the sybil attack, j. r. douceur, iptps 2002. clifton forlines csc2231 online social networks...

35
The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Upload: george-gregory

Post on 14-Jan-2016

221 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

The Sybil Attack, J. R. Douceur, IPTPS 2002.

Clifton ForlinesCSC2231 Online Social Networks11/1/2007

Page 2: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Outline

• Brief overview of the paper

• Discussion on differences between P2P networks and OSN and on how this effects Sybil attacks

Page 3: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Sybil Attack

• “Sybil” (1973) by Flora Rheta Schreiber

• Attacker creates multiple identities to control a large portion of the network and overcome redundancy

Page 4: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Identity Validation

• How does an entity know that two identities come from different entities?

• Centralized server is one option• Douceur mentions three mechanisms of

testing independence of identities in P2P– Communication– Computation– Storage

Page 5: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Identity Validation

• Four Lemmas “prove” that Sybil attacks are always possible without centralized authority

Page 6: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Lemma 1

• Because entities are heterogeneous in terms of capabilities, a malicious entity can create several “minimal” identities

• Lower-bound on number of identities

Page 7: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Lemma 2

• Unless identities are tested simultaneously, a compromised entity can create any number of identities

• Simultaneous identity verification not practical

Page 8: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Lemma 3

• If a certain number of identities must vouch for a new identity for it to be accepted, then a set of compromised identities can create any number of new fake identities

Page 9: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Lemma 4

• Without simultaneous validation of identities by a set of trusted entities, a single faulty entity can present many identities.

• Again, simultaneous validation is difficult in real-world networks.

Page 10: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Overview Conclusion

• Networks require centralized authority to validate network identities

• Without one, Sybil attacks are always a possibility

Page 11: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Identity Validation in an OSN

• Douceur mentions three mechanisms of testing independence of identities in P2P– Communication– Computation– Storage

• What mechanisms exist for social networks?

Page 12: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Identity Validation

?

Page 13: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Identity Validation

Page 14: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Identity Validation

• OSN have lots of techniques to validate identities that are not present in P2P

Page 15: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Network

Page 16: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Network

Page 17: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Network

What about the links?

Page 18: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Links in a Social Network

• What are the Differences between links in a P2P network and links in an on-line social network?

Page 19: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Links in a Social Network

• What are the Differences between links in a P2P network and links in an on-line social network?– Links in OSN correspond to real-world links

Page 20: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Links in a Social Network

• What are the Differences between links in a P2P network and links in an on-line social network?– Links in OSN correspond to real-world links

– Links in OSN take time and effort to setup

Page 21: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Links in a Social Network

• What are the Differences between links in a P2P network and links in an on-line social network?– Links in OSN correspond to real-world links

– Links in OSN take time and effort to setup

– Links in OSN cluster and have high # of intra-cluster connections

Page 22: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Links in a Social Network

• What does a link in a social network signify?

Page 23: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Links in a Social Network

• What does a link in a social network signify?– Indicates trust

Page 24: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Links in a Social Network

• What does a link in a social network signify?– Indicates trust

– Vouches for individual

Page 25: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Links in a Social Network

• How many links can a malicious node in a P2P network create?

• How many in an OSN?

Page 26: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Links in a Social Network

• How many links can a malicious entity in a P2P network create? – As many as one wants. (mostly)

• How many in an OSN?– As many as one has time and effort to create.

Page 27: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Network

What about the links?

Page 28: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Network

Page 29: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Network

Page 30: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Network

Page 31: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Network

Page 32: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Network

Page 33: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Network

• How can we identify this type of edge without global network typology?

Page 34: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Summary

• OSN have lots of techniques to validate identities that are not present in P2P

• Links in an OSN– Indicates trust– Vouches for individual– correspond to real-world links– take time and effort to setup– cluster and have high # of intra-cluster connections

• Malicious entity can only create as many links as they have time and effort to create.

Page 35: The Sybil Attack, J. R. Douceur, IPTPS 2002. Clifton Forlines CSC2231 Online Social Networks 11/1/2007

Other Discussion Topics

• IPv6 privacy (mentioned in paper)