The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007.

Slides:



Advertisements
Similar presentations
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
Advertisements

The Sybil Attack By John R. Douceur Presented by Samuel Petreski March 31, 2009.
Internetworking II: MPLS, Security, and Traffic Engineering
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
The Sybil Attack in Sensor Networks: Analysis & Defenses J. Newsome, E. Shi, D. Song and A. Perrig IPSN’04.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Haifeng Yu National University of Singapore
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Sybil Attack Hyeontaek Lim November 12, 2010.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
Small Worlds and the Security of Ubiquitous Computing From : IEEE CNF Author : Harald Vogt Presented by Chen Shih Yu.
1 The Sybil Attack John R. Douceur Microsoft Research Presented for Cs294-4 by Benjamin Poon.
Definition of terms Definition of terms Explain business conditions driving distributed databases Explain business conditions driving distributed databases.
Assessing the Effect of Deceptive Data in the Web of Trust Yi Hu, Brajendra Panda, and Yanjun Zuo Computer Science and Computer Engineering Department.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Disrupting Peer-to-Peer Networks Sybil & Eclipse Attacks Lee Brintle University of Iowa.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
1 Security and Trust in P2P systems. 2 What is trust When thinking about security in a system, various entities need to “trust” others to varying degrees.
BFTCloud: A Byzantine Fault Tolerance Framework for Voluntary-Resource Cloud Computing Yilei Zhang, Zibin Zheng, and Michael R. Lyu
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
PR SM A Secure Code Deployment Scheme for Active Networks Amdjed Mokhtari Leïla Kloul 22 November 2005.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Security Mechanisms for Distributed Computing Systems A9ID1007, Xu Ling Kobayashi Laboratory GSIS, TOHOKU UNIVERSITY 2011/12/15 1.
 Hubs Hubs  Bridges Bridges  Switches Switches  On-Line On-Line  Off-line Off-line  Bibliography Bibliography.
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu, Yinlong Xu, Xiaozhao Wang, Cheng Zhan and Pei.
1 Distributed Databases BUAD/American University Distributed Databases.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
“SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Defending Against Sybil Attacks Paul Parker Advisor: Shouhuai Xu.
1 NETWORKING 2012 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 22, 2012 Reducing the History in Decentralized.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
Langley Research Center An Architectural Concept for Intrusion Tolerance in Air Traffic Networks Jeffrey Maddalon Paul Miner {jeffrey.m.maddalon,
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Measuring the Mixing Time of Social Graphs Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim Computer Science and Engineering Department University of Minnesota.
Presented by Edith Ngai MPhil Term 3 Presentation
Dieudo Mulamba November 2017
Advanced Computer Networks
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Social Network-Based Sybil Defenses
Research Paper Overview.
Lecture 4a Mobile IP 1.
Presentation transcript:

The Sybil Attack, J. R. Douceur, IPTPS Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Outline Brief overview of the paper Discussion on differences between P2P networks and OSN and on how this effects Sybil attacks

Sybil Attack “Sybil” (1973) by Flora Rheta Schreiber Attacker creates multiple identities to control a large portion of the network and overcome redundancy

Identity Validation How does an entity know that two identities come from different entities? Centralized server is one option Douceur mentions three mechanisms of testing independence of identities in P2P –Communication –Computation –Storage

Identity Validation Four Lemmas “prove” that Sybil attacks are always possible without centralized authority

Lemma 1 Because entities are heterogeneous in terms of capabilities, a malicious entity can create several “minimal” identities Lower-bound on number of identities

Lemma 2 Unless identities are tested simultaneously, a compromised entity can create any number of identities Simultaneous identity verification not practical

Lemma 3 If a certain number of identities must vouch for a new identity for it to be accepted, then a set of compromised identities can create any number of new fake identities

Lemma 4 Without simultaneous validation of identities by a set of trusted entities, a single faulty entity can present many identities. Again, simultaneous validation is difficult in real-world networks.

Overview Conclusion Networks require centralized authority to validate network identities Without one, Sybil attacks are always a possibility

Identity Validation in an OSN Douceur mentions three mechanisms of testing independence of identities in P2P –Communication –Computation –Storage What mechanisms exist for social networks?

Identity Validation ?

OSN have lots of techniques to validate identities that are not present in P2P

Network

What about the links?

Links in a Social Network What are the Differences between links in a P2P network and links in an on-line social network?

Links in a Social Network What are the Differences between links in a P2P network and links in an on-line social network? –Links in OSN correspond to real-world links

Links in a Social Network What are the Differences between links in a P2P network and links in an on-line social network? –Links in OSN correspond to real-world links –Links in OSN take time and effort to setup

Links in a Social Network What are the Differences between links in a P2P network and links in an on-line social network? –Links in OSN correspond to real-world links –Links in OSN take time and effort to setup –Links in OSN cluster and have high # of intra-cluster connections

Links in a Social Network What does a link in a social network signify?

Links in a Social Network What does a link in a social network signify? –Indicates trust

Links in a Social Network What does a link in a social network signify? –Indicates trust –Vouches for individual

Links in a Social Network How many links can a malicious node in a P2P network create? How many in an OSN?

Links in a Social Network How many links can a malicious entity in a P2P network create? –As many as one wants. (mostly) How many in an OSN? –As many as one has time and effort to create.

Network What about the links?

Network

How can we identify this type of edge without global network typology?

Summary OSN have lots of techniques to validate identities that are not present in P2P Links in an OSN –Indicates trust –Vouches for individual –correspond to real-world links –take time and effort to setup –cluster and have high # of intra-cluster connections Malicious entity can only create as many links as they have time and effort to create.

Other Discussion Topics IPv6 privacy (mentioned in paper)