Defeating against Sybil-attacks in Peer-to-peer Networks

There has been a spurt of works showing that the existence of sybil attacks is a serious threat to Peer-to-Peer networks, where one or more attackers can forge a large number of fictitious identities. In this paper, we present a distributed protocol to reduce the adverse effects of sybil attacks in free riding problem. Our approach focuses on restricting nodes to obtain the number of service units in a reasonable level. Unlike other protocols, our protocol works well even if there are a large number of sybil nodes in the network. Our results show the promise of the protocol in limiting sybil attacks while not sacrificing application performance.

[1]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[2]  Alice Cheng,et al.  Sybilproof reputation mechanisms , 2005, P2PECON '05.

[3]  Lakshminarayanan Subramanian,et al.  Sybil-Resilient Online Content Voting , 2009, NSDI.

[4]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[5]  A. K. Somani,et al.  Reputation management framework and its use as currency in large-scale peer-to-peer networks , 2004 .

[6]  Lakshminarayanan Subramanian,et al.  Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.

[7]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[8]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[9]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[10]  Ingmar Baumgart,et al.  S/Kademlia: A practicable approach towards secure key-based routing , 2007, 2007 International Conference on Parallel and Distributed Systems.

[11]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[12]  J. Frankel,et al.  The gnutella protocol specification v0.4 document revision 1.2 , 2000 .

[13]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[14]  Nikita Borisov,et al.  Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).

[15]  Krishna P. Gummadi,et al.  An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.

[16]  Thomas F. La Porta,et al.  Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.