skip to main content
10.1145/1851182.1851226acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

An analysis of social network-based Sybil defenses

Published: 30 August 2010 Publication History

Abstract

Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been proposed, but they differ greatly in the algorithms they use and in the networks upon which they are evaluated. As a result, the research community lacks a clear understanding of how these schemes compare against each other, how well they would work on real-world social networks with different structural properties, or whether there exist other (potentially better) ways of Sybil defense.
In this paper, we show that, despite their considerable differences, existing Sybil defense schemes work by detecting local communities (i.e., clusters of nodes more tightly knit than the rest of the graph) around a trusted node. Our finding has important implications for both existing and future designs of Sybil defense schemes. First, we show that there is an opportunity to leverage the substantial amount of prior work on general community detection algorithms in order to defend against Sybils. Second, our analysis reveals the fundamental limits of current social network-based Sybil defenses: We demonstrate that networks with well-defined community structure are inherently more vulnerable to Sybil attacks, and that, in such networks, Sybils can carefully target their links in order make their attacks more effective.

References

[1]
Advogato trust network. http://www.trustlet.org/wiki/Advogato.
[2]
R. Andersen and K. J. Lang. Communities from seed sets. In Proc. WWW'06, Edinburgh, Scotland, May 2006.
[3]
J. P. Bagrow. Evaluating local community methods in networks. J. Stat. Mech., 2008(5), 2008.
[4]
A.-L. Barabasi and R. Albert. Emergence of Scaling in Random Networks. Science, 286:509--512, 1999.
[5]
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: Automated identity theft attacks on social networks. In Proc. WWW'09, Madrid, Spain, Apr 2009.
[6]
A. Clauset. Finding local community structure in networks. Physical Review E, 72(2), 2005.
[7]
G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In Proc. NDSS'09, San Diego, CA, Feb 2009.
[8]
J. Douceur. The Sybil Attack. In Proc. IPTPS'02, Cambridge, MA, Mar 2002.
[9]
J. Fogarty, R. S. Baker, and S. E. Hudson. Case studies in the use of ROC curve analysis for sensor-base.
[10]
estimates in human computer interaction. In Proc. GI'05, Victoria, BC, May 2005.
[11]
S. Fortunato. Community detection in graphs. Physics Reports, 486:75, 2010.
[12]
R. Guimera, L. Danon, A. Diaz-Guilera, F. Giralt, and A. Arenas. Self-similar community structure in a network of human interactions. Physical Review E, 68(6), 2003.
[13]
J. Kleinberg. The Small-World Phenomenon: An Algorithmic Perspective. In Proc. STOC'00, Portland, OR, May 2000.
[14]
J. Leskovec, D. Huttenlocher, and J. Kleinberg. Signed Networks in Social Media. In Proc. CHI'10, Atlanta, GA, Apr 2010.
[15]
J. Leskovec, J. Kleinberg, and C. Faloutsos. Graph Evolution: Densification and Shrinking Diameters. ACM TKDD, 1(1), 2007.
[16]
J. Leskovec, K. Lang, and M. Mahoney. Empirical comparison of algorithms for network community detection. In Proc. WWW'10, Raleigh, NC, Apr 2010.
[17]
J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. Statistical Properties of Community Structure in Large social an.
[18]
information networks. In Proc. WWW'08, Beijing, China, Apr 2008.
[19]
C. Lesniewski-Laas. A Sybil-proof one-hop DHT. In Proc. SNS'08, Glasgow, Scotland, Apr 2008.
[20]
C. Lesniewski-Laas and M. F. Kaashoek. Whanau: A sybil-proof distributed hash table. In Proc. NSDI'10, San Jose, CA, Apr 2010.
[21]
F. Luo, J. Z. Wang, and E. Promislow. Exploring local community structures in large networks. Web Intelligent and Agent Systems, 6(4):387--400, 2008.
[22]
A. Mislove, A. Post, K. P. Gummadi, and P. Druschel. Ostra: Leveraging Trust to Thwart Unwanted Communication. In Proc. NSDI'08, San Francisco, CA, Apr 2008.
[23]
A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are who you know: Inferring user profiles in online socia.
[24]
networks. In Proc. WSDM'10, New York, NY, Feb 2010.
[25]
M. Mitzenmacher and E. Upfal. Probability and Computing. Cambridge University Press, Cambridge, UK, 2005.
[26]
A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. Technical report, University of Minnesota, 2010.
[27]
S. Nagaraja. Anonymity in the wild: Mixes on unstructured networks. In Proc. PET'07, Ottawa, ON, Jun 2007.
[28]
M. E. J. Newman. The structure of scientific collaboration networks. PNAS, 98(2):404--409, 2001.
[29]
M. E. J. Newman. Fast algorithm for detecting community structure in networks. Physical Review E, 69(6), 2004.
[30]
D. Quercia and S. Hailes. Sybil attacks against mobile users: Friends and foes to the rescue. In Proc. INFOCOM'10, San Diego, CA, Mar 2010.
[31]
A. Strehl and J. Ghosh. Cluster Ensembles - A Knowledge Reuse Framework for Combining Partitionings. In Proc. AAAI'02, Palo Alto, CA, Mar 2002.
[32]
N. Tran, B. Min, J. Li, and L. Subramanian. Sybil-Resilient Online Content Voting. In Proc. NSDI'09, Boston, MA, Apr 2009.
[33]
B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the Evolution of User Interaction in Facebook. In Proc. WOSN'09, Barcelona, Spain, Aug 2009.
[34]
C. Wilson, B. Boe, A. Sala, K. P. N. Puttaswamy, and B. Y. Zhao. User Interactions in Social Networks and their Implications. In Proc. Eurosys'09, Nuremberg, Germany, Apr 2009.
[35]
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In Proc. IEEE S&P, Oakland, CA, May 2008.
[36]
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. In Proc. SIGCOMM'06, Pisa, Italy, Sep 2006.

Cited By

View all

Index Terms

  1. An analysis of social network-based Sybil defenses

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCOMM '10: Proceedings of the ACM SIGCOMM 2010 conference
    August 2010
    500 pages
    ISBN:9781450302012
    DOI:10.1145/1851182
    • cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 40, Issue 4
      SIGCOMM '10
      October 2010
      481 pages
      ISSN:0146-4833
      DOI:10.1145/1851275
      Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 August 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. communities
    2. social network-based Sybil defense
    3. social networks
    4. sybil attacks

    Qualifiers

    • Research-article

    Conference

    SIGCOMM '10
    Sponsor:
    SIGCOMM '10: ACM SIGCOMM 2010 Conference
    August 30 - September 3, 2010
    New Delhi, India

    Acceptance Rates

    Overall Acceptance Rate 462 of 3,389 submissions, 14%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)169
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 07 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media