET is susceptible to various attacks because of some loopholes present in MANET like dynamic topology, zero central administration, limited physical security etc. MANET is prone to numerous malicious attacks one such attack among them is SYBIL ATTACK. In Sybil att...

متن کامل

Protecting the Tor network from Sybil attacks Talk proposal

The Tor network is periodically subject to Sybil attacks. Most of these attacks were not carefully executed and Tor directory authority operators were quick to detect and block the malignant relays. However, the Tor network lacks sophisticated tools to detect and protect against Sybil attacks. As a result, more advanced attacks could remain undetected. While there is a large body of work dedica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Networks

سال: 2023

ISSN: ['1872-7069', '1389-1286']

DOI: https://doi.org/10.1016/j.comnet.2023.109701