an analysis of social network-based sybil defenses sybil defender sybil examples wei wei ∗,...

47
An Analysis of Social Network- Based Sybil Defenses Sybil Defender Sybil examples Wei Wei , Fengyuan Xu , Chiu C. Tan†, Qun LiThe College of William and Mary

Upload: vincent-william-mckinney

Post on 17-Dec-2015

221 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

An Analysis of Social Network-Based Sybil Defenses

Sybil DefenderSybil examples

Wei Wei , Fengyuan Xu , Chiu C. Tan†, ∗ ∗Qun Li∗∗The College of William and Mary

Page 2: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Table of Contents

• Introduction to Sybil attack• Sybil Defense mechanisms• Sybil Defender algorithm• Limiting number of attacks• Evaluation of the algorithm• Limitations of Sybil Defense schemes• Comparison of algorithms.• Performance comparison of generated node Ranking• Performance comparison for detection of Sybils

Page 3: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Schema of Sybil Attack

WWW.

Internet Internet

Reputation SystemSybils votes

traffic

ID: 007

Page 4: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Introduction to Sybil attack

• Malicious attackers can create multiple identities and influence the working of systems that rely upon open membership.

• Avoiding multiple identity, or Sybil, attacks is known to be a fundamental problem in the design of distributed systems.

Page 5: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Delivery systems -Examples

Page 6: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William
Page 7: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Recommendation system

Page 8: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Traditional defenses

rely on trusted identities provided by a certification authority.

Disadvantage :• requiring users to present trusted identities runs

counter to the open membership.

Page 9: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Solutions

• Rely on social network structure instead of real users of network so they don’t require central trusted identities .

• All Sybil defense schemes rank nodes similarly—nodes within local communities around the trusted node.

• For example: nodes that around the trusted node are ranked higher than nodes in the rest of the network.

Page 10: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Problem Analysis

• We look on the scheme core.• the ranking nodes based on how well the nodes are

connected to a trusted node.

Page 11: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Assumptions

• The attacker cannot establish an arbitrarily large number of social connections to non-Sybil nodes.

• The honest region is fast mixing.• Sybil node have to cross small cut between regions.• The network consist at least 1 honest node.

Page 12: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Synthetic Network

two densely connected communities of 256 nodes each

Page 13: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Sybil Defender algorithm

• Based on random walk on the graph– the sequence of moves of a particle between nodes of G.

• The defender detect Sybil nodes and community of Sybils close to the theoretical bound.

• 2 users share a link if there is relationship between them.

• User = node• Sybil entity = # of nodes , honest = 1 node• Sybil community consist all the Sybil node.

Page 14: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Sybil Defender algorithm

• 3 components :Sybil Identification Algorithm

Sybil Community Detection Algorithm

Limiting the Number of Attack Edges

Page 15: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Definitions

Frequency of a node - the number of times the node beingtraversed by a set of random walks.random walk on a graph- the sequence of moves of a particle between nodes of G.

Page 16: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Algorithm 1

Log n -> fast mixing

Lmax ->large enough for R random walks to cover the region

Page 17: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Algorithm 2

Mean ->Average node number of frequency

Page 18: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Results of pre-processing

Page 19: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Limiting the Number of Attack Edges

The theoretical bound of the sybils node that we cannot detect is O(log n).

1. the users rate their relationships (friend or stranger).– removing the relationships rated as stranger from the

social graph when applying the Sybil defense schemes.

2. Build activity network that is based on the interaction between users.– Two nodes share an edge in an activity network if and only if they have

interacted directly through the communication mechanisms or applications provided by the corresponding social network.

Page 20: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Examples of defenses to limit the attackers

• Captcha • Verify mail• Ip• Social security number• Copy of ID

Page 21: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Evaluation parameters

• L0 = 1000 , Lmin = 100 , Lmax = 10000

• T = 5, alpha = 20 , Ls = 20 , F = 100 • R e {1000,1500,2000}• Number per attack = 1000• F+ -> percentage of honest that detect as sybil• F- -> percentage of sybil detect as honest• Sybil region = 10000 nodes• Each point avg of 20 experiments• Phi = mean – alpha * stdDeviation = t

Page 22: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

EVALUATION

• evaluate the effectiveness of Sybil Defender using 2 data sets – the largest data sets that evaluate Sybil defense :

Facebook Orkut

3,097,165 nodes 3,072,441 nodes

28,377,481 edges 117,185,083 edges

average degree of 18.32 average degree of 76.28

• In the experiments we use 2 models to construct the sybil regions respectively:

the preferential attachment (PA) model and the Erd¨os-R´enyi (ER) model.

20% rate of confirm fake friend

Page 23: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Orkut

Page 24: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Compare originating

Assumption: the existence of a small cut between the honest region and the Sybil region.

PA Model

Page 25: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Compare per attack

Page 26: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Sybil limit VS Sybil defender

Page 27: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Sybil limit result

Page 28: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Running time

• Sybil Limit invokes a large number (r = 10000 for our Facebook data set) of instances of the random route generation protocol.

• Sybil Defender only relies on performing a limited number of random walks

Sybil Limit (R=2000)

Sybil Defender (R=2000)

11.56 seconds 0.87 seconds one Sybil node

83.55 seconds

7.11 seconds one honestnode

Page 29: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Comparing algorithm defenses

• Each algorithm has been shown to work well under its own assumptions about the structure of the social network and the links connecting non-Sybil and Sybil nodes.

Page 30: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Comparing approch 1

• view the schemes as complete coherent proposals (treat them as “black boxes”).

• Pros:– would provide useful performance comparisons between a

fixed configuration of schemes over a given set of social networks and attack strategies by the Sybils.

• Cons:– would not yield conclusive information on how a particular scheme

would perform if either the given social network or the behavior of the attacker should change.

– not allow us to derive any fundamental insights into how these schemes work.

Page 31: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Comparing approch 2

• find a core insight common to all the schemes that would explain their performance in any setting.

• Pros:– provides guidance on improving future designs, but also

sheds light on the limits of social network-based Sybil defense.

• Cons:– we need to reduce the schemes to their core task before

analyzing them.

Page 32: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

How the schemes works

• schemes attempt to isolate Sybils embedded within a social network topology.

• Every scheme declares nodes in the network as either Sybils or non-Sybils from the perspective of a trusted node, effectively partitioning the nodes in the social network into two distinct regions (non-Sybils and Sybils).

Page 33: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Balanced Partition graph

• The problem is under NP-Hard section

(if the graph degree balanced so it NP-C).• The problem is to find (k,v) partition

k components of at most size v·(n/k) while minimizing the capacity of the edges between separate components.

Page 34: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Graph partition methods

• local methods to find partition graph are the Kernighan–Lin algorithm, and Fiduccia-Mattheyses algorithms

Usage of this methods

Page 35: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Sybil Community Detection Algorithm

Page 36: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Sybil Community Detection Algorithm

Page 37: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Sybil community detection algorithm

Page 38: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William
Page 39: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Examples of defenses schemes

Page 40: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Data set evaluation

ROC - is the probability that a Sybil defense scheme ranks a randomly selected Sybil node lower than a randomly selected non-Sybil nodeConductance - metric for evaluating the quality of communities (lower numbers indicate stronger communities)Mutual Information - measures the similarity of two partitions of a set :

0 = no correlation1 = perfect match

Page 41: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Limitations of Sybil Defense - Impact of Social Network Structure

Synthetic Network

Page 42: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Limitations of Sybil Defense - Impact of Social Network Structure

Page 43: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Limitations of Sybil Defense – Targeted Sybil Attacks

• Sybil defense schemes assume that attackers (Sybils) establish links to randomly selected nodes in the network.

• To find out the performance of Sybil defense schemes in targeted attacks, attackers have more control over their link placement to k nodes closest to trusted node.

As Sybil links get closer to trusted node, Sybil nodes are ranked higher than non-Sybil nodes

Page 44: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Community Detection (CD) Algorithms

• Section of algorithms that Very widely explorer and investigate so we can use of its detection of local community.

• We use the algorithm of “Mislove” that iteratively pass on his neighbor’s nodes from a given 1 or 2 initialize node.

• We will compare its node ranking with those of existing Sybil defense schemes, to determine if it is able to defend against sybils with similar accuracy.

Page 45: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

• The similarity of generated partitions and quality of communities is max at partition size of 256

Comparison of Generated Rankings

Synthetic Network

Page 46: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Facebook Network Astrophysics Network

Comparison of Generated Rankings(Real World Networks)

• Nodes that are tightly connected around a trusted node are more likely to be ranked higher

• When there are multiple nodes that are similarly well connected to the trusted node are often ranked differently in different algorithms.

Page 47: An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William

Performance comparison for Sybil Detection

Synthetic Network

Facebook Network