An Analysis of Social Network-Based Sybil Defenses

被引:155
|
作者
Viswanath, Bimal
Post, Ansley
Gummadi, Krishna P.
Mislove, Alan
机构
关键词
Security; Design; Algorithms; Experimentation; Sybil attacks; social networks; social network-based Sybil defense; communities;
D O I
10.1145/1851275.1851226
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been proposed, but they differ greatly in the algorithms they use and in the networks upon which they are evaluated. As a result, the research community lacks a clear understanding of how these schemes compare against each other, how well they would work on real-world social networks with different structural properties, or whether there exist other (potentially better) ways of Sybil defense. In this paper, we show that, despite their considerable differences, existing Sybil defense schemes work by detecting local communities (i.e., clusters of nodes more tightly knit than the rest of the graph) around a trusted node. Our finding has important implications for both existing and future designs of Sybil defense schemes. First, we show that there is an opportunity to leverage the substantial amount of prior work on general community detection algorithms in order to defend against Sybils. Second, our analysis reveals the fundamental limits of current social network-based Sybil defenses: We demonstrate that networks with well-defined community structure are inherently more vulnerable to Sybil attacks, and that, in such networks, Sybils can carefully target their links in order make their attacks more effective.
引用
收藏
页码:363 / 374
页数:12
相关论文
共 50 条
  • [1] Designs to Account for Trust in Social Network-based Sybil Defenses
    Mohaisen, Abedelaziz
    Hopper, Nicholas
    Kim, Yongdae
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 714 - 716
  • [2] Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs
    Mohaisen, Aziz
    Hollenbeck, Scott
    INFORMATION SECURITY APPLICATIONS, WISA 2013, 2014, 8267 : 65 - 80
  • [3] Keep your friends close: Incorporating trust into social network-based Sybil defenses
    Mohaisen, Abedelaziz
    Hopper, Nicholas
    Kim, Yongdae
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 1943 - 1951
  • [4] Sybil defenses in DHT networks based on social relationships
    Han, Xinhui
    Xiao, Xianquan
    Zhang, Jianyu
    Liu, Bingshuang
    Zhang, Yuan
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2014, 54 (01): : 1 - 7
  • [5] On The Effectiveness of Sybil Defenses Based on Online Social Networks
    Koll, David
    Li, Jun
    Stein, Joshua
    Fu, Xiaoming
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [6] Sybil Defenses in Mobile Social Networks
    Chang, Wei
    Wu, Jie
    Tan, Chiu C.
    Li, Feng
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 641 - 646
  • [7] Thank You For Being A Friend: An Attacker View on Online-Social-Network-based Sybil Defenses
    Koll, David
    Schwarzmaier, Martin
    Li, Jun
    Li, Xiang-Yang
    Fu, Xiaoming
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, : 157 - 162
  • [8] SybilShield: An Agent-Aided Social Network-Based Sybil Defense among Multiple Communities
    Shi, Lu
    Yu, Shucheng
    Lou, Wenjing
    Hou, Y. Thomas
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 1034 - 1042
  • [9] Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses
    Pu, Cong
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 4937 - 4949
  • [10] On the State of OSN-based Sybil Defenses
    Koll, David
    Li, Jun
    Stein, Joshua
    Fu, Xiaoming
    2014 IFIP NETWORKING CONFERENCE, 2014,