On the State of OSN-based Sybil Defenses David Koll*, Jun Li^, Joshua Stein^ and Xiaoming Fu* *University of Göttingen, Germany ^University of Oregon,

Slides:



Advertisements
Similar presentations
An analysis of Social Network-based Sybil defenses Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University.
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Krishna P. Gummadi Networked Systems Research Group MPI-SWS
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
Laboratory for Education and Research in Secure Systems Engineering (LERSSE) Networked Systems Laboratory (NetSysLab) Department of Electrical & Computer.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
An Analysis of Social Network-Based Sybil Defenses Sybil Defender
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
Toward an Optimal Social Network Defense Against Sybil Attacks Haifeng Yu National University of Singapore Phillip B. Gibbons Intel Research Pittsburgh.
Qiang Cao Duke University
Spectrum Based RLA Detection Spectral property : the eigenvector entries for the attacking nodes,, has the normal distribution with mean and variance bounded.
Fighting Fire With Fire: Crowdsourcing Security Solutions on the Social Web Christo Wilson Northeastern University
Haifeng Yu National University of Singapore
1 SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu Michael Kaminsky Phillip B. Gibbons Abraham Flaxman Presented by John Mak,
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Zifei Shan, Haowen Cao, Jason Lv, Cong Yan, Annie Liu Peking University, China 1.
TOWARDS IDENTITY ANONYMIZATION ON GRAPHS. INTRODUCTION.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
OSN Research As If Sociology Mattered Krishna P. Gummadi Networked Systems Research Group MPI-SWS.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Educational Research: Competencies for Analysis and Application, 9 th edition. Gay, Mills, & Airasian © 2009 Pearson Education, Inc. All rights reserved.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
Leveraging Social Networks to Defend against Sybil attacks Krishna Gummadi Networked Systems Research Group Max Planck Institute for Software Systems Germany.
Vigilante: End-to-End Containment of Internet Worms Authors : M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham In Proceedings.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University SIGCOMM 2010 Presented by Junyao Zhang Many of the.
Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
Authors: Yazan Boshmaf, Lldar Muslukhov, Konstantin Beznosov, Matei Ripeanu University of British Columbia Annual Computer Security Applications Conference.
Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang Miriam Metzger, Haitao Zheng and Ben Y. Zhao Computer.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Measuring the Mixing Time of Social Graphs Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim Computer Science and Engineering Department University of Minnesota.
Gross Niv Analyzing Spammer’s Social Networks for Fun and Profit
Impact of Interference on Multi-hop Wireless Network Performance
An Overview of Statistical Inference – Learning from Data
Uncovering the Mystery of Trust in An Online Social Network
Reasoning Under Uncertainty: More on BNets structure and construction
Anonymous Communication
DTMC Applications Ranking Web Pages & Slotted ALOHA
An Overview of Statistical Inference – Learning from Data
Lab for Internet and Security Technology Yan Chen
Dieudo Mulamba November 2017
Dude, where’s that IP? Circumventing measurement-based geolocation
Phillipa Gill University of Toronto
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
By group 3(not the ones who made the paper :D)
Anonymous Communication
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
What are their purposes? What kinds?
GANG: Detecting Fraudulent Users in OSNs
Social Network-Based Sybil Defenses
Anonymous Communication
Cross Site Request Forgery (CSRF)
Presented by Shashank Shekhar Sahoo
Presentation transcript:

On the State of OSN-based Sybil Defenses David Koll*, Jun Li^, Joshua Stein^ and Xiaoming Fu* *University of Göttingen, Germany ^University of Oregon, Eugene, Oregon, United States

2 Motivation Sybil Attack: injection of multiple forged identities into a target system with malicious intention Current major research direction: exploit Online Social Networks (OSNs) of users in target system Idea: it will be difficult for an attacker to create links to (become friends with) a benign user

3 Motivation Recent research suggests: Assumption invalid! 1) Sybils can create only few links? [1,2,3]  Attackers can in fact easily establish SRs to benign nodes, success rates range from 26% to 90%!  Regular users even click on links sent by attackers which just established SR with 50% probability  Up to 170 established links per Sybil on average

4 Motivation Recent research suggests: Assumption invalid! 2) Sybils keep among themselves? [2]  Sybils create ¾ SRs to benign users, only ¼ to other Sybils

5 Motivation Recent research suggests: Assumption invalid! 3) Attacker has to take initiative? [4,5]  Simple attack strategies lure users into initiating contact with attacker.  Socialbots can acquire hundreds of SRs to benign users per day, per profile.  Spammers on twitter gain hundreds of followers

6 Motivation Our work: systematically analyze the State of the Art with regards to the new observations

7 Some Notations Sybil node: A forged identity controlled by the attacker Benign node/user: A regular, non malicious node/user Attack Edge: An edge e(s,b) in the OSN graph G=(V,E) that connects a Sybil node s to a benign node b, i.e., a SR between s and b Sybil/Benign Community: A densely connected community consisting solely of Sybils/benign nodes e(s,b) b s

8 OSN-based Sybil Defenses Two categories: Sybil Detection (SD) and Sybil Tolerance (ST) schemes  SD: Detect Sybils and exclude them from the system e.g., SybilGuard/SybilLimit [NSDI'06/SP'08], SybilInfer [NDSS'09], SybilRank [NSDI'12], GateKeeper [INFOCOM'11]  ST: Accept that there are Sybils – tolerate them and mitigate their impact instead e.g., Ostra [NSDI'08], SumUp [NSDI'09]

9 SD Approaches - Overview Most SD approaches use (modified) random walks to detect Sybils  Use bottleneck cut defined by the few attack edges  Random walk starting at b unlikely to cross to Sybil region, thus unlikely to end at/intersect with walk starting at s  Only exception: GateKeeper, uses ticket distribution

10 SD Approaches - Overview Yes/no decision, whether suspect is admitted Basically the same idea over all approaches: Low reachability of Sybils from honest users  Random walks of Sybils should not intersect with honest users' walks (SybilGuard/Limit)  Sybils should have lower rank than honest nodes (SybilRank)  Sybils should obtain less tickets than honest nodes (GateKeeper)

11 SD Approaches – Example: SybilLimit Every node (suspect) has to be admitted by a verifier Admission Concept: Intersections of tails (last edge of the random walk) – Idea: Honest users will have a lot of intersections with honest verifiers... –... while Sybils will not v b s

12 SD Approaches – Example: SybilLimit What now?

13 SD Approaches – Example: SybilLimit Suspect gets admitted if there are intersections on the tails with a verifier Few attack edges: few intersecting tails between Sybils and honest nodes (e.g., walks starting at A are not likely to have intersecting tails with those at the Sybil C) More attack edges: SybilLimit can not distinguish between Sybils and honest nodes (e.g., nodes B and D)

14 SD Approaches – Example: SybilLimit

15 SD Approaches – Example: SybilLimit

16 SD Approaches - Overview We observe the same problem in every approach Low distinguishing ability of the schemes  Significant difference in intersections... (SybilGuard/Limit) ...or obtained rank... (SybilRank) ...or ticket count (GateKeeper) no longer given

17 SD Evaluation - Methodology Datasets with different characteristics (no dependency on dataset) : – 1 synthetic, 1000 nodes, 2000 links, scale-free topology – 1 Facebook, nodes, over 3 million links Attackers are not allowed to deviate from System protocol – i.e., evaluate their gain by position in graph alone! Main parameter: – Number of attack edges per Sybil, k – Edge placement: Random: each Sybil places k edges to benign nodes randomly 100 different, independent placements to avoid biased results

18 SD Evaluation - SybilLimit Original SybilLimit: virtually admits every Sybil when k=1 – Not surprising: guarantee of O(log n) admitted Sybils per attack edge Modification: try to distinguish on number of intersecting tails

19 SD Evaluation - Commonalities Same problem in all defenses: Sybils are able to outperform large fractions of honest nodes with little effort – SybilInfer, SybilRank, GateKeeper: 1-2 attack edges sufficient – Effort can even be reduced by more intelligent placement strategies – Confirms the low distinguishing ability

20 ST Approaches - Overview ST approaches try to limit the impact of each admitted Sybil Most approaches are built on credit networks  A message can only be sent along a path if every link on the path has credit available  ST approaches exploit that credit should deplete quickly on attack edges

21 ST Approaches – Example: Ostra Assigns credits to links; messages may only be routed over links with credit If message is labeled as unwanted, credit on the path is deducted Sybils have to use few attack edges to transmit their spam

22 ST Approaches – Example: Ostra What now?

23 ST Approaches – Example: Ostra Dependency on attack edges  Amount of spam grows proportionally to number of attack edges But there's more:  Spam sent along critical  edges also affects benign  nodes!  Communities may be  blocked from sending  to outside!

24 Evaluation: Ostra Performance Here: k = overall ratio of attack edges in network

25 ST Approaches - Overview ST approaches have the same general working principle, but more specific weaknesses Reason: Designed for a specific application – e.g., in SumUp (a vote collection scheme): – An intelligent voting strategy can lead to attackers outvote honest users

26 Summary Previous assumptions for Sybil Defenses do not hold anymore We reveal severe weaknesses in all recent Sybil Defenses revealed by qualitative and quantitative analysis – Low distinguishing ability of solutions – In SD approaches, mostly 1 or 2 attack edges are enough – In ST approaches, issues are more specific, but still severe

27 What do future OSN-based approaches need? Use meta-data of relations in addition to graph structure itself – Intensity of the relation (e.g., message frequency) But: High false positive rate? – Lifetime of a user's relations (i.e., a node is suspicious if a lot of its relations are short-lived) Challenge: How to get a data set that would provide such info for testing the approach and verifying it?

28 References [1] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In WWW ’09. ACM, [2] Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social network sybils in the wild. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC ’11, pages 259–268, New York, NY, USA, ACM. [3] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC ’11, pages 93– 102, New York, NY, USA, ACM. [4] D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu. Reverse social engineering attacks in online social networks. In Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment, DIMVA’11, pages 55–74, Berlin, Heidelberg, [5] V. Sridharan, V. Shankar, and M. Gupta. Twitter Games: How Successful Spammers Pick Targets, to appear in ACSAC'12