ABSTRACT
P2P systems are inherently vulnerable to Sybil attacks, in which an attacker can have a large number of identities and use them to control a substantial fraction of the system. We propose Persea, a novel P2P system that is more robust against Sybil attacks than prior approaches. Persea derives its Sybil resistance by assigning IDs through a bootstrap tree, the graph of how nodes have joined the system through invitations. More specifically, a node joins Persea when it gets an invitation from an existing node in the system. The inviting node assigns a node ID to the joining node and gives it a chunk of node IDs for further distribution. For each chunk of ID space, the attacker needs to socially engineer a connection to another node already in the system. This hierarchical distribution of node IDs confines a large attacker botnet to a considerably smaller region of the ID space than in a normal P2P system. Persea uses a replication mechanism in which each (key,value) pair is stored in nodes that are evenly spaced over the network. Thus, even if a given region is occupied by attackers, the desired (key,value) pair can be retrieved from other regions. We compare our results with Kad, Whanau, and X-Vine and show that Persea is a better solution against Sybil attacks.
- T. Cholez, I. Chrisment, and O. Festor. Evaluation of Sybil attacks protection schemes in KAD. In AIMS: Scalability of Networks and Services, 2009. Google ScholarDigital Library
- J. R. Douceur. The Sybil attack. In IPTPS, 2002. Google ScholarDigital Library
- H. J. Kang, E. Chan-Tin, N. J. Hopper, and Y. Kim. Why Kad lookup fails. In P2P, 2009.Google Scholar
- J. Leskovec, D. Huttenlocher, and J. Kleinberg. Predicting positive and negative links in online social networks. In WWW, 2010. Google ScholarDigital Library
- J. Leskovec, D. Huttenlocher, and J. Kleinberg. Signed networks in social media. In CHI, 2010. Google ScholarDigital Library
- C. Lesniewski-Laas. A Sybil-proof one-hop DHT. In Workshop on Social Network Systems, 2008. Google ScholarDigital Library
- C. Lesniewski-Laas and M. F. Kaashoek. Whanau: A Sybil-proof distributed hash table. In NSDI, 2010. Google ScholarDigital Library
- P. Maymounkov and D. Mazieres. Kademlia: A peer-to-peer information sytem based on the XOR metric. In IPTPS, 2002. Google ScholarDigital Library
- P. Mittal, M. Caesar, and N. Borisov. X-Vine: Secure and pseudonymous routing in DHTs using social networks. In NDSS, 2012.Google Scholar
- A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. In IMC, 2010. Google ScholarDigital Library
- M. Richardson, R. Agrawal, and P. Domingos. Trust management for the semantic web. In ISWC, 2003.Google ScholarDigital Library
- B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An analysis of social network-based Sybil defenses. In ACM SIGCOMM, 2010. Google ScholarDigital Library
- H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A near-optimal social network defense against Sybil attacks. In IEEE S&P, 2008. Google ScholarDigital Library
Index Terms
- Persea: a sybil-resistant social DHT
Recommendations
Design and evaluation of persea, a sybil-resistant DHT
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityP2P systems are inherently vulnerable to Sybil attacks, in which an attacker creates a large number of identities and uses them to control a substantial fraction of the system. We propose Persea, a novel P2P system that derives its Sybil resistance by ...
A survey of DHT security techniques
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been shown to be notoriously difficult to protect against security attacks. ...
Comments