Title :
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks
Author :
Yu, Haifeng ; Gibbons, Phillip B. ; Kaminsky, Michael ; Xiao, Feng
Author_Institution :
Sch. of Comput., Nat. Univ. of Singapore, Singapore, Singapore
fDate :
6/1/2010 12:00:00 AM
Abstract :
Open-access distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user creates multiple fake identities (called sybil nodes). Without a trusted central authority that can tie identities to real human beings, defending against sybil attacks is quite challenging. Among the small number of decentralized approaches, our recent SybilGuard protocol leverages a key insight on social networks to bound the number of sybil nodes accepted. Despite its promising direction, SybilGuard can allow a large number of sybil nodes to be accepted. Furthermore, SybilGuard assumes that social networks are fast-mixing, which has never been confirmed in the real world. This paper presents the novel SybilLimit protocol that leverages the same insight as SybilGuard, but offers dramatically improved and near-optimal guarantees. The number of sybil nodes accepted is reduced by a factor of Θ(√n), or around 200 times in our experiments for a million-node system. We further prove that SybilLimit´s guarantee is at most a logn factor away from optimal when considering approaches based on fast-mixing social networks. Finally, based on three large-scale real-world social networks, we provide the first evidence that real-world social networks are indeed fast-mixing. This validates the fundamental assumption behind SybilLimit´s and SybilGuard´s approach.
Keywords :
authorisation; computer network security; open systems; peer-to-peer computing; protocols; social networking (online); SybilGuard protocol; SybilLimit protocol; fast-mixing social networks; near-optimal social network defense; open-access distributed systems; peer-to-peer systems; sybil attacks; sybil nodes; trusted central authority; Social networks; SybilGuard; SybilLimit; sybil attack; sybil identities;
Journal_Title :
Networking, IEEE/ACM Transactions on
DOI :
10.1109/TNET.2009.2034047