SoK: The Evolution of Sybil Defense via Social Networks Alessandro - - PowerPoint PPT Presentation

sok the evolution of sybil defense via social networks
SMART_READER_LITE
LIVE PREVIEW

SoK: The Evolution of Sybil Defense via Social Networks Alessandro - - PowerPoint PPT Presentation

IEEE Symposium on Security & Privacy SAN FRANCISCO 21 ST MAY 2013 SoK: The Evolution of Sybil Defense via Social Networks Alessandro Epasto 1 joint work with L. Alvisi 2 , A. Clement 3 , S. Lattanzi 4 , A. Panconesi 1 Sapienza U.


slide-1
SLIDE 1

SoK: The Evolution of Sybil Defense via Social Networks


Sapienza U. Rome1, U. T . Austin2, MPI-SWS3, Google Reseach4

1

IEEE Symposium on Security & Privacy


Alessandro Epasto1 joint work with L. Alvisi2, A. Clement3, S. Lattanzi4, A. Panconesi1 SAN FRANCISCO – 21ST MAY 2013

slide-2
SLIDE 2

Sybil Attack, 50 B.C.

Julius Marcus Brutus Asterix Obelix Panoramix Idefix Attack edge Cleo

slide-3
SLIDE 3

The Goal of Sybil Defense

Cleo Julius Marcus Brutus Asterix Obelix Panoramix Idefix

Honest Sybil

slide-4
SLIDE 4

Motivation

  • Fundamental security issue in any open system.
  • Real impact:
  • >500k sybils in RenRen.
  • Manual checking is expensive (Tuenti).
slide-5
SLIDE 5

Social Sybil Defense

  • Key idea: leverage social structure
  • Friendship is hard to fake!
slide-6
SLIDE 6

Our contributions

  • A perspective on the past of social sybil

defense

  • Unifies two distinct trends
  • Random-walk based methods
  • Community detection
  • A program for the future of sybil defense
  • All sybil defense is local
  • A concrete first step on the new road
  • First community detection algorithm with

provable sybil defense guarantees

slide-7
SLIDE 7

How can we leverage 
 the structure of the social graph?

slide-8
SLIDE 8

A thought experiment

  • Given a social network, is it under sybil attack?
  • Which property to use?

Clustering coefficient Small world phenomena Popularity distribution Conductance

slide-9
SLIDE 9

Conductance

  • Conductance measures how well connected a graph is.
  • (Intuitively) A graph has high conductance only if

there are no sets of nodes sparsely connected with the rest of the graph.

  • Our analysis shows that conductance is by far the most

resilient property

slide-10
SLIDE 10

Why random walks?

slide-11
SLIDE 11

Random walk based defenses

  • Many state of the art solutions use random walks:
  • SybilGuard, Yu et al., SIGCOMM 2006
  • SybilLimit, Yu et al., SP 2008
  • SybilInfer, Danezis et al., NSDD 2006
  • SybilRank, Cao et al, NSDI 2012
  • Our contribution: A unified view of these techniques

based on random walk theory.

slide-12
SLIDE 12

Random Walks: the intuition

slide-13
SLIDE 13

A toy problem

  • Consider the following simplified problem:
  • Two disjoint graphs. No attack edges.

Honest Sybil

slide-14
SLIDE 14

A toy problem

  • Consider the following simplified problem:
  • Two disjoint graphs. No attack edges.
  • How can a node decide who to trust in a distributed

way? x

Honest Sybil

slide-15
SLIDE 15

A toy problem

  • Consider the following simplified problem:
  • Two disjoint graphs. No attack edges.
  • How can a node decide who to trust in a distributed

way? x y

Honest Sybil

slide-16
SLIDE 16

A toy problem

  • Consider the following simplified problem:
  • Two disjoint graphs. No attack edges.
  • How can a node decide who to trust in a distributed

way? x

Honest

y

Sybil

slide-17
SLIDE 17

Random walks

  • Intuition: perform a random walk from each node
  • Two node trust each other if there is any intersection.

x y

Honest Sybil

slide-18
SLIDE 18

Properties of the protocol

  • Safety: sybil nodes are never accepted
  • Liveness: boost probability of accepting honest nodes

by using many random walks (still computationally efficient)

slide-19
SLIDE 19

Implementation of the protocol

slide-20
SLIDE 20

Back to the real world

  • The two graphs are not disjoint.
  • With few attack edges and short walks it still works.
  • Note: Precise theoretical guarantees are based on

conductance.

Honest Sybil Attack edges

slide-21
SLIDE 21

Central assumptions

Honest Sybil

  • The method works provided that two assumptions are

met:

1.

Sparse cut between honest and sybils;

2.

The honest region is fast mixing.

  • Then: it works (specifying in which sense requires

some care)

slide-22
SLIDE 22

However…

slide-23
SLIDE 23

The two assumptions do not hold

Honest Sybil C A B

The cut is not as sparse as assumed (Bilge et al. WWW 2009 The honest region is not fast mixing (Mohaisen, et al. IMC 2

slide-24
SLIDE 24

Global sybil defense is unrealistic

Traditional sybil defense depends

  • n

assumptions that are too strong… What can we realistically do?

slide-25
SLIDE 25

From global to local sybil defense

slide-26
SLIDE 26

Sybil defense in real networks

  • A can not distinguish between B and

C

Sybil

c

Honest A B

slide-27
SLIDE 27

A new goal for sybil defense

  • White-list the nodes in A’s

community

  • Practically useful
  • Attainable.

Sybil

c

Honest B A

slide-28
SLIDE 28

Sybil Defense & Community Detection

  • Sybil defense as community detection

(Viswanath et. al, SIGCOMM 2010).

  • Must identify correct and sybil communities
  • … but with no provable guarantees!

Our contribution:

A community detection algorithm with provable sybil defense guarantees

  • The keys once again are conductance and random

walks

slide-29
SLIDE 29

Random Walks Revisited: ACL

  • How to find the community of given node?
  • Random walks with a bias on the community of the seed
  • Assign higher score to nodes inside the community
  • Leverage community detection literature:
  • ACL (Andersen, et al. 2006)
  • Provable sybil defense guarantees.
slide-30
SLIDE 30

Random Walks Revisited: ACL

  • Personalized PageRank: variable length random walks

X Honest Sybil

3 Steps

slide-31
SLIDE 31

Random Walks Revisited: ACL

  • Personalized PageRank: variable length random walks

X 1 Honest Sybil

2 Steps

slide-32
SLIDE 32

Random Walks Revisited: ACL

  • Personalized PageRank: variable length random walks
  • After many walks…

X 1 1 Honest Sybil

slide-33
SLIDE 33

Random Walks Revisited: ACL

  • Personalized PageRank: variable length random walks
  • After many walks…
  • Node’s score = how frequently node is visited

X 6

8

2 8 4 3 9 Honest 5 4 3 1 2 3 Sybil

slide-34
SLIDE 34

Random Walks Revisited: ACL

  • High degree nodes can achieve disproportionate score

X 6 8 4 8 4 4 9 Honest 5 4 3 1 2 3 Sybil

slide-35
SLIDE 35

Random Walks Revisited: ACL

  • High degree nodes can achieve disproportionate score
  • Node’s trustworthiness = score normalized by degree

X 4 Honest 1 1 1 Sybil

slide-36
SLIDE 36

Random Walks Revisited: ACL

  • Nodes are ranked by their trustworthiness
  • Ranking has strong bias on the seed’s community

1 4 1 X

Community of X

slide-37
SLIDE 37

The Guarantee

  • The intuition can be formalized in a theorem:
  • We confirm this result with an experimental

evalutation.

Select a u.a.r. honest node in a fast mixing community C with fewer than o(n/log(n)) attack edges: The ACL ranking contains 1-o(1) honest nodes in the first |C| positions.

slide-38
SLIDE 38

Experimental evaluation

  • We compared the performance of ACL with several

state-of-the-art algorithms: SybilGuard, SybilLimit, Gatekeeper and Mislove’s community detection algorithm.

  • Attack models:
  • Traditional attack model (Danezis et al., NSDD 2006)
  • New attack model with interesting theoretical

properties

  • The results were consistent across the different

models and datasets.

slide-39
SLIDE 39

Performance

Precision vs Recall in Facebook (new attack model) ACL vs SybilLimit Similar results are obtained in all our datasets precision recall

Facebook (New Orleans) Viswanath et al. 2009 Nodes: 63k Edges: 816k

slide-40
SLIDE 40

Conclusions

  • Unified view of social network based sybil defense:

random walks and community detection

  • New goal for sybil defense
  • Community detection can provide secure sybil defense

schemes.

slide-41
SLIDE 41

Thank you for your attention