Sybil attack

Sybil attack

The Sybil attack in computer security is an attack wherein a reputation system is subverted by forging identities in peer-to-peer networks.

Description

A Sybil attack is one in which an attacker subverts the reputation system of a peer-to-peer network by creating a large number of pseudonymous entities, using them to gain a disproportionately large influence. A reputation system's vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically. It is named after the subject of the book "Sybil", a case study of a woman with multiple personality disorder.

An "entity" on a peer-to-peer network is a piece of software which has access to local resources. An entity advertises itself on the peer-to-peer network by presenting itself with an "identity". More than one identity can correspond to a single entity (mathematically expressed, the mapping of identities to entities is many to one). Entities in peer-to-peer networks use multiple identities for purposes of redundancy, resource sharing, reliability and integrity. In peer-to-peer networks the identity is used as an abstraction so that a remote entity is aware of identities without necessarily knowing the correspondence of the identities with their local entities. By default, the distinct identities are assumed to correspond to a distinct local entity. In reality they may correspond to a same local entity.

A faulty node or an adversary may present itself with multiple identities in a peer-to-peer network to appear and function as distinct nodes. By becoming part of the peer-to-peer network, the adversary may then overhear communications or act maliciously. By masquerading and presenting multiple identities, the adversary can control the network substantially.

Prevention

Validation techniques can be used to prevent Sybil attacks and dismiss masquerading hostile entities. A local entity may accept a remote identity based on a central authority which ensures a one-to-one correspondence between an identity and an entity and may even provide a reverse lookup. An identity may be validated either directly or indirectly. In direct validation the local entity queries the central authority to validate the remote identities. In indirect validation the local entity relies on already accepted identities which in turn vouch for the validity of the remote identity in question.

Identity-based validation techniques generally provide accountability at the expense of anonymity, which can be an undesirable tradeoff especially in online forums that wish to permit censorship-free information exchange and open discussion of sensitive topics. A validation authority can attempt to preserve users' anonymity by refusing to perform reverse lookups, but this approach makes the validation authority a prime target for attack. Alternatively, the authority can use some mechanism other than knowledge of a user's real identity - such as verification of an "unidentified" person's physical presence at a particular place and time - to enforce a one-to-one correspondence between online identities and real-world users.

Sybil prevention techniques based on the connectivity characteristics of social graphs can also limit the extent of damage that can be caused by a given sybil attacker while preserving anonymity, though these techniques cannot prevent sybil attacks entirely, and may be vulnerable to widespread small-scale sybil attacks.

References

* [http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf The Sybil Attack by John R. Douceur]
* [http://portal.acm.org/citation.cfm?id=1159945 SybilGuard: defending against sybil attacks via social networks by Haifeng Yu]
* [http://thrackle.eas.asu.edu/users/goran/papers/dc06.pdf On the establishment of distinct identities in overlay networks by Rida A. Bazzi and Goran Konjevod]
* [http://pdos.csail.mit.edu/papers/accountable-pseudonyms-socialnets08.pdf An Offline Foundation for Online Accountable Pseudonyms by Bryan Ford and Jacob Strauss]
* [http://pdos.csail.mit.edu/papers/sybil-dht-socialnets08.pdf A Sybil-proof one-hop DHT by Chris Lesniewski-Laas]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Sybil — In antiquity, the oracular seeresses of the Ancient Near East and the Mediterranean were referred to by the Greek term sibyls . In modern times, when Sibyl is adopted for a woman s name, the conventional spelling is Sybil .People*Sybil (Lynch),… …   Wikipedia

  • Ludington, Sybil — ▪ American Revolutionary War heroine married name  Sybil Ogden  born April 5, 1761, Fredericksburg [now Ludingtonville], N.Y. [U.S.] died Feb. 26, 1839, Unadilla, N.Y., U.S.       American Revolutionary War (American Revolution) heroine,… …   Universalium

  • Spamdexing — For spam on Wikipedia, see Wikipedia:Spam and Wikipedia:WikiProject Spam. In computing, spamdexing (also known as search spam, search engine spam, web spam or Search Engine Poisoning)[1] is the deliberate manipulation of search engine indexes. It …   Wikipedia

  • Reputation system — A reputation system is a type of collaborative filtering algorithm which attempts to determine ratings for a collection of entities, given a collection of opinions that those entities hold about each other. This is similar to a recommendation… …   Wikipedia

  • Sockpuppet (Internet) — For Wikipedia policy on sockpuppets, see Wikipedia:Sock puppetry A sockpuppet is an online identity used for purposes of deception. The term a reference to the manipulation of a simple hand puppet made from a sock originally referred to a false… …   Wikipedia

  • Consensus (computer science) — Consensus is a problem in distributed computing that encapsulates the task of group agreement in the presence of faults.[1] In particular, any process in the group may fail at any time. Consensus is fundamental to core techniques in fault… …   Wikipedia

  • Google-Spamming — Unter Suchmaschinen Spamming (Search Engine Spamming) oder Index Spamming (Spamdexing) versteht man alle Handlungen, die dazu führen, dass eine Internet Suchmaschine auf eine Suchworteingabe hin auf den vordersten Plätzen Webseiten ausgibt, die… …   Deutsch Wikipedia

  • Spamdexing — Unter Suchmaschinen Spamming (Search Engine Spamming) oder Index Spamming (Spamdexing) versteht man alle Handlungen, die dazu führen, dass eine Internet Suchmaschine auf eine Suchworteingabe hin auf den vordersten Plätzen Webseiten ausgibt, die… …   Deutsch Wikipedia

  • Suchmaschinen-Spam — Unter Suchmaschinen Spamming (Search Engine Spamming) oder Index Spamming (Spamdexing) versteht man alle Handlungen, die dazu führen, dass eine Internet Suchmaschine auf eine Suchworteingabe hin auf den vordersten Plätzen Webseiten ausgibt, die… …   Deutsch Wikipedia

  • Suchmaschinen-Spamming — Unter Suchmaschinen Spamming (Search Engine Spamming) oder Index Spamming (Spamdexing) versteht man alle Handlungen, die dazu führen, dass eine Internet Suchmaschine auf eine Suchworteingabe hin auf den vordersten Plätzen Webseiten ausgibt, die… …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”