The Sybil Attack, J. R. Douceur, IPTPS Clifton Forlines CSC2231 Online Social Networks 11/1/2007
Outline Brief overview of the paper Discussion on differences between P2P networks and OSN and on how this effects Sybil attacks
Sybil Attack “Sybil” (1973) by Flora Rheta Schreiber Attacker creates multiple identities to control a large portion of the network and overcome redundancy
Identity Validation How does an entity know that two identities come from different entities? Centralized server is one option Douceur mentions three mechanisms of testing independence of identities in P2P –Communication –Computation –Storage
Identity Validation Four Lemmas “prove” that Sybil attacks are always possible without centralized authority
Lemma 1 Because entities are heterogeneous in terms of capabilities, a malicious entity can create several “minimal” identities Lower-bound on number of identities
Lemma 2 Unless identities are tested simultaneously, a compromised entity can create any number of identities Simultaneous identity verification not practical
Lemma 3 If a certain number of identities must vouch for a new identity for it to be accepted, then a set of compromised identities can create any number of new fake identities
Lemma 4 Without simultaneous validation of identities by a set of trusted entities, a single faulty entity can present many identities. Again, simultaneous validation is difficult in real-world networks.
Overview Conclusion Networks require centralized authority to validate network identities Without one, Sybil attacks are always a possibility
Identity Validation in an OSN Douceur mentions three mechanisms of testing independence of identities in P2P –Communication –Computation –Storage What mechanisms exist for social networks?
Identity Validation ?
OSN have lots of techniques to validate identities that are not present in P2P
Network
What about the links?
Links in a Social Network What are the Differences between links in a P2P network and links in an on-line social network?
Links in a Social Network What are the Differences between links in a P2P network and links in an on-line social network? –Links in OSN correspond to real-world links
Links in a Social Network What are the Differences between links in a P2P network and links in an on-line social network? –Links in OSN correspond to real-world links –Links in OSN take time and effort to setup
Links in a Social Network What are the Differences between links in a P2P network and links in an on-line social network? –Links in OSN correspond to real-world links –Links in OSN take time and effort to setup –Links in OSN cluster and have high # of intra-cluster connections
Links in a Social Network What does a link in a social network signify?
Links in a Social Network What does a link in a social network signify? –Indicates trust
Links in a Social Network What does a link in a social network signify? –Indicates trust –Vouches for individual
Links in a Social Network How many links can a malicious node in a P2P network create? How many in an OSN?
Links in a Social Network How many links can a malicious entity in a P2P network create? –As many as one wants. (mostly) How many in an OSN? –As many as one has time and effort to create.
Network What about the links?
Network
How can we identify this type of edge without global network typology?
Summary OSN have lots of techniques to validate identities that are not present in P2P Links in an OSN –Indicates trust –Vouches for individual –correspond to real-world links –take time and effort to setup –cluster and have high # of intra-cluster connections Malicious entity can only create as many links as they have time and effort to create.
Other Discussion Topics IPv6 privacy (mentioned in paper)