“sybilguard: defending against sybil attacks via social networks” authors: haifeng yu, phillip...

16
“SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Upload: pierce-farmer

Post on 05-Jan-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

“SybilGuard: Defending Against Sybil Attacks via

Social Networks”Authors: Haifeng Yu, Phillip B.

Gibbons, and Suman Nath

(several slides based on authors’)

Page 2: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

The Problem

• Redundancy lets distributed systems compensate for faulty nodes– Ex: Store data on multiple nodes

• The Sybil Attack undermines redundancy

• Need a central authority to determine which nodes are honest

Page 3: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

SybilGuard’s Central Authority

• Main Idea: Use a social network as the “central authority”

• A node trusts its neighbours

• Each node learns about the network from its neighbours

Page 4: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Sybil Nodes and Attack Edges

honestnodes

Sybilnodes

- Edges to honest nodes are “human established”- Attack edges are difficult for Sybil nodes to create

Attack Edges

Page 5: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Attack Edges Are Rare

• SybilGuard hinges on having relatively few attack edges

• To subvert system an attacker must compromise many honest nodes

Page 6: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

SybilGuard’s Model

• A social network exists containing honest nodes and Sybil nodes

• Honest nodes provide a service to or receive a service from nodes that they “accept”

• Ideally, only honest nodes are accepted

Page 7: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

SybilGuard’s Guarantees

With high probability an honest node…– Accepts most honest nodes– Is accepted by most honest nodes– Accepts at most a bounded number of Sybil

nodes– (Can partition accepted nodes into sets, of

which a bounded number contain Sybil nodes)

Page 8: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Segue: Random Routes

• Every node picks a random routing from input to output edges

• A directed edge is in exactly one route of unbounded length

• A directed edge is in at most w routes of length w

e

Page 9: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Clever Use of Random Routes

• Each node finds all the length w random routes that start at it

• Honest node V accepts node S if most of V’s random routes intersect a random route of S

• Why does this work?

Page 10: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Random Route Intersection: Honest Nodes

• WHP– verifier’s route

stays within honest region

– routes from two honest nodes intersect

sybil nodeshonest nodes

Verifier

Suspect

Page 11: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Random Route Intersection: Sybil Nodes

• Each attack edge gives one intersection

• Intersection points are SybilGuard’s equivalence sets

sybil nodeshonest nodes

VerifierSuspect

same intersection

Page 12: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Nodes Accepted per Intersection

• Verifier accepts at most w nodes per intersection

Verifier

for a given intersection

Page 13: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Bounds on Accepted Sybil Nodes

• For routes of length w in a network with g attack edges, WHP, – Accepted nodes can be partitioned into sets

of which at most g contain Sybil nodes– Honest nodes accept at most w*g Sybil nodes

Page 14: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Applications of SybilGuard

• Can SybilGuard be applied to any current distributed systems?

• Does it allow any new systems to be created?

Page 15: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Restrictions Imposed On Applications

• There must be a social network– Nodes must create and maintain their

friendships

• How many social networks will we need?– One for each application, or– A single network used by many applications

Page 16: “SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)

Privacy Implications

• Information about friends spreads along routes

• Verification involves nodes sharing all their routes– Bloom filters help here

• Nodes are not anonymous