sybilguard defending against sybil attacks sybilguard
play

SybilGuard: Defending Against Sybil Attacks SybilGuard: Defending - PowerPoint PPT Presentation

SybilGuard: Defending Against Sybil Attacks SybilGuard: Defending Against Sybil Attacks via Social Networks via Social Networks Intel Research Pittsburgh / CMU Haifeng Yu National University of Singapore Michael Kaminsky Intel Research


  1. SybilGuard: Defending Against Sybil Attacks SybilGuard: Defending Against Sybil Attacks via Social Networks via Social Networks Intel Research Pittsburgh / CMU � Haifeng Yu National University of Singapore Michael Kaminsky Intel Research Pittsburgh Phillip B. Gibbons Intel Research Pittsburgh Microsoft Research Abraham Flaxman (previously at CMU)

  2. Background: Sybil Attack Background: Sybil Attack � Sybil attack: Single user honest pretends many fake/sybil identities malicious � Creating multiple accounts from different IP addresses launch sybil attack � Sybil identities can become a large fraction of all identities � Out-vote honest users in collaborative tasks Haifeng Yu, Intel Research / CMU � National University of Singapore 2

  3. Background: Defending Against Sybil Attack Background: Defending Against Sybil Attack � Using a trusted central authority � Tie identities to actual human beings � Not always desirable � Can be hard to find such authority � Sensitive info may scare away users � Potential bottleneck and target of attack � Without a trusted central authority � Impossible unless using special assumptions [Douceur’02] � Resource challenges not sufficient -- adversary can have much more resources than typical user Haifeng Yu, Intel Research / CMU � National University of Singapore 3

  4. SybilGuard Basic Insight: SybilGuard Basic Insight: Leveraging Social Networks Leveraging Social Networks Our Social Network Definition � Undirected graph � Nodes = identities � Edges = strong trust � E.g., colleagues, relatives Haifeng Yu, Intel Research / CMU � National University of Singapore 4

  5. SybilGuard Basic Insight SybilGuard Basic Insight � n honest users: One identity/node each � Malicious users: Multiple identities each (sybil nodes) sybil honest nodes nodes attack Sybil nodes edges may collude – the adversary malicious user Observation: Adversary cannot create extra edges between honest nodes and sybil nodes Haifeng Yu, Intel Research / CMU � National University of Singapore 5

  6. SybilGuard Basic Insight SybilGuard Basic Insight Dis-proportionally small cut sybil honest disconnecting a nodes nodes large number of identities But cannot search for such cut brute- force… Haifeng Yu, Intel Research / CMU � National University of Singapore 6

  7. Outline Outline � Motivation and SybilGuard basic insight � Overview of SybilGuard: Random routes � Properties of SybilGuard protocol � Evaluation results � Conclusions Haifeng Yu, Intel Research / CMU � National University of Singapore 7

  8. Goal of Sybil Defense Goal of Sybil Defense � Goal: Enable a verifier node to decide whether to accept another suspect node � Accept: Provide service to / receive service from � Idealized guarantee: An honest node accepts and only accepts other honest nodes � SybilGuard: � Bounds the number of sybil nodes accepted � Guarantees are with high probability � Approach: Acceptance based on random route intersection between verifier and suspect Haifeng Yu, Intel Research / CMU � National University of Singapore 8

  9. Random Walk Review Random Walk Review f a e b d c pick random edge d pick random edge e pick random edge c Haifeng Yu, Intel Research / CMU � National University of Singapore 9

  10. Random Route: Convergence Random Route: Convergence f a e b d a � d d � e c b � a e � d randomized c � b f � f routing table d � c Random 1 to 1 mapping between incoming edge and outgoing edge Using routing table gives Convergence Property: Routes merge if crossing the same edge Haifeng Yu, Intel Research / CMU � National University of Singapore 10

  11. Random Route: Back Random Route: Back-traceable traceable f a e b d a � d d � e If we know the c b � a e � d route traverses c � b f � f edge e, then d � c we know the whole route Using 1-1 mapping gives Back-traceable Property: Routes may be back-traced Haifeng Yu, Intel Research / CMU � National University of Singapore 11

  12. Random Route Intersection: Random Route Intersection: Honest Nodes Honest Nodes � Verifier accepts a suspect if the two Verifier routes intersect � Route length w : Suspect ~ n log n � W.h.p., verifier’s route stays within honest region � W.h.p., routes from two honest nodes honest nodes sybil nodes intersect Haifeng Yu, Intel Research / CMU � National University of Singapore 12

  13. Random Route Intersection: Random Route Intersection: Sybil Nodes Sybil Nodes � SybilGuard bounds the number of accepted sybil nodes within g * w � g : Number of attack edges � w : Length of random routes � Next … � Convergence property to bound the number of intersections within g � Back-traceable property to bound the number of accepted sybil nodes per intersection within w Haifeng Yu, Intel Research / CMU � National University of Singapore 13

  14. Bound # Intersections Within Bound # Intersections Within g must cross attack edge to intersect even if sybil nodes do not follow the protocol � Convergence: Each Verifier attack edge gives Suspect one intersection � at most g same intersections with g intersection attack edges Intersection = (node, incoming edge honest nodes sybil nodes Haifeng Yu, Intel Research / CMU � National University of Singapore 14

  15. Bound # Sybil Nodes Accepted per Bound # Sybil Nodes Accepted per Intersection within Intersection within w � Back-traceable: Each Verifier intersection should correspond to routes from at most w honest nodes � Verifier accepts at most w nodes per intersection � Will not hurt honest nodes for a given intersection Haifeng Yu, Intel Research / CMU � National University of Singapore 15

  16. Summary of SybilGuard Guarantees Summary of SybilGuard Guarantees � Power of the adversary: If SybilGuard Then apps bounds # can do � Unlimited number of accepted colluding sybil nodes sybil nodes � Sybil nodes may not follow within SybilGuard protocol n / 2 byzantine � W.h.p., honest node accepts consensus ≤ g * w sybil nodes n majority � g : # of attack edges voting � w : Length of random route not much effective larger than n replication Haifeng Yu, Intel Research / CMU � National University of Singapore 16

  17. Outline Outline � Motivation and SybilGuard basic insight � Overview of SybilGuard � Properties of SybilGuard protocol � Evaluation results � Conclusions Haifeng Yu, Intel Research / CMU � National University of Singapore 17

  18. SybilGuard Protocol SybilGuard Protocol � Security: � Protocol ensures that nodes cannot lie about their random routes in the honest region � Decentralized: � No one has global view � Nodes only communicate with direct neighbors in the social network when doing random routes Haifeng Yu, Intel Research / CMU � National University of Singapore 18

  19. SybilGuard Protocol (continued) SybilGuard Protocol (continued) � Efficiency: Random routes are performed only once and then “remembered” � No more message exchanges needed unless the social network changes � Verifier incurs O(1) messages to verify a suspect � User and node dynamics: � Different from DHTs, node churn is a non-problem in SybilGuard … � See paper for all the details … Haifeng Yu, Intel Research / CMU � National University of Singapore 19

  20. Evaluation Results Evaluation Results � Simulation based on synthetic social network model [Kleinberg’00] for 10 6 , 10 4 , 10 2 nodes � With 2500 attack edges (i.e., adversary has acquired 2500 social trust relationships): � Honest node accepts honest node with 99.8% prob � 99.8% honest node properly bounds the number of accepted sybil nodes � See paper for full results … Haifeng Yu, Intel Research / CMU � National University of Singapore 20

  21. Conclusions Conclusions � Sybil attack: Serious threat to collaborative tasks in decentralized systems � SybilGuard: Fully decentralized defense protocol � Based on random routes on social networks � Effectiveness shown via simulation and analysis � Future work: � Implementation nearly finished � Evaluation using real and large-scale social networks Haifeng Yu, Intel Research / CMU � National University of Singapore 21

  22. SybilGuard: Defending Against Sybil Attacks SybilGuard: Defending Against Sybil Attacks via Social Networks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip Gibbons, Abraham Flaxman Full Technical Report available at: http://www.cs.cmu.edu/~yhf or Google “SybilGuard”

Recommend


More recommend