Skip to main content
Top

2015 | OriginalPaper | Chapter

Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems

Authors : Kan Chen, Peidong Zhu, Yueshan Xiong

Published in: International Conference on Security and Privacy in Communication Networks

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Sybil attack is one of the major threats in distributed systems. A number of colluded Sybil peers can pollute and disrupt the system’s key functions. The main idea of defense against Sybil attack is to distinguish the Sybils according to specific rules. Prior works are all limited by attack edges, the connections between normal and Sybil peers. The problem is that the number of attack edges could be huge, resulting in low accuracies. Besides, Sybil peers always present in groups and bring about the bridge problem, which is always ignored. In this paper, we propose KFOut, a light weighted framework for Sybil detection. At the heart of KFOut lie a trust model of social relations and a security mechanism of path notification of K-different paths, which can conquer the bridge problem effectively. We prove through experiments that KFOut can accept normal peers and reject Sybil peers both with high accuracies.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xiao, R.Y.: Survey on anonymity in unstructured peer-to-peer systems. J. Comput. Sci. Technol. 23 (4), 660–671 (2008) CrossRef Xiao, R.Y.: Survey on anonymity in unstructured peer-to-peer systems. J. Comput. Sci. Technol. 23 (4), 660–671 (2008) CrossRef
2.
go back to reference Aberer, K.: Self-organization and P2P systems. IEEE Intell. Syst. 18 (4), 79–81+85 (2003) Aberer, K.: Self-organization and P2P systems. IEEE Intell. Syst. 18 (4), 79–81+85 (2003)
3.
go back to reference Khan, S.K.A., Tokarchuk, L.N.: Interest-based self-organization in group-structured P2P networks. In: 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009, January 10–January 13 2009. Institute of Electrical and Electronics Engineers Computer Society, Las Vegas (2009) Khan, S.K.A., Tokarchuk, L.N.: Interest-based self-organization in group-structured P2P networks. In: 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009, January 10–January 13 2009. Institute of Electrical and Electronics Engineers Computer Society, Las Vegas (2009)
4.
go back to reference Bocek, T., Peric, D., Hecht, F., Hausheer, D., Stiller, B.: PeerVote: a decentralized voting mechanism for P2P collaboration systems. In: Sadre, R., Pras, A. (eds.) AIMS 2009 Enschede. LNCS, vol. 5637, pp. 56–69. Springer, Heidelberg (2009)CrossRef Bocek, T., Peric, D., Hecht, F., Hausheer, D., Stiller, B.: PeerVote: a decentralized voting mechanism for P2P collaboration systems. In: Sadre, R., Pras, A. (eds.) AIMS 2009 Enschede. LNCS, vol. 5637, pp. 56–69. Springer, Heidelberg (2009)CrossRef
5.
go back to reference Yang, B., Song, G., Zheng, Y.: The analysis and enhancement of voting behaviors in P2P networks. In: 2010 International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, April 2–April 4 2010, pp. 407–410. IEEE Computer Society, Jinggangshan (2010) Yang, B., Song, G., Zheng, Y.: The analysis and enhancement of voting behaviors in P2P networks. In: 2010 International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, April 2–April 4 2010, pp. 407–410. IEEE Computer Society, Jinggangshan (2010)
6.
go back to reference Bhattacharjee, R., Goel, A.: Avoiding ballot stuffing in eBay-like reputation systems. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, Philadelphia, Pennsylvania, USA (2005) Bhattacharjee, R., Goel, A.: Avoiding ballot stuffing in eBay-like reputation systems. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, Philadelphia, Pennsylvania, USA (2005)
7.
go back to reference Douceur, J.R.: The Sybil attack. In: Revised Papers from the First International Workshop on Peer-to-Peer Systems (2002) Douceur, J.R.: The Sybil attack. In: Revised Papers from the First International Workshop on Peer-to-Peer Systems (2002)
8.
go back to reference Jiang, J., Shan, Z., Sha, W., Wang, X., Dai, Y.: Detecting and validating Sybil groups in the wild. In: 32nd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2012, June 18–June 21 2012, pp. 127–132. IEEE Computer Society, Macau (2012) Jiang, J., Shan, Z., Sha, W., Wang, X., Dai, Y.: Detecting and validating Sybil groups in the wild. In: 32nd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2012, June 18–June 21 2012, pp. 127–132. IEEE Computer Society, Macau (2012)
9.
go back to reference Viswanath, B., Post, A., Gummadi, K., Mislove, A.: An analysis of social network-based Sybil defenses. In: SIGCOMM 2010: Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM, vol. 40, pp. 363–374 (2010) Viswanath, B., Post, A., Gummadi, K., Mislove, A.: An analysis of social network-based Sybil defenses. In: SIGCOMM 2010: Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM, vol. 40, pp. 363–374 (2010)
10.
go back to reference Tran, N., Li, J., Subramanian, L., Chow, S.S.M.: Optimal Sybil-resilient node admission control. In: IEEE INFOCOM 2011, pp. 3218–3226. Institute of Electrical and Electronics Engineers Inc., Shanghai (2011) Tran, N., Li, J., Subramanian, L., Chow, S.S.M.: Optimal Sybil-resilient node admission control. In: IEEE INFOCOM 2011, pp. 3218–3226. Institute of Electrical and Electronics Engineers Inc., Shanghai (2011)
11.
go back to reference Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against Sybil attacks via social networks. In: ACM SIGCOMM, pp. 267–278. Association for Computing Machinery (2006) Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against Sybil attacks via social networks. In: ACM SIGCOMM, pp. 267–278. Association for Computing Machinery (2006)
12.
go back to reference Kimmo, K., et al.: Emergence of communities in weighted networks. Phys. Rev. Lett. 99 (22), 228701 (2007) CrossRef Kimmo, K., et al.: Emergence of communities in weighted networks. Phys. Rev. Lett. 99 (22), 228701 (2007) CrossRef
13.
go back to reference Cornelli, F., Damiani, E., Samarati, S.: Implementing a reputation-aware Gnutella servent. In: Proceedings of the International Workshop on P2P Computing (2002) Cornelli, F., Damiani, E., Samarati, S.: Implementing a reputation-aware Gnutella servent. In: Proceedings of the International Workshop on P2P Computing (2002)
14.
go back to reference Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, (2002) Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, (2002)
15.
go back to reference Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social network defense against Sybil attacks. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy (2008) Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social network defense against Sybil attacks. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy (2008)
16.
go back to reference Danezis, G., Mittal, P.: SybilInfer: detecting Sybil nodes using social networks. In: NDSS 2009, San Diego, CA (2009) Danezis, G., Mittal, P.: SybilInfer: detecting Sybil nodes using social networks. In: NDSS 2009, San Diego, CA (2009)
17.
go back to reference Tran, N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 15–28. USENIX Association, Boston (2009) Tran, N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 15–28. USENIX Association, Boston (2009)
18.
go back to reference Noh, G., Kang, Y., Oh, H., Kim, C.: Robust Sybil attack defense with information level in online Recommender Systems (2013) Noh, G., Kang, Y., Oh, H., Kim, C.: Robust Sybil attack defense with information level in online Recommender Systems (2013)
19.
go back to reference Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Secur. Commun. Netw. 6 (4), 523–538 (2013) CrossRef Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Secur. Commun. Netw. 6 (4), 523–538 (2013) CrossRef
20.
go back to reference Abbas, S., Merabti, M., Llewellyn-Jones, D., Kifayat, K.: Lightweight sybil attack detection in MANETs. IEEE Syst. J. 7 (2), 236–248 (2013) CrossRef Abbas, S., Merabti, M., Llewellyn-Jones, D., Kifayat, K.: Lightweight sybil attack detection in MANETs. IEEE Syst. J. 7 (2), 236–248 (2013) CrossRef
Metadata
Title
Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems
Authors
Kan Chen
Peidong Zhu
Yueshan Xiong
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-23829-6_14

Premium Partner