Defending Against Sybil Attacks via Social Networks Haifeng Yu School of Computing National University of Singapore.

Download Report

Transcript Defending Against Sybil Attacks via Social Networks Haifeng Yu School of Computing National University of Singapore.

Defending Against Sybil Attacks
via Social Networks
Haifeng Yu
School of Computing
National University of Singapore
Acknowledgments
 Talk based on three papers
 [SIGCOMM’06, ToN’08] (SybilGuard)
 [IEEE S&P’08] (SybilLimit)
 Available on my homepage – google my name
 Co-authors:
 Phillip B. Gibbons
 Michael Kaminsky
 Feng Xiao
 Abie Flaxman
Haifeng Yu, National University of Singapore
2
Background: Sybil Attack
 Sybil attack: Single user
pretends many fake/sybil
identities
 I.e., Creating multiple accounts
honest
malicious
 Already observed in real-world
p2p systems
launch
sybil
attack
 Sybil identities can become a
large fraction of all identities
Haifeng Yu, National University of Singapore
3
Background: Sybil Attack
 Enables malicious users to easily “out-vote”
honest users
 Byzantine consensus – exceed the 1/3 threshold
 Majority voting – cast more than one vote
 DHT – control a large portion of the ring
 Recommendation systems – manipulate the
recommendations
Haifeng Yu, National University of Singapore
4
Background: Defending Against Sybil Attack
 Using trusted central authority to tie identities to
human beings – not always desirable
 Much harder without a trusted central authority
[Douceur’02]
 Resource challenges not sufficient
 IP address-based approach not sufficient
 Widely considered as real & challenging:
 Over 40 papers acknowledging the problem of sybil
attack, without having a distributed solution
Haifeng Yu, National University of Singapore
5
SybilGuard / SybilLimit Basic Insight:
Leveraging Social Networks
SybilGuard / SybilLimit is the first to use social networks
for thwarting sybil attacks with provable guarantees.
 Nodes = identities
 Undirected edges =
strong mutual trust
 E.g., colleagues,
relatives in real-world
 Not online friends!
Haifeng Yu, National University of Singapore
6
SybilGuard / SybilLimit Basic Insight
 n honest users: One identity/node each
 Malicious users: Multiple identities each (sybil nodes)
sybil
nodes
honest
nodes
attack
edges
sybil nodes
may collude –
the adversary
malicious
users
Observation: Adversary cannot create extra
edges between honest nodes and sybil nodes
Haifeng Yu, National University of Singapore
7
SybilGuard/SybilLimit Basic Insight
Dis-proportionally
small cut
disconnecting a
large number of
identities
But cannot search
brute-force…
attack
edges
honest nodes
sybil nodes
Haifeng Yu, National University of Singapore
8
SybilGuard / SybilLimit End Guarantees
 Completely decentralized
 Enables any given verifier node to decide
whether to accept any given suspect node
 Accept: Provide service to / receive service from
 Ideally: Accept and only accept honest nodes –
unfortunately not possible
 SybilGuard / SybilLimit provably
 Bound # of accepted sybil nodes (w.h.p.)
 Accept all honest nodes except a small  fraction
(w.h.p.)
Haifeng Yu, National University of Singapore
9
Example Application Scenarios
If # of sybil nodes
accepted
<n
Then applications
can do
majority voting
< n/2
byzantine consensus
< n/c for some constant c
secure DHT
[Awerbuch’06, Castro’02,
Fiat’05]
…
Haifeng Yu, National University of Singapore
…
10
SybilGuard vs. SybilLimit
# sybil nodes accepted (smaller is better) per attack edge
total number of attack
edges g

g  O n / log n

SybilGuard
[SIGCOMM’06]

g between  n / log n
and On / log n
 ( n log n)

~2000
unbounded
SybilLimit
[Oakland’08]
 (logn)
~10
 (logn)
~10
We also prove that SybilLimit is O(logn) away from optimal
Haifeng Yu, National University of Singapore
11
Outline
 Motivation, basic insight, and end guarantees
 SybilLimit design
 Will focus on intuition
 Evaluation results on real-world social networks
Haifeng Yu, National University of Singapore
12
Cryptographic Keys
 Each edge in social network corresponds to a
symmetric edge key
 Established out of band
 Each node (honest or sybil) has a locally
generated public/private key pair
 “Identity”: V accepts S = V accepts S’s public key KS
 When running SybilLimit, every suspect S is
allowed to “register” KS on some other nodes
Haifeng Yu, National University of Singapore
13
SybilLimit: Strawman Design – Step 1
 Ensure that sybil
nodes (collectively)
register only on
limited number of
honest nodes
 Still provide enough
“registration
opportunities” for
honest nodes
K: registered keys of
sybil nodes
K: registered keys of
honest nodes
K
K
K
K
K
K
K
K
K
K
K
K
K
K
K
K
honest region sybil region
Haifeng Yu, National University of Singapore
14
SybilLimit: Strawman Design – Step 2
K: registered keys of
sybil nodes
K: registered keys of
honest nodes
 Accept S iff KS is
register on sufficiently
many honest nodes
 Without knowing where
the honest region is !
 Circular design? We
can break this circle…
K
K
K
K
K
K
K
K
K
K
K
K
K
K
K
K
honest region sybil region
Haifeng Yu, National University of Singapore
15
Three Interrelated Key Techniques
 Technique 1: Use the tails of random routes
for registration
 Will achieve Step 1
 SybilGuard novelty: Random routes
 SybilLimit novelty: The use of tails
 SybilLimit novelty: The use of multiple independent
instances of shorter random routes
Haifeng Yu, National University of Singapore
16
Three Interrelated Key Techniques
 Technique 2: Use intersection condition and
balance condition to verify suspects
 Will break the circular design and achieve Step 2
 SybilGuard novelty: Intersection on nodes
 SybilLimit novelty: Intersection on edges
 SybilLimit novelty: Balance condition
 Technique 3: Use benchmarking technique to
estimate unknown parameters
 Breaks another seemingly circular design…
 SybilLimit novelty: Benchmarking technique
Haifeng Yu, National University of Singapore
17
Random Route: Convergence
f
a
b
ad
randomized b  a
routing table c  b
dc
d
c
de
ed
f f
e
Random 1 to 1 mapping between
incoming edge and outgoing edge
Using routing table gives Convergence Property:
Routes merge if crossing the same edge
Haifeng Yu, National University of Singapore
18
Securely Registering Public Keys
edge “CD” is the tail of A’s random route
A
B
C
D
i=1
KA
i=2
KA
i=3
KA
i=3
KA
record KA
under name
“CD”
To register KA, A initiates a random route (assuming w = 3)
 All random routes in SybilLimit are of length w
 All nodes know w
 Nodes communicate via authenticated channels
Haifeng Yu, National University of Singapore
19
Tails of Sybil Suspects
 Imagine that every sybil suspect initiates a
random route from itself
tainted tail
sybil
nodes
honest
nodes
total 1 tainted tail
Haifeng Yu, National University of Singapore
20
Counting The Number of Tainted Tails
attack
edge
honest
nodes
sybil
nodes
 Claim: There are at most w tainted tails per
attack edge
 Proof: By the Convergence property
 Regardless of whether sybil nodes follow the protocol
Haifeng Yu, National University of Singapore
21
Back to the Strawman Design Step 1
 # of K ’s  gw
 Independent of # sybil
nodes
 # of K ’s  n – gw
 From “backtrace-ability”
property of random
routes
 See paper…
K: registered keys of
sybil nodes
K: registered keys of
honest nodes
K
K
K
honest
region
Step 1 achieved !
Haifeng Yu, National University of Singapore
K
K
K
K
22
Independent Instances
 
 SybilLimit uses  m independent instances
of the registration protocol
 m: # of edges in the honest region
 m
 Number of K’s: (n  g  w)   m 
 Number of K’s: g  w 
 
 Goal: Accept S iff KS is registered on  m
tails in the honest region
 Sybil suspects accepted: g  w
 Honest suspects accepted: n  g  w
Haifeng Yu, National University of Singapore
23
Three Techniques
 Technique 1: Use novel random routes to
register public keys
 Will achieve Step 1
 Technique 2: Use intersection condition and
balance condition to verify suspects
 Challenge: SybilLimit does not know which region is
the honest region
 Technique 3: Use benchmarking technique to
estimate unknown parameters
Haifeng Yu, National University of Singapore
24
The Intersection Condition
 
 
 Verifier V obtains  m tails by doing  m
random routes of length w
 Using different instances – see paper…
 Some tails are in the sybil region – ignore for now…
 S satisfies intersection condition if:
 S’s and V’s tails intersect
 S’s public key is registered with the intersecting tail
Haifeng Yu, National University of Singapore
25
Intersection Condition: Verification Procedure
AB
1. request S’s set of tails
2. I have three tails
AB; CD; EF
V
S
3.common tail: EF
4. Is KS registered?
EF
CD
F
5. Yes.
S satisfies intersection condition
4 messages involved
Haifeng Yu, National University of Singapore
26
Leveraging Known Random Walk Theory
 (Approximate) Theorem:
 If w is roughly the mixing time of the social network,
then all tails (V’s and S’s) are roughly uniformly
random edges
 If social networks have O(logn) mixing time,
then w  O(logn)
Haifeng Yu, National University of Singapore
27
Leveraging a Sharp Distribution
 
Assuming V has  m tails in the honest region
Intersection prob p
Help to bound # of
sybil nodes accepted

 m

p 1
p0
This is why
SybilLimit does
edge intersection
…
0
 m
1.0
 
 m
Haifeng Yu, National University of Singapore
Birthday
paradox
# of S’s tails in
honest region
28
Back to the Strawman Design Step 2
K: registered keys of
sybil nodes
K: registered keys of
honest nodes
 Accept S iff KS is
register on sufficiently
many honest nodes
 “Sufficiently many” =
K
 
 m
K
K
 Intersection occurs iff S
has  m tails in the
honest region
 
K
K
K
K
K
K
K
K
K
K
K
K
K
honest region sybil region
Haifeng Yu, National University of Singapore
29
Omitted Challenges …
 Some of V’s tails are in the sybil region
 We do not know which tails are in the sybil region
 Balance condition – hardest part to prove in
SybilLimit…
 Adversary has many strategies to allocated
the tainted tails…
 Tainted tails are not uniformly random…
 See paper for details…
Haifeng Yu, National University of Singapore
30
Three Interrelated Key Techniques
 Technique 1: Random routes
 Technique 2: Intersection condition and
balance condition
 Technique 3: Novel and counter-intuitive
benchmarking technique
 Avoids another seemingly circular design…
 See paper…
 Claims on near-optimality: See paper…
Haifeng Yu, National University of Singapore
31
Performance Aspects
 Random routes are performed only once
 Re-do only when social network changes –
infrequently
 Can be done incrementally
 Doing random routes is not time-critical
 Only delays a new suspect being accepted
 Churn is a non-problem…
 Verification involves O(1) messages
 See paper…
Haifeng Yu, National University of Singapore
32
Outline
 Motivation, basic insight, and end guarantees
 SybilLimit design
 Evaluation results on real-world social networks
Haifeng Yu, National University of Singapore
33
Validation on Real-World Social Networks
 SybilGuard / SybilLimit assumption: Honest
nodes are not behind disproportionally small cuts
 Rigorously: Social networks (without sybil nodes) have
small mixing time
 Mixing time affects # sybil nodes accepted
 Synthetic social networks – proof in [SIGCOMM’06]
 Real-world social networks?
 Social communities, social groups, ….
Haifeng Yu, National University of Singapore
34
Simulation Setup
Crawled online social networks used in experiments
# nodes
# edges
Friendster
0.9M
7.8M
Livejournal
0.9M
8.7M
DBLP
0.1M
0.6M
 We experiment with:
 Different number and placement of attack edges
 Different graph sizes -- full size to 100-node sub-graphs
 Sybil attackers use the optimal strategy
Haifeng Yu, National University of Singapore
35
Brief Summary of Simulation Results
 In all cases we experimented with:
 Average honest verifier accepts ~95% of all
honest suspects
 Average honest suspect is accepted by ~95%
of all honest verifiers
 # sybil nodes accepted:
 ~10 per attack edge for Friendster and LiveJournal
 ~15 per attack edge for DBLP
Haifeng Yu, National University of Singapore
36
Other Social Networks?
 Other social networks likely to have small
mixing time too (DBLP as a worst-case)
 What if the mixing time is large?
 Graceful degradation of SybilLimit’s guarantees -Accept more sybil nodes
Haifeng Yu, National University of Singapore
37
Conclusions
 Sybil attack:
 Widely considered as a real and challenging problem
 SybilLimit: Fully decentralized defense protocol
based on social networks
 Provable near-optimal guarantees
 Experimental validation on real-world social networks
 Future work: Implement SybilLimit with real apps
Haifeng Yu, National University of Singapore
38
Post Doc Opening
 NUS: Ranked 31st globally by Newsweek
 E.g., we have 11 SIGMOD papers in 2008
 I have post doc opening in distributed systems and
distributed algorithms
 Minimum 1 year, renewable up to multiple years
 2 years funding already committed
 Main job duty: Publish in top venues
 Help you to build up track record for career after post doc
 Salary: Comparable (if not better) than US post docs
 Singapore living cost and tax are lower than US
 Contact me to inquire or apply – google my name
Haifeng Yu, National University of Singapore
39