sybilguard defending against sybil attacks sybilguard
play

SybilGuard: Defending Against Sybil Attacks SybilGuard: Defending - PowerPoint PPT Presentation

SybilGuard: Defending Against Sybil Attacks SybilGuard: Defending Against Sybil Attacks via Social Networks via Social Networks Intel Research Pittsburgh / CMU Haifeng Yu National University of Singapore Michael Kaminsky Intel Research


  1. SybilGuard: Defending Against Sybil Attacks SybilGuard: Defending Against Sybil Attacks via Social Networks via Social Networks Intel Research Pittsburgh / CMU � Haifeng Yu National University of Singapore Michael Kaminsky Intel Research Pittsburgh Phillip B. Gibbons Intel Research Pittsburgh Microsoft Research Abraham Flaxman (previously at CMU)

  2. Background: Sybil Attack Background: Sybil Attack � Sybil attack: Single user honest pretends many fake/sybil identities malicious � Creating multiple accounts from different IP addresses launch sybil attack � Sybil identities can become a large fraction of all identities � Out-vote honest users in collaborative tasks Haifeng Yu, Intel Research / CMU � National University of Singapore 2

  3. Background: Defending Against Sybil Attack Background: Defending Against Sybil Attack � Using a trusted central authority � Tie identities to actual human beings � Not always desirable � Can be hard to find such authority � Sensitive info may scare away users � Potential bottleneck and target of attack � Without a trusted central authority � Impossible unless using special assumptions [Douceur’02] � Resource challenges not sufficient -- adversary can have much more resources than typical user Haifeng Yu, Intel Research / CMU � National University of Singapore 3

  4. SybilGuard Basic Insight: SybilGuard Basic Insight: Leveraging Social Networks Leveraging Social Networks Our Social Network Definition � Undirected graph � Nodes = identities � Edges = strong trust � E.g., colleagues, relatives Haifeng Yu, Intel Research / CMU � National University of Singapore 4

  5. SybilGuard Basic Insight SybilGuard Basic Insight � n honest users: One identity/node each � Malicious users: Multiple identities each (sybil nodes) sybil honest nodes nodes attack Sybil nodes edges may collude – the adversary malicious user Observation: Adversary cannot create extra edges between honest nodes and sybil nodes Haifeng Yu, Intel Research / CMU � National University of Singapore 5

  6. SybilGuard Basic Insight SybilGuard Basic Insight Dis-proportionally small cut sybil honest disconnecting a nodes nodes large number of identities But cannot search for such cut brute- force… Haifeng Yu, Intel Research / CMU � National University of Singapore 6

  7. Outline Outline � Motivation and SybilGuard basic insight � Overview of SybilGuard: Random routes � Properties of SybilGuard protocol � Evaluation results � Conclusions Haifeng Yu, Intel Research / CMU � National University of Singapore 7

  8. Goal of Sybil Defense Goal of Sybil Defense � Goal: Enable a verifier node to decide whether to accept another suspect node � Accept: Provide service to / receive service from � Idealized guarantee: An honest node accepts and only accepts other honest nodes � SybilGuard: � Bounds the number of sybil nodes accepted � Guarantees are with high probability � Approach: Acceptance based on random route intersection between verifier and suspect Haifeng Yu, Intel Research / CMU � National University of Singapore 8

  9. Random Walk Review Random Walk Review f a e b d c pick random edge d pick random edge e pick random edge c Haifeng Yu, Intel Research / CMU � National University of Singapore 9

  10. Random Route: Convergence Random Route: Convergence f a e b d a � d d � e c b � a e � d randomized c � b f � f routing table d � c Random 1 to 1 mapping between incoming edge and outgoing edge Using routing table gives Convergence Property: Routes merge if crossing the same edge Haifeng Yu, Intel Research / CMU � National University of Singapore 10

  11. Random Route: Back Random Route: Back-traceable traceable f a e b d a � d d � e If we know the c b � a e � d route traverses c � b f � f edge e, then d � c we know the whole route Using 1-1 mapping gives Back-traceable Property: Routes may be back-traced Haifeng Yu, Intel Research / CMU � National University of Singapore 11

  12. Random Route Intersection: Random Route Intersection: Honest Nodes Honest Nodes � Verifier accepts a suspect if the two Verifier routes intersect � Route length w : Suspect ~ n log n � W.h.p., verifier’s route stays within honest region � W.h.p., routes from two honest nodes honest nodes sybil nodes intersect Haifeng Yu, Intel Research / CMU � National University of Singapore 12

  13. Random Route Intersection: Random Route Intersection: Sybil Nodes Sybil Nodes � SybilGuard bounds the number of accepted sybil nodes within g * w � g : Number of attack edges � w : Length of random routes � Next … � Convergence property to bound the number of intersections within g � Back-traceable property to bound the number of accepted sybil nodes per intersection within w Haifeng Yu, Intel Research / CMU � National University of Singapore 13

  14. Bound # Intersections Within Bound # Intersections Within g must cross attack edge to intersect even if sybil nodes do not follow the protocol � Convergence: Each Verifier attack edge gives Suspect one intersection � at most g same intersections with g intersection attack edges Intersection = (node, incoming edge honest nodes sybil nodes Haifeng Yu, Intel Research / CMU � National University of Singapore 14

  15. Bound # Sybil Nodes Accepted per Bound # Sybil Nodes Accepted per Intersection within Intersection within w � Back-traceable: Each Verifier intersection should correspond to routes from at most w honest nodes � Verifier accepts at most w nodes per intersection � Will not hurt honest nodes for a given intersection Haifeng Yu, Intel Research / CMU � National University of Singapore 15

  16. Summary of SybilGuard Guarantees Summary of SybilGuard Guarantees � Power of the adversary: If SybilGuard Then apps bounds # can do � Unlimited number of accepted colluding sybil nodes sybil nodes � Sybil nodes may not follow within SybilGuard protocol n / 2 byzantine � W.h.p., honest node accepts consensus ≤ g * w sybil nodes n majority � g : # of attack edges voting � w : Length of random route not much effective larger than n replication Haifeng Yu, Intel Research / CMU � National University of Singapore 16

  17. Outline Outline � Motivation and SybilGuard basic insight � Overview of SybilGuard � Properties of SybilGuard protocol � Evaluation results � Conclusions Haifeng Yu, Intel Research / CMU � National University of Singapore 17

  18. SybilGuard Protocol SybilGuard Protocol � Security: � Protocol ensures that nodes cannot lie about their random routes in the honest region � Decentralized: � No one has global view � Nodes only communicate with direct neighbors in the social network when doing random routes Haifeng Yu, Intel Research / CMU � National University of Singapore 18

  19. SybilGuard Protocol (continued) SybilGuard Protocol (continued) � Efficiency: Random routes are performed only once and then “remembered” � No more message exchanges needed unless the social network changes � Verifier incurs O(1) messages to verify a suspect � User and node dynamics: � Different from DHTs, node churn is a non-problem in SybilGuard … � See paper for all the details … Haifeng Yu, Intel Research / CMU � National University of Singapore 19

  20. Evaluation Results Evaluation Results � Simulation based on synthetic social network model [Kleinberg’00] for 10 6 , 10 4 , 10 2 nodes � With 2500 attack edges (i.e., adversary has acquired 2500 social trust relationships): � Honest node accepts honest node with 99.8% prob � 99.8% honest node properly bounds the number of accepted sybil nodes � See paper for full results … Haifeng Yu, Intel Research / CMU � National University of Singapore 20

  21. Conclusions Conclusions � Sybil attack: Serious threat to collaborative tasks in decentralized systems � SybilGuard: Fully decentralized defense protocol � Based on random routes on social networks � Effectiveness shown via simulation and analysis � Future work: � Implementation nearly finished � Evaluation using real and large-scale social networks Haifeng Yu, Intel Research / CMU � National University of Singapore 21

  22. SybilGuard: Defending Against Sybil Attacks SybilGuard: Defending Against Sybil Attacks via Social Networks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip Gibbons, Abraham Flaxman Full Technical Report available at: http://www.cs.cmu.edu/~yhf or Google “SybilGuard”

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend