Download presentation
Presentation is loading. Please wait.
Published byVivien Rice Modified over 9 years ago
1
SybilGuard: Defending Against Sybil Attacks via Social Networks
2
2 - Sailesh Kumar - 12/16/2015 Overview n Introduction to sybil attack n Graph Theoretic Model and Problem Formulation n Overview of SybilGuard n Complete Design n Simulation Results and Analysis n Conclusion
3
3 - Sailesh Kumar - 12/16/2015 Introduction to the Problem n As the scale of a decentralized distributed system increases »Malicious behavior become a norm »If 1/3 nodes are malicious => no guarantee »Sybil attacks: a user takes multiple identities –Can easily create n/3 sybil nodes n Using Central Authority »Can Control Sybil attacks »Worldwide trusted central authority is problematic »Central authority may become the bottleneck –DoS »May scare away potential users n Defending against sybil attacks is difficult »IP address harvesting »Intelligent adversary
4
4 - Sailesh Kumar - 12/16/2015 Problem Formulation and Objective n Social network »n honest human users »1+ malicious users : multiple sybil identities n Devise a defense system against sybil attacks »SybilGuard enables an honest node to identify other nodes »Verifier node V can verify if suspect node S is malicious n Guaranteed bound on number of sybil groups »Divides n nodes into m equivalence classes »A group is sybil if it contains 1+ sybil nodes n Guaranteed bound on size of sybil groups »In a group, at most w sybil nodes n Completely decentralized »An honest node accepts honest nodes with high probability »Rejects malicious nodes with high probability »Accepts bounded number of sybil nodes
5
5 - Sailesh Kumar - 12/16/2015 Social Network n Millions of users (nodes) n Friends are connected by an edge (friends) »Usually degree of a nodes is small (~30) n A malicious user fools an honest user »Creates an attack edge n SybilGuard limits number of attack edges »Independent of number of sybil identities –Friends share a secret edge key –Edge keys are assigned out-of-band
6
6 - Sailesh Kumar - 12/16/2015 Trends n Social networks are fast mixing n Many sybil nodes disrupts this property »Creates a low quotient cut in the graph n We assume that number of attack edges are few »Out-of-band edge creation »In real life a malicious user can not create many real friends »Multiple identities are not useful n SybilGuard does not try to detect low quotient cuts but rather proposes an effective decentralized approach
7
7 - Sailesh Kumar - 12/16/2015 Random Routes n Foundation of SybilGuard: different from random walk n Random route begins at a random edge of a node n At every node »For an incoming edge i, there is a unique outgoing edge j »Thus, input to output is one-to-one mapped n A node A with d neighbors uniformly randomly chooses a permutation “x1,x2,...,xd” among all permutations of 1,2,...,d. n If a random route comes from the ith edge, A uses edge xi as the next hop.
8
8 - Sailesh Kumar - 12/16/2015 Properties of Random Routes n Convergence »Once two routes merge, they will remain merged n Routes are back-traceable n There can be only one route with length w that traverses e along the given direction at its ith hop n If two random routes ever share an edge in the same direction, then one of them must start in the middle of the other n Cycles can exist, but with low probability »Prob. (diameter k cycle) = 1/d (k-2)
9
9 - Sailesh Kumar - 12/16/2015 SybilGuard Algorithm n node V: verify node S »V computes d random routes (length w) »S computes d random routes (length w) »If d/2 random routes intersects, accept S »Else reject S n If few attack edges, then a sybil node’s random route is less likely to reach honest region n And vice-versa
10
10 - Sailesh Kumar - 12/16/2015 SybilGuard Design n Decentralized design n Each node performs d random routes n A node registers with all nodes along its random routes »Registration is done using public-private key
11
11 - Sailesh Kumar - 12/16/2015 SybilGuard Design n Witness tables »Reverse registration table »Stores all downstream nodes along a random route –Registration table stores upstream nodes »This table also contains IP addresses of the nodes –Will see why?
12
12 - Sailesh Kumar - 12/16/2015 Validation Process (V verifies S) n S sends all its witness tables to V n V intersects its own witness tables with those of S n If intersection point X »V contacts X (using IP address in witness table) »Authenticates with private key of X »Checks if V is present in X’s registry table »If yes, then this route accepts S n If d/2 routes accept S, then V accepts S V S X
13
13 - Sailesh Kumar - 12/16/2015 Length of Random Routes n It has been shown that »If w = Θ(√nlogn), then honest routes will intersect with high probability »Also the probability that a honest random route will reach sybil region is low n Nodes locally determine w »Node A does small random walk and lets say reaches node B »A and B intersects their witness table »The distance m of first intersection point determines w »w = 2.1m »2.1 is derived from analysis of Birthday Paradox distributions
14
14 - Sailesh Kumar - 12/16/2015 SybilGuard Dynamics n Dealing with offline nodes »Bypass them »Use lookahead routing tables –Store information about next k hops n Incremental routing table maintenance »New nodes only slightly changes current routing permutation »Like DHT
15
15 - Sailesh Kumar - 12/16/2015 Probability of Intersection n Probability of intersection of honest routes »1 million nodes »Node degree = 24 24 random routes, Accept if 10 intersections
16
16 - Sailesh Kumar - 12/16/2015 Probability of False Detection n Probability that honest routes remain in honest region
17
17 - Sailesh Kumar - 12/16/2015 Discussion n An honest node accepts other honest nodes with 99.8% prob? »How about remaining 0.2% probability? n How to apply SybilGuard to completely virtual social networks where there are few real friends? n Compromised computers »Hundreds of thousands »Millions of attacks edges »SybilGuard will fail n Are Social networks indeed big or small?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.