sok: the evolution of sybil defense via social networks · sybil defense & community detection...

41
SoK: The Evolution of Sybil Defense via Social Networks Sapienza U. Rome 1 , U. T. Austin 2 , MPI-SWS 3 , Google Reseach 4 1 IEEE Symposium on Security & Privacy Alessandro Epasto 1 joint work with L. Alvisi 2 , A. Clement 3 , S. Lattanzi 4 , A. Panconesi 1 SAN FRANCISCO – 21 ST MAY 2013

Upload: others

Post on 14-Mar-2021

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

SoK: The Evolution of Sybil Defense via Social Networks

Sapienza U. Rome1, U. T. Austin2, MPI-SWS3, Google Reseach4

1

IEEE Symposium on Security & Privacy

Alessandro Epasto1 joint work with L. Alvisi2, A. Clement3, S. Lattanzi4, A.

Panconesi1

SAN FRANCISCO – 21ST MAY 2013

Page 2: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Sybil Attack, 50 B.C.

Julius

Marcus

Brutus

Asterix

Obelix

Panoramix

Idefix

Attack edge

Cleo

Page 3: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

The Goal of Sybil Defense

Cleo

Julius

Marcus

Brutus

Asterix

Obelix

Panoramix

Idefix

Honest Sybil

Page 4: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Motivation

● Fundamental security issue in any open system. ● Real impact:

● >500k sybils in RenRen. ● Manual checking is expensive (Tuenti).

Page 5: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Social Sybil Defense

● Key idea: leverage social structure ● Friendship is hard to fake!

Page 6: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Our contributions

● A perspective on the past of social sybil defense ● Unifies two distinct trends

● Random-walk based methods ● Community detection

● A program for the future of sybil defense ● All sybil defense is local

● A concrete first step on the new road ● First community detection algorithm with

provable sybil defense guarantees

Page 7: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

How can we leverage the structure of the social graph?

Page 8: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

A thought experiment

● Given a social network, is it under sybil attack? ● Which property to use?

Clustering coefficient

Small world phenomena

Popularity distribution

Conductance

Page 9: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Conductance

● Conductance measures how well connected a graph is.

● (Intuitively) A graph has high conductance only if there are no sets of nodes sparsely connected with the rest of the graph.

● Our analysis shows that conductance is by far the most resilient property

Page 10: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Why random walks?

 

Page 11: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Random walk based defenses

● Many state of the art solutions use random walks: ● SybilGuard, Yu et al., SIGCOMM 2006 ● SybilLimit, Yu et al., SP 2008 ● SybilInfer, Danezis et al., NSDD 2006 ● SybilRank, Cao et al, NSDI 2012

● Our contribution: A unified view of these techniques based on random walk theory.

Page 12: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Random Walks: the intuition

Page 13: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

A toy problem● Consider the following simplified problem:

● Two disjoint graphs. No attack edges.

Honest Sybil

Page 14: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

A toy problem● Consider the following simplified problem:

● Two disjoint graphs. No attack edges. ● How can a node decide who to trust in a distributed

way?

x

Honest Sybil

Page 15: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

A toy problem● Consider the following simplified problem:

● Two disjoint graphs. No attack edges. ● How can a node decide who to trust in a distributed

way?

x

y

Honest Sybil

Page 16: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

A toy problem● Consider the following simplified problem:

● Two disjoint graphs. No attack edges. ● How can a node decide who to trust in a distributed

way?

x

Honest

y

Sybil

Page 17: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Random walks ● Intuition: perform a random walk from each node ● Two node trust each other if there is any intersection.

x

y

Honest Sybil

Page 18: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Properties of the protocol

● Safety: sybil nodes are never accepted

● Liveness: boost probability of accepting honest nodes by using many random walks (still computationally efficient)

Page 19: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Implementation of the protocol

 

Page 20: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Back to the real world● The two graphs are not disjoint. ● With few attack edges and short walks it still works. ● Note: Precise theoretical guarantees are based on

conductance.

Honest Sybil

Attack edges

Page 21: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Central assumptions

Honest Sybil

● The method works provided that two assumptions are met: 1. Sparse cut between honest and sybils; 2. The honest region is fast mixing.

● Then: it works (specifying in which sense requires some care)

Page 22: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

However…

Page 23: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

The two assumptions do not hold

Honest Sybil

CA

B

The cut is not as sparse as assumed (Bilge et al. WWW 2009)

The honest region is not fast mixing (Mohaisen, et al. IMC 2010)

Page 24: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Global sybil defense is unrealistic

Traditional sybil defense depends on

assumptions that are too strong…

What can we realistically do?

Page 25: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

From global to local sybil defense

Page 26: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Sybil defense in real networks

● A can not distinguish between B and C

Sybil

c

Honest

A

B

Page 27: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

A new goal for sybil defense

● White-list the nodes in A’s community ● Practically useful ● Attainable.

Sybil

c

Honest

B

A

Page 28: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Sybil Defense & Community Detection

●Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). ● Must identify correct and sybil communities

●… but with no provable guarantees!

Our contribution: A community detection algorithm with provable sybil defense guarantees

● The keys once again are conductance and random walks

Page 29: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Random Walks Revisited: ACL

● How to find the community of given node? ● Random walks with a bias on the community of the seed ● Assign higher score to nodes inside the community

● Leverage community detection literature: ● ACL (Andersen, et al. 2006) ● Provable sybil defense guarantees.

Page 30: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Random Walks Revisited: ACL

● Personalized PageRank: variable length random walks

X

0

0

0

0

0

0

0

Honest

 

 

 

  

 

Sybil

3 Steps

Page 31: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Random Walks Revisited: ACL

● Personalized PageRank: variable length random walks

X

0

0

0

1

0

0

0

Honest

 

 

 

  

 

Sybil

2 Steps

Page 32: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Random Walks Revisited: ACL

● Personalized PageRank: variable length random walks ● After many walks…

X

0

1

0

1

0

0

0

Honest

 

 

 

  

 

Sybil

Page 33: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Random Walks Revisited: ACL

● Personalized PageRank: variable length random walks ● After many walks… ● Node’s score = how frequently node is visited

X

6

8

2

8

4

3

9

Honest

5

4

3

12

3

Sybil

Page 34: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Random Walks Revisited: ACL

● High degree nodes can achieve disproportionate score

X

6

8

4

8

4

4

9

Honest

5

4

3

12

3

Sybil

Page 35: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Random Walks Revisited: ACL

● High degree nodes can achieve disproportionate score ● Node’s trustworthiness = score normalized by degree

X

 

4

 

 

 

 

 

Honest

 

1

 

 1

1

Sybil

Page 36: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Random Walks Revisited: ACL

● Nodes are ranked by their trustworthiness ● Ranking has strong bias on the seed’s community

14            1    X

Community of X

Page 37: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

The Guarantee

● The intuition can be formalized in a theorem:

● We confirm this result with an experimental evalutation.

Select a u.a.r. honest node in a fast mixing community

C with fewer than o(n/log(n)) attack edges:

The ACL ranking contains 1-o(1) honest nodes in the first |C| positions.

Page 38: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Experimental evaluation

● We compared the performance of ACL with several state-of-the-art algorithms: SybilGuard, SybilLimit, Gatekeeper and Mislove’s community detection algorithm.

● Attack models: ● Traditional attack model (Danezis et al., NSDD 2006)

● New attack model with interesting theoretical properties

● The results were consistent across the different models and datasets.

Page 39: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

PerformancePrecision vs Recall in Facebook (new attack model)

ACL vs SybilLimit

Similar results are obtained in all our datasets

prec

isio

n

recall

Facebook (New Orleans) Viswanath et al. 2009

Nodes: 63k Edges: 816k

Page 40: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Conclusions

● Unified view of social network based sybil defense: random walks and community detection

● New goal for sybil defense ● Community detection can provide secure sybil defense

schemes.

Page 41: SoK: The Evolution of Sybil Defense via Social Networks · Sybil Defense & Community Detection Sybil defense as community detection (Viswanath et. al, SIGCOMM 2010). Must identify

Thank you for your attention