sybil defenses in mobile social networks · overview most distributed systems are vulnerable to...

22
Sybil Defenses in Mobile Social Networks Wei Chang, Jie Wu, Chiu C. Tan, and Feng Li† Temple University, USA Indiana University-Purdue University Indianapolis † 1 IEEE GLOBECOM 2013, December Atlanta, USA

Upload: others

Post on 14-Mar-2021

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Sybil Defenses in Mobile Social Networks

Wei Chang, Jie Wu, Chiu C. Tan, and Feng Li†Temple University, USA

Indiana University-Purdue University Indianapolis †

1IEEE GLOBECOM 2013, December

Atlanta, USA

Page 2: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Overview Most distributed systems are vulnerable to Sybil

attacks. In this paper, we consider the Sybil attacks in a mobile

social network (MSN). Traditional social-based Sybil defenses have Two

limitations: Assume that the social graph of honest users is fast-mixing The accuracy is related to the number of attack edges

We propose a local ranking system for estimating trust-level between users. Multi-honest communities model Use both trust and distrust relations Remove high suspicious edges

We validate the effectiveness of our scheme through comprehensive simulations.

2

Page 3: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Outline

1. Introduction

2. Related Work

3. Scheme Description

3IEEE GLOBECOM 2013, December Atlanta, USA

5. Conclusion

4. Evaluation

Page 4: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Introduction

4IEEE GLOBECOM 2013, December

Atlanta, USA

• Mobile social networks (MSN) =online social networks + location based services.

• A MSN can provide many new services, such as data sharing service or voting.

• The distributed and self-organized features make MSNs vulnerable to Sybil attack.

• In a Sybil attack, an adversary creates a large number of fake identities (Sybils), and since all Sybils are controlled by the adversary, she can subvert the system by making actions that benefit herself.

Page 5: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Cont. Social network-based Sybil defense

Problems: The fast-mixing feature of the honest region may not

always hold. The accuracy is highly related with the number of

attack edges.

IEEE GLOBECOM 2013, December Atlanta, USA 5

Honest nodes

Sybil nodes

Suspect node and its suspect paths

Verifier node and its verifier paths

Page 6: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Main idea

Problems vs. solution The fast-mixing feature of the honest region may

not always hold. Honest users may cluster into one community, or

several communities with similar sizes. The accuracy is highly related with the number of

attack edges. If we cut off several high centrality edges from

the social graph, the connectivity between honest nodes bears much less of an impact than that between Sybil and honest nodes.

IEEE GLOBECOM 2013, December Atlanta, USA 6

Page 7: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Outline

1. Introduction

2. Related Work

3. Scheme Description

7IEEE GLOBECOM 2013, December Atlanta, USA

5. Conclusion

4. Evaluation

Page 8: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Related Work

Sybil attack in online social networks

Social network-based Sybil defense

Neighborhood monitoring-based Sybil defense

8IEEE GLOBECOM 2013, December

Atlanta, USA

Page 9: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Outline

1. Introduction

2. Related Work

3. Scheme Description

9IEEE GLOBECOM 2013, December Atlanta, USA

5. Conclusion

4. Evaluation

Page 10: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Scheme description: System Model

IEEE GLOBECOM 2013, December Atlanta, USA 10

Page 11: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Signed network-based Sybil defense

Distrust edges’ generation Volunteers report abnormal conditions Identity switching Same person, different identities

IEEE GLOBECOM 2013, December Atlanta, USA

11

Honest nodes Sybil nodes

Attack edges

Page 12: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Signed network-based Sybil defense

Distrust edges’ generation Volunteers report abnormal conditions Identity switching Same person, different identities

IEEE GLOBECOM 2013, December Atlanta, USA

12

Honest nodes Sybil nodes

Attack edges

Page 13: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Signed network-based Sybil defense

Distrust edges’ generation Volunteers report abnormal conditions Identity switching Same person, different identities

IEEE GLOBECOM 2013, December Atlanta, USA

13

Honest nodes Sybil nodes

Attack edges

Page 14: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Cont. Trust and distrust social profiles

14

Page 15: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Trust level estimation

15

Page 16: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Security Analysis

Attacker’s dilemma situation In order to boost the trust scores, it is better for

Sybils to cluster into one community, such that the verifier paths are more likely to encounter a suspect path.

For reducing the distrust scores, the attacker should build Sybils into multiple communities

Bad mouthing strategy Distrust profiles are based on the distrusted

relations from the high trusted nodes. It will cause high centrality, which will be

removed by our pruning algorithm.

IEEE GLOBECOM 2013, December Atlanta, USA

16

Page 17: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Pruning algorithm: gateway-breaking

IEEE GLOBECOM 2013, December Atlanta, USA 17

Server periodically prunes the graph Server randomly selects several pairs of

antagonistic nodes with high centrality Gateway verification

If one node’s connectivity to the third node is much larger than that of the other node, it is very possible that the two nodes reside at different communities.

We use the number of unique paths to measure the connectivity feature.

Remove high-intensity antagonistic gateways

Page 18: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Evaluation

IEEE GLOBECOM 2013, December Atlanta, USA 18

Page 19: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Cont.

IEEE GLOBECOM 2013, December Atlanta, USA 19

Page 20: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Cont.

IEEE GLOBECOM 2013, December Atlanta, USA 20

Page 21: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Conclusion

1

We propose a newsystem to defense Sybil attacks in mobile social networks.

2

Our proposed solution explores both trust and distrust relations among the nodes. It suits for different community structures of social graphs.

3

Our scheme potentially can enhance the accuracy of any graph-based Sybil defense by removing some suspicious edges.

21IEEE GLOBECOM 2013, December

Atlanta, USA

Page 22: Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network

Thank you!

IEEE GLOBECOM 2013, December Atlanta, USA 22