Keep your friends close: Incorporating trust into social network-based Sybil defenses

Social network-based Sybil defenses exploit the algorithmic properties of social graphs to infer the extent to which an arbitrary node in such a graph should be trusted. However, these systems do not consider the different amounts of trust represented by different graphs, and different levels of trust between nodes, though trust is being a crucial requirement in these systems. For instance, co-authors in an academic collaboration graph are trusted in a different manner than social friends. Furthermore, some social friends are more trusted than others. However, previous designs for social network-based Sybil defenses have not considered the inherent trust properties of the graphs they use. In this paper we introduce several designs to tune the performance of Sybil defenses by accounting for differential trust in social graphs and modeling these trust values by biasing random walks performed on these graphs. Surprisingly, we find that the cost function, the required length of random walks to accept all honest nodes with overwhelming probability, is much greater in graphs with high trust values, such as co-author graphs, than in graphs with low trust values such as online social networks. We show that this behavior is due to the community structure in high-trust graphs, requiring longer walk to traverse multiple communities. Furthermore, we show that our proposed designs to account for trust, while increase the cost function of graphs with low trust value, decrease the advantage of attacker.

[1]  Alistair Sinclair,et al.  Improved Bounds for Mixing Rates of Markov Chains and Multicommodity Flow , 1992, Combinatorics, Probability and Computing.

[2]  Bart Selman,et al.  Referral Web: combining social networks and collaborative filtering , 1997, CACM.

[3]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[4]  Michael Ley,et al.  The DBLP Computer Science Bibliography: Evolution, Research Issues, Perspectives , 2002, SPIRE.

[5]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[6]  Jacob R. Lorch,et al.  Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OSDI '02.

[7]  Matthew Richardson,et al.  Trust Management for the Semantic Web , 2003, SEMWEB.

[8]  Hector Garcia-Molina,et al.  DHT Routing Using Social Links , 2004, IPTPS.

[9]  George Danezis,et al.  Sybil-Resistant DHT Routing , 2005, ESORICS.

[10]  Christos Faloutsos,et al.  Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.

[11]  Margo I. Seltzer,et al.  Distributed, secure load balancing with skew, heterogeneity and churn , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[12]  Nikita Borisov,et al.  Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).

[13]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[14]  Starr Roxanne Hiltz,et al.  Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.

[15]  Jiye Yu,et al.  iLink: search and routing in social networks , 2007, KDD '07.

[16]  Krishna P. Gummadi,et al.  Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.

[17]  Stephen B. Wicker,et al.  Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[18]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[19]  David Liben-Nowell,et al.  The link-prediction problem for social networks , 2007 .

[20]  Shishir Nagaraja,et al.  Anonymity in the Wild: Mixes on Unstructured Networks , 2007, Privacy Enhancing Technologies.

[21]  Seungyeop Han,et al.  Analysis of topological characteristics of huge online social networking services , 2007, WWW '07.

[22]  Mads Haahr,et al.  Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.

[23]  John Kelley,et al.  WhozThat? evolving an ecosystem for context-aware mobile social networks , 2008, IEEE Network.

[24]  Shouhuai Xu,et al.  Exploiting social networks for threshold signing: attack-resilience vs. availability , 2008, ASIACCS '08.

[25]  Russell J. Clark,et al.  D-book: a mobile social networking application for delay tolerant networks , 2008, CHANTS '08.

[26]  Jon M. Kleinberg,et al.  Feedback effects between similarity and social influence in online communities , 2008, KDD.

[27]  Greg Bigwood,et al.  Social DTN routing , 2008, CoNEXT '08.

[28]  Phillip B. Gibbons,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2006, IEEE/ACM Transactions on Networking.

[29]  Valérie Viet Triem Tong,et al.  A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification , 2008, 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[30]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.

[31]  Nicholas Hopper,et al.  Membership-concealing overlay networks , 2009, CCS.

[32]  Feng Xiao,et al.  DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[33]  Ben Y. Zhao,et al.  User interactions in social networks and their implications , 2009, EuroSys '09.

[34]  Lakshminarayanan Subramanian,et al.  Sybil-Resilient Online Content Voting , 2009, NSDI.

[35]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[36]  Miguel Rio,et al.  A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks , 2009, IEEE INFOCOM 2009.

[37]  Krishna P. Gummadi,et al.  On the evolution of user interaction in Facebook , 2009, WOSN '09.

[38]  Jennifer Golbeck,et al.  Trust and nuanced profile similarity in online social networks , 2009, TWEB.

[39]  Erwan Le Merrer,et al.  Centralities: capturing the fuzzy notion of importance in social graphs , 2009, SNS '09.

[40]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[41]  Valérie Viet Triem Tong,et al.  An efficient distributed PKI for structured P2P networks , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[42]  Jure Leskovec,et al.  Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..

[43]  Jure Leskovec,et al.  Predicting positive and negative links in online social networks , 2010, WWW '10.

[44]  Qinghua Li,et al.  Routing in Socially Selfish Delay Tolerant Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[45]  Nicholas Hopper,et al.  Towards freedom of speech on the internet: censorship-resistant communication and storage , 2010 .

[46]  Lakshminarayanan Subramanian,et al.  Brief announcement: improving social-network-based sybil-resilient node admission control , 2010, PODC '10.

[47]  Krishna P. Gummadi,et al.  An analysis of social network-based Sybil defenses , 2010, SIGCOMM 2010.

[48]  Krishna P. Gummadi,et al.  You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.

[49]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..

[50]  Aziz Mohaisen,et al.  Measuring the mixing time of social graphs , 2010, IMC '10.

[51]  M. Frans Kaashoek,et al.  Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.

[52]  Daniele Quercia,et al.  Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue , 2010, 2010 Proceedings IEEE INFOCOM.

[53]  Chandra Prakash,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2011 .