SybilGuard: Defending against sybil attacks via social networks

被引:296
作者
Yu, Haifeng [1 ]
Kaminsky, Michael
Gibbons, Phillip B.
Flaxman, Abraham
机构
[1] Intel Res Pittsburgh, Pittsburgh, PA USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
security; design; algorithms; experimentation; sybil attack; sybil identity; SybilGuard; social networks;
D O I
10.1145/1151659.1159945
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the system, the malicious user is able to "out vote" the honest users in collaborative tasks such as Byzantine failure defenses. This paper presents SybilGuard, a novel protocol for limiting the corruptive influences of sybil attacks. Our protocol is based on the "social network" among user identities, where an edge between two identities indicates a human-established trust relationship. Malicious users can create many identities but few trust relationships. Thus, there is a disproportionately-small "cut" in the graph between the sybil nodes and the honest nodes. SybilGuard exploits this property to bound the number of identities a malicious user can create. We show the effectiveness of SybilGuard both analytically and experimentally.
引用
收藏
页码:267 / 278
页数:12
相关论文
共 25 条
  • [1] ABRAHAM I, 2003, DISC
  • [2] [Anonymous], EUROCRYPT
  • [3] [Anonymous], 2003, INT SEM WEB C
  • [4] BAZZI R, 2005, ACM PODC
  • [5] Bolosky W. J., 2000, ACM SIGMETRICS
  • [6] Boyd S, 2005, IEEE INFOCOM SER, P1653
  • [7] Cheng A., 2005, ACM SIGCOMM WORKSH E
  • [8] Danezis G, 2005, EUR S RES COMP SEC
  • [9] DOUCEUR J, 2002, IPTPS
  • [10] FELDMAN M, 2004, ACM ELECT COMMERCE