An analysis of Social Network-based Sybil defenses
Bimal Viswanath§ Ansley Post§ Krishna Gummadi§ Alan Mislove¶
§MPI-SWS ¶Northeastern University
SIGCOMM 2010
1
An analysis of Social Network-based Sybil defenses Bimal Viswanath - - PowerPoint PPT Presentation
An analysis of Social Network-based Sybil defenses Bimal Viswanath Ansley Post Krishna Gummadi Alan Mislove MPI-SWS Northeastern University SIGCOMM 2010 1 Sybil attack Fundamental problem in distributed systems Attacker
Bimal Viswanath§ Ansley Post§ Krishna Gummadi§ Alan Mislove¶
§MPI-SWS ¶Northeastern University
SIGCOMM 2010
1
2
Used to manipulate the system
Webmail, social networks, p2p
2
Used to manipulate the system
Webmail, social networks, p2p
3
RESOURCE 1 Certification from trusted authorities
Users tend to resist such techniques RESOURCE 2 Resource challenges (e.g., cryptopuzzles) Vulnerable to attackers with significant resources
RESOURCE 3 Links in a social network?
Users mostly link to others they recognize
4
Users mostly link to others they recognize
4
Leverage the topological feature introduced by sparse set of links
5
Many schemes proposed over past five years
SybilGuard [SIGCOMM’06]
5
Many schemes proposed over past five years
SybilGuard [SIGCOMM’06] SybilLimit [Oakland S&P ’08]
5
Many schemes proposed over past five years
SybilGuard [SIGCOMM’06] SybilLimit [Oakland S&P ’08] SybilInfer [NDSS’08]
5
Many schemes proposed over past five years
SybilGuard [SIGCOMM’06] SybilLimit [Oakland S&P ’08] SybilInfer [NDSS’08] SumUp [NSDI’09]
5
Many schemes proposed over past five years
SybilGuard [SIGCOMM’06] SybilLimit [Oakland S&P ’08] SybilInfer [NDSS’08] SumUp [NSDI’09] Whanau [NSDI’10]
5
Many schemes proposed over past five years
SybilGuard [SIGCOMM’06] SybilLimit [Oakland S&P ’08] SybilInfer [NDSS’08] SumUp [NSDI’09] Whanau [NSDI’10] MOBID [INFOCOM’10]
5
6
Use only social network
Unclear relationship between schemes
Is there a common structural property these schemes rely on?
How well would these schemes work in practice? Are there any fundamental limitations of Sybil defense?
7
Allows us to take closer look at how schemes are related
Despite difgerent mechanisms
Understand the limitations of these schemes
8
Treat like a black-box
Output dependent on scheme-specific parameters
Interested in underlying graph algorithm
We analyze SybilGuard, SybilLimit, SumUp and SybilInfer
Declare Sybils from perspective of trusted node
Likelihood of being a Sybil
View schemes as inducing ranking on nodes Easier to compare rankings than full schemes
9
Declare Sybils from perspective of trusted node
Likelihood of being a Sybil
View schemes as inducing ranking on nodes Easier to compare rankings than full schemes
9
Declare Sybils from perspective of trusted node
Likelihood of being a Sybil
View schemes as inducing ranking on nodes Easier to compare rankings than full schemes
9
10
10
What is going on at this cut-ofg point? Cut-off
Around the trusted node
Roughly, set of nodes more tightly knit than surrounding graph
11
12
Partition similarity
(higher is better)
Community Strength
(lower is better)
Peak in similarly corresponds to boundary of local community Details, more results in paper
13
Nodes in the local community are ranked higher Ranking within and outside community in no particular order
Wealth of algorithms available
To design new approaches to detect Sybils
15
Size, location, characteristics of local community
IMPLICATION 1 Are certain network structures more vulnerable? IMPLICATION 2 What happens if the attacker knows this? Are more intelligent attacks possible?
16
Increasing community structure of honest region
17
Increasing community structure of honest region
17
Increasing community structure of honest region
17
Online social networks: Facebook (2) Collaboration networks: Advogato, Wikipedia, co-authorship Communication networks: Email
Similar strength attacker, despite difgerent network sizes 5% attack links, 25% Sybil nodes
Accuracy: Probability Sybils ranked lower than non-Sybils Fair comparison across schemes, networks
18
Amount of community structure (modularity)
(higher is more community structure)
Accuracy
(higher is better)
19
Increases likelihood of being “accepted”
Links placed to random non-Sybils
20
21
Links placed closer to trusted node
21
Links placed closer to trusted node
Same strength as before
Place links randomly among top N nodes; vary N Lower N represents more control
Tested other networks as well
22
23
Accuracy
(higher is better)
Control over link placement
(higher is more control over placement)
Sybils ranked higher than non-Sybils (accuracy << 0.5)
All use very difgerent mechanisms Hard to understand relationship, fundamental insight
Found they are all detecting local communities
Can leverage community detection for Sybil defense Certain networks more diffjcult to defend Attacker can exploit this to spend efgort more wisely
24
Certain real networks have significant communities Could be still useful for white-listing small number of nodes
More information about Sybil/non-Sybil nodes is useful Other information from higher layers eg. interaction
25