SybilDefense: Defending Sybil attacks using techniques from Complex Systems
نویسندگان
چکیده
Web 2.0 applications and websites towards social news, gaming and networking are particularly vulnerable to Sybil attacks. In a Sybil attack, a malicious user assumes many fake identities, and pretends to be multiple honest users in the system. By controlling a certain fraction of the nodes in the system, he out votes the honest users to promote his own news articles, which poses a threat to the functionality of the original application. Recent Sybil defense mechanisms are based on an assumption that malicious users might take several fake identities but few trust relationships. This assumption holds well for some peer to peer systems and distributed systems. However, recent studies on Facebook show sixty percent of users are willing to except friendship requests from unknown users. Furthermore, on Social news websites like Digg.com and career networking websites like Linkedin, a user is more willing to make connections with new and unknown people. In this work, we explore both SybilDefense mechanisms at the level of recommendation algorithms that applications could use to make it hard for Sybil nodes to control an application despite out voting the honest users. We also look at SybilDefense mechanisms from the prior trust assumption, and compare it to existing defense techniques.
منابع مشابه
Random Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملAn Efficient Method to Detect Sybil Attack using Trust based Model
Sybil attack is one of the most severe attacks in the vast domain of ad-hoc network. Mobile Ad-hoc Network (MANET) has to face this attack in its different application areas due to its inherent properties like mobility, absence of centralized infrastructure and limited resources. In this paper the threats of Sybil attacks in different environment of MANET is discussed briefly and taxonomy of va...
متن کاملThe Sybil Attacks and Defenses: A Survey
In this paper we have a close look at the Sybil attack and advances in defending against it, with particular emphasis on the recent work. We identify three major veins of literature work to defend against the attack: using trusted certification, using resources testing, and using social networks. The first vein of literature considers defending against the attack using trusted certification, wh...
متن کاملProtecting the Tor network from Sybil attacks Talk proposal
The Tor network is periodically subject to Sybil attacks. Most of these attacks were not carefully executed and Tor directory authority operators were quick to detect and block the malignant relays. However, the Tor network lacks sophisticated tools to detect and protect against Sybil attacks. As a result, more advanced attacks could remain undetected. While there is a large body of work dedica...
متن کاملDesign and Applications of a Secure and Decentralized Distributed Hash Table
Distributed Hash Tables (DHTs) are a powerful building block for highly scalable decentralized systems. They route requests over a structured overlay network to the node responsible for a given key. DHTs are subject to the well-known Sybil attack, in which an adversary creates many false identities in order to increase its influence and deny service to honest participants. Defending against thi...
متن کامل