Web3 Sybil avoidance using network latency
نویسندگان
چکیده
Web3 is emerging as the new Internet-interaction model that facilitates direct collaboration between strangers without a need for prior trust network participants and central authorities. However, one of its shortcomings lack defense mechanism against ability single user to generate surplus identities, known Sybil attack. has attack problem because it uses peer sampling establish connections users. We evaluate promising but under-explored direction avoidance using latency measurements, according which two identities with equal latencies are suspected be operated from same node, thus likely Sybils. Network measurements have desirable properties: they only malleable by attackers adding latency, do not require any participants. Our basic SybilSys avoids if actively exploit their malleability. present an enhanced version protects targeted attacks variant flow correlation attack, we name TrafficJamTrigger. show how message flows Round-Trip Time can used expose patterns propose six classifiers recognize these patterns. experiments show, through both emulation real-world deployment, serve fundamental role Web3, effectively establishing real users even in face networks consisting 99%
منابع مشابه
Detecting Sybil Attacks in Image Sensor Network Using Cognitive Intelligence
Wireless Sensor Network (WSN) is applied in many indoor and outdoor applications, such as military, building security surveillance system, environmental monitoring, health-care etc. In this paper, an Image Sensor Network (ISN) under Sybil attack is analyzed and a novel detection mechanism using hypothesis testing with Cognitive Intelligence is proposed. The performance of the application solely...
متن کاملassessment of the efficiency of s.p.g.c refineries using network dea
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
SybilInfer: Detecting Sybil Nodes using Social Networks
SybilInfer is an algorithm for labelling nodes in a social network as honest users or Sybils controlled by an adversary. At the heart of SybilInfer lies a probabilistic model of honest social networks, and an inference engine that returns potential regions of dishonest nodes. The Bayesian inference approach to Sybil detection comes with the advantage label has an assigned probability, indicatin...
متن کاملThwarting Sybil Attack using ElGamal Algorithm
MANET is an independent and infrastructureless network comprising of self configurable mobile nodes connected via wireless links. MANET is susceptible to various attacks because of some loopholes present in MANET like dynamic topology, zero central administration, limited physical security etc. MANET is prone to numerous malicious attacks one such attack among them is SYBIL ATTACK. In Sybil att...
متن کاملProtecting the Tor network from Sybil attacks Talk proposal
The Tor network is periodically subject to Sybil attacks. Most of these attacks were not carefully executed and Tor directory authority operators were quick to detect and block the malignant relays. However, the Tor network lacks sophisticated tools to detect and protect against Sybil attacks. As a result, more advanced attacks could remain undetected. While there is a large body of work dedica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Networks
سال: 2023
ISSN: ['1872-7069', '1389-1286']
DOI: https://doi.org/10.1016/j.comnet.2023.109701