Title :
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Author :
Yu, Haifeng ; Gibbons, Phillip B. ; Kaminsky, Michael ; Xiao, Feng
Author_Institution :
Nat. Univ. of Singapore, Singapore
Abstract :
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sybil nodes). Without a trusted central authority, defending against sybil attacks is quite challenging. Among the small number of decentralized approaches, our recent SybilGuard protocol [H. Yu et al., 2006] leverages a key insight on social networks to bound the number of sybil nodes accepted. Although its direction is promising, SybilGuard can allow a large number of sybil nodes to be accepted. Furthermore, SybilGuard assumes that social networks are fast mixing, which has never been confirmed in the real world. This paper presents the novel SybilLimit protocol that leverages the same insight as SybilGuard but offers dramatically improved and near-optimal guarantees. The number of sybil nodes accepted is reduced by a factor of ominus(radicn), or around 200 times in our experiments for a million-node system. We further prove that SybilLimit´s guarantee is at most a log n factor away from optimal, when considering approaches based on fast-mixing social networks. Finally, based on three large-scale real-world social networks, we provide the first evidence that real-world social networks are indeed fast mixing. This validates the fundamental assumption behind SybilLimit´s and SybilGuard´s approach.
Keywords :
distributed processing; peer-to-peer computing; protocols; security of data; SybilGuard protocol; SybilLimit protocol; decentralized distributed system; fast mixing social network; malicious user; million-node system; multiple identity; near-optimal social network defense; peer-to-peer system; sybil attack; sybil nodes; Collaboration; Humans; Large-scale systems; National security; Peer to peer computing; Privacy; Protocols; Routing; Social network services; Voting; Sybil attack; SybilLimit; social networks; sybil identity;
Conference_Titel :
Security and Privacy, 2008. SP 2008. IEEE Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
978-0-7695-3168-7