Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.

Slides:



Advertisements
Similar presentations
An analysis of Social Network-based Sybil defenses Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University.
Advertisements

Chris Karlof and David Wagner
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Polling With Physical Envelopes A Rigorous Analysis of a Human–Centric Protocol Tal Moran Joint work with Moni Naor.
Krishna P. Gummadi Networked Systems Research Group MPI-SWS
Identity Theft Protection in Structured Overlays Lakshmi Ganesh Ben Y. Zhao University of California, Santa Barbara NPSec 2005.
An Analysis of Social Network-Based Sybil Defenses Sybil Defender
Toward an Optimal Social Network Defense Against Sybil Attacks Haifeng Yu National University of Singapore Phillip B. Gibbons Intel Research Pittsburgh.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
A Sybil-proof DHT using a social network Socialnets workshop April 1, 2008 Chris Lesniewski-Laas MIT CSAIL.
Haifeng Yu National University of Singapore
L-27 Social Networks and Other Stuff. Overview Social Networks Multiplayer Games Class Feedback Discussion 2.
Sybil Attack Hyeontaek Lim November 12, 2010.
1 SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu Michael Kaminsky Phillip B. Gibbons Abraham Flaxman Presented by John Mak,
Explorations in Anonymous Communication Andrew Bortz with Luis von Ahn Nick Hopper Aladdin Center, Carnegie Mellon University, 8/19/2003.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
1 The Sybil Attack John R. Douceur Microsoft Research Presented for Cs294-4 by Benjamin Poon.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Active Protocols for Agile Censor-Resistant Networks Robert Ricci Jay Lepreau University of Utah May 22, 2001.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
MuON: Epidemic Based Mutual Anonymity Neelesh Bansod, Ashish Malgi, Byung Choi and Jean Mayo.
1 Freenet  Addition goals to file location: -Provide publisher anonymity, security -Resistant to attacks – a third party shouldn’t be able to deny the.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Adaptively Secure Broadcast, Revisited
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
Continuous Consistency and Availability Haifeng Yu CPS 212 Fall 2002.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 6 03/22/2010 Security and Privacy in Cloud Computing.
OSN Research As If Sociology Mattered Krishna P. Gummadi Networked Systems Research Group MPI-SWS.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
CIS 640-2, Presenter: Yun Mao1 Security for Structured Peer- to-peer Overlay Networks By Miguel Castro et al. OSDI ’ 02 Presented by Yun Mao in CIS640.
Security Mechanisms for Distributed Computing Systems A9ID1007, Xu Ling Kobayashi Laboratory GSIS, TOHOKU UNIVERSITY 2011/12/15 1.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
“SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
The Sybil Attack, J. R. Douceur, IPTPS Clifton Forlines CSC2231 Online Social Networks 11/1/2007.
Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper.
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Measuring Behavioral Trust in Social Networks
DSybil: Optimal Sybil-Resistance for Recommendation Systems Haifeng Yu National University of Singapore Chenwei Shi National University of Singapore Michael.
Introduction to Active Directory
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Sybil-Proof Distributed Hash Table Chris Lesniewski-LaasM. Frans Kaashoek MIT 28 April 2010 NSDI
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
Measuring the Mixing Time of Social Graphs Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim Computer Science and Engineering Department University of Minnesota.
Dieudo Mulamba November 2017
Networked Systems Practicum
A Sybil-proof DHT using a social network
By group 3(not the ones who made the paper :D)
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
GANG: Detecting Fraudulent Users in OSNs
Graph and Link Mining.
Social Network-Based Sybil Defenses
Anonymous Communication
Presentation transcript:

Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1

 Sybil attack: Single user pretends many fake/sybil identities ◦ Creating multiple accounts from different IP addresses  Sybil identities can become a large fraction of all identities ◦ Out-vote honest users in collaborative tasks launch sybil attack honest malicious 2

 Using a trusted central authority ◦ Tie identities to actual human beings  Not always desirable ◦ Can be hard to find such authority ◦ Sensitive info may scare away users ◦ Potential bottleneck and target of attack  Without a trusted central authority ◦ Impossible unless using special assumptions [Douceur’02] ◦ Resource challenges not sufficient -- adversary can have much more resources than typical user 3

 Main Idea: Use a social network as the “central authority”  A node trusts its neighbors  Each node learns about the network from its neighbors 4

 Undirected graph  Nodes = identities  Edges = strong trust ◦ E.g., colleagues, relatives Our Social Network Definition 5

malicious user honest nodes sybil nodes Observation: Adversary cannot create extra edges between honest nodes and sybil nodes attack edges  n honest users: One identity/node each  Malicious users: Multiple identities each (sybil nodes) Edges to honest nodes are “human established” Attack edges are difficult for Sybil nodes to create Sybil nodes may collude – the adversary 6

7 honest nodes sybil nodes Dis-proportionally small cut disconnecting a large number of identities But cannot search for such cut brute-force… Attack Edges Are Rare

 Motivation and SybilGuard basic insight  Overview of SybilGuard: Random routes  Properties of SybilGuard protocol  Evaluation results  Conclusions 8

 A social network exists containing honest nodes and Sybil nodes  Honest nodes provide a service to or receive a service from nodes that they “accept” 9

 Goal: Enable a verifier node to decide whether to accept another suspect node ◦ Accept: Provide service to / receive service from ◦ Idealized guarantee: An honest node accepts and only accepts other honest nodes  SybilGuard: ◦ Bounds the number of sybil nodes accepted ◦ Guarantees are with high probability ◦ Accepts and is accepted by most honest nodes ◦ Approach: Acceptance based on random route intersection between verifier and suspect 10

 Every node picks a random routing from input to output edges  A directed edge is in exactly one route of unbounded length  A directed edge is in at most w routes of length w 11

 Each node finds all the length w random routes that start at the node itself  Honest node V accepts node S if most of V’s random routes intersect a random route of S 12

13 pick random edge d pick random edge c pick random edge e a bd e f c

14 Random 1 to 1 mapping between incoming edge and outgoing edge a  d b  a c  b d  c d  e e  d f  f a b c d e f randomized routing table Using routing table gives Convergence Property: Routes merge if crossing the same edge

15 a  d b  a c  b d  c d  e e  d f  f a b c d e f Using 1-1 mapping gives Back-traceable Property: Routes may be back-traced If we know the route traverses edge e, then we know the whole route

16  Verifier accepts a suspect if the two routes intersect ◦ Route length w: ◦ W.h.p., verifier’s route stays within honest region ◦ W.h.p., routes from two honest nodes intersect sybil nodeshonest nodes Verifier Suspect

17  Each attack edge gives one intersection  Intersection points are SybilGuard’s equivalence sets sybil nodeshonest nodes Verifier Suspect same intersection

 SybilGuard bounds the number of accepted sybil nodes within g*w ◦ g: Number of attack edges ◦ w: Length of random routes  Next … ◦ Convergence property to bound the number of intersections within g ◦ Back-traceable property to bound the number of accepted sybil nodes per intersection within w 18

19  Convergence: Each attack edge gives one intersection  at most g intersections with g attack edges sybil nodeshonest nodes Verifier Suspect must cross attack edge to intersect even if sybil nodes do not follow the protocol same intersection Intersection = (node, incoming edge

20  Back-traceable: Each intersection should correspond to routes from at most w honest nodes  Verifier accepts at most w nodes per intersection ◦ Will not hurt honest nodes Verifier for a given intersection

 For routes of length w in a network with g attack edges, WHP, ◦ Accepted nodes can be partitioned into sets of which at most g contain Sybil nodes ◦ Honest nodes accept at most w*g Sybil nodes 21

22  Power of the adversary: ◦ Unlimited number of colluding sybil nodes ◦ Sybil nodes may not follow SybilGuard protocol  W.h.p., honest node accepts ≤ g*w sybil nodes ◦ g: # of attack edges ◦ w: Length of random route If SybilGuard bounds # accepted sybil nodes within Then apps can do n/2n/2byzantine consensus nmajority voting not much larger than n effective replication

 Motivation and SybilGuard basic insight  Overview of SybilGuard  Properties of SybilGuard protocol  Evaluation results  Conclusions 23

 Security: ◦ Protocol ensures that nodes cannot lie about their random routes in the honest region  Decentralized: ◦ No one has global view ◦ Nodes only communicate with direct neighbors in the social network when doing random routes 24

 Efficiency: Random routes are performed only once and then “remembered” ◦ No more message exchanges needed unless the social network changes ◦ Verifier incurs O(1) messages to verify a suspect  User and node dynamics: ◦ Different from DHTs, node churn is a non-problem in SybilGuard … 25

 There must be a social network ◦ Nodes must create and maintain their friendships  How many social networks will we need? ◦ One for each application, or ◦ A single network used by many applications 26

 Motivation and SybilGuard basic insight  Overview of SybilGuard  Properties of SybilGuard protocol  Evaluation results  Conclusions 27

28  Simulation based on synthetic social network model [Kleinberg’00] for 10 6, 10 4, 10 2 nodes  With 2500 attack edges (i.e., adversary has acquired 2500 social trust relationships):  Honest node accepts honest node with 99.8% prob  99.8% honest node properly bounds the number of accepted sybil nodes

 Sybil attack: Serious threat to collaborative tasks in decentralized systems   SybilGuard: Fully decentralized defense protocol ◦ Based on random routes on social networks ◦ Effectiveness shown via simulation and analysis   Future work: ◦ Implementation nearly finished ◦ Evaluation using real and large-scale social networks 29

 Information about friends spreads along routes  Verification involves nodes sharing all their routes ◦ Bloom filters help here  Nodes are not anonymous 30

31