Leveraging Social Networks to Defend against Sybil attacks

23
Leveraging Social Networks to Defend against Sybil attacks Krishna Gummadi Networked Systems Research Group Max Planck Institute for Software Systems Germany

description

Leveraging Social Networks to Defend against Sybil attacks. Krishna Gummadi Networked Systems Research Group Max Planck Institute for Software Systems Germany. Sybil attack. Fundamental problem in distributed systems Attacker creates many fake identities (Sybils) - PowerPoint PPT Presentation

Transcript of Leveraging Social Networks to Defend against Sybil attacks

Page 1: Leveraging Social Networks to Defend against Sybil attacks

Leveraging Social Networks to Defend against Sybil attacks

Krishna Gummadi

Networked Systems Research GroupMax Planck Institute for Software Systems

Germany

Page 2: Leveraging Social Networks to Defend against Sybil attacks

Sybil attack• Fundamental problem in distributed systems

• Attacker creates many fake identities (Sybils)– Used to manipulate the system

• Many online services vulnerable– Webmail, social networks, p2p

• Several observed instances of Sybil attacks– Ex. Content voting tampered on YouTube, Digg

Page 3: Leveraging Social Networks to Defend against Sybil attacks

Sybil defense approaches

• Tie identities to resources that are hard to forge or obtain

• RESOURCE 1: Certification from trusted authorities– Ex. Passport, social security numbers– Users tend to resist such techniques

• RESOURCE 2: Resource challenges (e.g., crypto-puzzles)– Vulnerable to attackers with significant resources– Ex. Botnets, renting cloud computing resources

• RESOURCE 3: Links in a social network?

Page 4: Leveraging Social Networks to Defend against Sybil attacks

Using social networks to detect Sybils• Assumption: Links to good users hard to form and

maintain– Users mostly link to others they recognize

• Attacker can only create limited links to non-Sybil users

Leverage the topological feature

introduced by sparse set of links

Page 5: Leveraging Social Networks to Defend against Sybil attacks

Social network-based Sybil detection

• Very active area of research– Many schemes proposed over past five years

• Examples:– SybilGuard [SIGCOMM’06]– SybilLimit [Oakland S&P ’08]– SybilInfer [NDSS’08]– SumUp [NSDI’09]– Whanau [NSDI’10]– MOBID [INFOCOM’10]

Page 6: Leveraging Social Networks to Defend against Sybil attacks

But, many unanswered questions

• All schemes make two common assumptions– Honest nodes: they are fast mixing– Sybils: they do not mix quickly with honest nodes

• But, each uses a different graph analysis algorithm– Unclear relationship between schemes

• Is there a common insight across the schemes?– Is there a common structural property these schemes rely on?

• Such an insight is necessary to understand– How well would these schemes work in practice?– Are there any fundamental limitations of Sybil detection?

Page 7: Leveraging Social Networks to Defend against Sybil attacks

Common insight across schemes

• All schemes find local communities around trusted nodes– Roughly, set of nodes more tightly knit than surrounding graph

• Accept service from those within the community– Block service from the rest of the nodes

Page 8: Leveraging Social Networks to Defend against Sybil attacks

Are certain network structures more vulnerable?

• When honest nodes divide themselves into multiple communities – Cannot tell apart Sybils & non-Sybils in a distant community

• How often do social networks exhibit such community structures?

Trusted NodeTrusted Node

Page 9: Leveraging Social Networks to Defend against Sybil attacks

How often do non-Sybils form one cohesive community?

• Not often!• Many real-world social networks have high modularity

– They exhibit multiple well-defined community structures

Page 10: Leveraging Social Networks to Defend against Sybil attacks

Facebook RICE undergraduates’ network

• Exhibits densely connected user communities within the graph

• Other social networks have even higher modularity

Page 11: Leveraging Social Networks to Defend against Sybil attacks

How often do non-Sybils form one cohesive community?

• Traditional methodology:– Analyze several real-world social network graphs– Generalize the results to the universe of social networks

• A more scientific method:– Leverage insights from sociological theories on communities– Test if their predictions hold in online social networks– And then generalize the findings

Page 12: Leveraging Social Networks to Defend against Sybil attacks

Group attachment theory

• Explains how humans join and relate to groups

• Common-identity based groups– Membership based on self interest or ideology– E.g., NRA, Greenpeace, and PETA– Tend to be loosely-knit and less cohesive

• Common-bond based groups– Membership based on inter-personal ties, e.g., family or kinship– Tend to form tightly-knit communities within the network

Page 13: Leveraging Social Networks to Defend against Sybil attacks

Dunbar’s theory

• Limits the # of stable social relationships a user can have– To less than a couple of hundred– Linked to size of neo-cortex region of the brain

• Observed throughout history since hunter-gatherer societies

• Also observed repeatedly in studies of OSN user activity– Users might have a large number of contacts– But, regularly interact with less than a couple of hundred of them

• Limits the size of cohesive common-bond based groups

Page 14: Leveraging Social Networks to Defend against Sybil attacks

Prediction and implication

• Strongly cohesive communities in real-world social networks will be necessarily small– No larger than a few hundred nodes!

• If true, it imposes a limit on the number of non-Sybils we can detect with high accuracy– Will be problematic as social networks grow large

Page 15: Leveraging Social Networks to Defend against Sybil attacks

Verifying the prediction

Real-world data sets analyzed

Page 16: Leveraging Social Networks to Defend against Sybil attacks

Implications

• Fundamental limits on social network-based Sybil detection

• Can reliably identify only a limited number of honest nodes

• In large networks, limits interactions to a small subset of honest nodes– Might still be useful in certain scenarios, e.g., white listing email

from friends

• But, what to do with nodes not in the honest node subset?

Page 17: Leveraging Social Networks to Defend against Sybil attacks

One way forward: Sybil tolerance

• Rather than detect bad nodes, lets limit bad behavior

• Sybil detection: Use network to find Sybil nodes– Accept / receive unlimited service from non-Sybils– Refuse to interact with Sybils

• Sybil tolerance: Use network to limit nodes’ privileges– Interact with all nodes, but monitor their behavior– Limit bad behavior from any node, Sybil or non-Sybil

Page 18: Leveraging Social Networks to Defend against Sybil attacks

x

Destination

Source

Destination

x

Illustrative example: Applying Sybil tolerance to email spam

• Key idea: Link privileges to credit on network links– Once the credit is exhausted, the node stops receiving service – Does not matter if the node is a Sybil or not

Page 19: Leveraging Social Networks to Defend against Sybil attacks

Illustrative example: Applying Sybil tolerance to email spam

• Creating multiple node identities does not help– So long as they cannot create links to arbitrary honest nodes

• No assumption about connectivity between non-Sybils

{MultipleIdentities

Page 20: Leveraging Social Networks to Defend against Sybil attacks

Such Sybil tolerant systems already exist

• Ostra [NSDI’08]: Limiting unwanted communication

• SumUp [NSDI’09]: Sybil-resilient voting

• Their properties were not well understood before

Page 21: Leveraging Social Networks to Defend against Sybil attacks

Sybil detection versus tolerance

• Sybil detection– Assumes network of honest nodes is fast mixing– Does not require anything beyond network topology

• Sybil tolerance– No assumption about connectivity between honest nodes– Requires user behavior to be monitored and labeled

Page 22: Leveraging Social Networks to Defend against Sybil attacks

Summary: A comprehensive approach to social network-based Sybil defense

Page 23: Leveraging Social Networks to Defend against Sybil attacks

Thank you!

Questions?