Md. Tanvir Al Amin 04 09 05 2064 Shah Md. Rifat Ahsan 10 09 05 2060 CSE 6809 – Distributed Search Techniques.

Slides:



Advertisements
Similar presentations
An analysis of Social Network-based Sybil defenses Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University.
Advertisements

Distributed Hash Tables
Peer to Peer and Distributed Hash Tables
The Sybil Attack By John R. Douceur Presented by Samuel Petreski March 31, 2009.
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M
Krishna P. Gummadi Networked Systems Research Group MPI-SWS
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
Toward an Optimal Social Network Defense Against Sybil Attacks Haifeng Yu National University of Singapore Phillip B. Gibbons Intel Research Pittsburgh.
Peer-to-Peer Systems Kulesh Shanmugasundaram Security Issues.
A Sybil-proof DHT using a social network Socialnets workshop April 1, 2008 Chris Lesniewski-Laas MIT CSAIL.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Haifeng Yu National University of Singapore
Sybil Attack Hyeontaek Lim November 12, 2010.
1 SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu Michael Kaminsky Phillip B. Gibbons Abraham Flaxman Presented by John Mak,
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
March 2009 (IETF 74)IETF - P2PRG1 Security Issues and Solutions in Peer-to- peer Systems for Real-time Communications draft-schulzrinne-p2prg-rtc-security-00.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
1 The Sybil Attack John R. Douceur Microsoft Research Presented for Cs294-4 by Benjamin Poon.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
OSN Research As If Sociology Mattered Krishna P. Gummadi Networked Systems Research Group MPI-SWS.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Reputations Based On Transitive Trust Slides by Josh Albrecht.
1 Security and Trust in P2P systems. 2 What is trust When thinking about security in a system, various entities need to “trust” others to varying degrees.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
CIS 640-2, Presenter: Yun Mao1 Security for Structured Peer- to-peer Overlay Networks By Miguel Castro et al. OSDI ’ 02 Presented by Yun Mao in CIS640.
Security Mechanisms for Distributed Computing Systems A9ID1007, Xu Ling Kobayashi Laboratory GSIS, TOHOKU UNIVERSITY 2011/12/15 1.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University SIGCOMM 2010 Presented by Junyao Zhang Many of the.
“SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)
WISTP’08 ©LAM /05/2008 A Self-Certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup Christer Andersson Markulf Kohlweiss.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
The Sybil Attack, J. R. Douceur, IPTPS Clifton Forlines CSC2231 Online Social Networks 11/1/2007.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
DSybil: Optimal Sybil-Resistance for Recommendation Systems Haifeng Yu National University of Singapore Chenwei Shi National University of Singapore Michael.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
Towards a Scalable and Robust DHT Baruch Awerbuch Johns Hopkins University Christian Scheideler Technical University of Munich.
A Sybil-Proof Distributed Hash Table Chris Lesniewski-LaasM. Frans Kaashoek MIT 28 April 2010 NSDI
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Measuring the Mixing Time of Social Graphs Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim Computer Science and Engineering Department University of Minnesota.
Presented by Edith Ngai MPhil Term 3 Presentation
Christian Scheideler Dept. of Computer Science
A Sybil-proof DHT using a social network
By group 3(not the ones who made the paper :D)
Distributed Hash Tables
Social Network-Based Sybil Defenses
Presentation transcript:

Md. Tanvir Al Amin Shah Md. Rifat Ahsan CSE 6809 – Distributed Search Techniques

A 1973 book by F. R. Schreiber about a patient called “Sybil Dorsett” (pseudonym) “Sybil” was suffering from dissociative identity disorder She manifested 16 different personalities Douceur [IPTPS 2002] was the first to consider the multiple identity problem in the context of structured peer-to-peer networks, which was named "Sybil Attack"

In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. Is found in both P2P and non P2P systems.

Structured overlays are efficient node lookup systems. They are highly scalable, efficient, and reliable. These characteristics are achieved by deterministically replicating and recalling content within awidely distributed and decentralized network. One practical limitation of these networks is that they are frequently subject to Sybil attacks Malicious parties can compromise the network by generating and controlling large numbers of shadow identities.

Rig Internet polling by using multiple IP addresses to submit votes. Increase Google Page-Rank rating of a page. Reputation systems are a common target for Sybil attacks. Bugmenot.com Sharing of iTunes passwords for shared media access Sybil attacks have been observed in the Maze P2P system (Lian et al., ICDCS 2007) Steiner et al., CCR 2007 Demonstrated to be surprisingly easy in practice, e.g., in the widely-used eMule system

Structured P2P networks such as Chord take very limited measures against a Sybil attack, an attacker can obtain many IDs and hence many nodes in the network. This will allow an attacker to take advantage of two major vulnerabilities from which such networks suffer, routing mechanism and object serving mechanism.

Sybil nodes can be malicious. They can provide wrong information Think about a sybil node taking part at project Sybil nodes can launch a DoS attack on a P2P system Suppose the DHT lookup includes a sybil node You may fall in Infinite loop !! Or the Sybil node may provide ostensibly wrong data !! A virus in place of a program

Imagine that there is network of dissident free- thinkers (called honest nodes) in the Byzantine Empire They are connected by social links Each dissident keeps track of his immediate friends, so they are always in contact.

The regime employs a number of spies (Sybil nodes) who infiltrate the network by gaining the trust of honest nodes. A link between an honest node and a Sybil node is called an attack edge. Honest nodes cannot distinguish between attack edges and honest edges, and furthermore, spies can create an arbitrary number of connections to an arbitrary number of other spies (the regime’s Sybil identities).

P2P mania! Chord, Pastry, Tapestry, CAN The Sybil Attack [Douceur], Security Considerations [Sit, Morris] Restricted tables [Castro et al] BFT [Rodrigues, Liskov] SPROUT, Turtle, Bootstrap graphs Puzzles [Borisov] CAPTCHA [Rowaihy et al] SybilLimit [Yu et al] SybilInfer, SumUp, DSybil Whanau P2P mania!

Because Sybil attacks result from entities misidentifying themselves, requiring all nodes to authenticate with public keys is a one approach to securing these networks. Douceur showed that without the use of a centralized authority that certifies all nodes, it is impossible to prevent this attack.

Srivatsa and Liu [18] suggested the use of certificates with limited lifetime issued by the bootstrap entry point that bind a node with a unique ID. This would limit the number of IDs an adversary can obtain during a time period and will depend on the lifetime of the ticket. However, requiring all nodes to obtain a certificate that will bind it with a unique ID is not only expensive but will require either releasing private information or paying an amount of money for the service. Decentralized mechanisms for limiting Sybil attacks are therefore more palatable.

Threshold-based protocols : In this scheme, a new node becomes the part of the network if it gets a pre-specified number of trust certificates from a group of trusted nodes. This method does not provide high-level security because a Sybil attacker can take control of the network by generating the identities to meet the threshold requirements. Sybil Resisting DHT Routing: A routing strategy that is performed using a diverse set of nodes that minimizes the reliance only on the local nodes which may be controlled by the malicious node. Reduced number of corrupted nodes in the honest node's routing table makes a significant difference on the performance of DHTs.

Trusted Devices : In this scheme, entities in an application can be linked in some secure fashion to a specific hardware device. Here exists no special methods of preventing an attacker from obtaining multiple devices. The idea is that the cost of acquiring multiple devices is high.

Storage Give each node a large amount of uncompressible data and randomly verify small excerpts. Computation Ask the node to solve a difficult computational puzzle whose solution is easy to check. Money Charge some amount of money for each new Money: Charge some amount of money for each new identity.

Sybil-proof routing using social network A set of honest nodes connected by trust relationship and there is no idea of central trusted node. An adversary node creates multiple identities and try to gain the trust of the honest nodes. But the assumption here is that most honest nodes have more social connection to other honest nodes than the sybils.

SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu Michael Kaminsky Phillip B. Gibbons Abraham Flaxman SIGCOMM 2006 SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks Haifeng Yu Michael Kaminsky Phillip B. Gibbons Feng Xiao Oakland 2008 A Sybil-Proof Distributed Hash Table Chris Lesniewski-Laas, M. Frans Kaashoek NSDI 2010

Slide courtesy Kaashoek, Lesniewski-Laas

Sybil region Honest region … Attack edges Slide courtesy Kaashoek, Lesniewski-Laas

We want to incorporate AI based features in Sybil detection. Trusted voting mechanism Learning mechanism (Bayesian learning or some other advanced learning) Feature discovery options for Trust zone and Sybil zone. Maximum likelihood Framework Efficient DHT lookup bypassing Sybil nodes Learning mechanism Redundancy in lookup Effective use of majority voting

The Sybil Attack -John R.Douceur,Microsoft Research Security Considerations for Peer-to-Peer Distributed Hash Tables -Emil Sit and Robert Morris Sybil-resistant DHT routing -George Danezis1, Chris Lesniewski-Laas,M. Frans Kaashoek2, and Ross Anderson1 Computational Puzzles as Sybil Defenses- Nikita Borisov SybilGuard: Defending Against Sybil Attacks via Social Networks - Haifeng Yu Michael Kaminsky, Phillip B. Gibbons Abraham Flaxman A Survey of Solutions to the Sybil Attack - Brian Neil Levine1 Clay Shields2 N. Boris Margolin1

Cybil Occupation Chief Mouser to the Cabinet Office EmployerQueen Elizabeth II TitleDowning Street cat Do you know my name is Cybil too ??