Playing with Sybil

Recommender systems have become quite popular recently. However, such systems are vulnerable to several types of attacks that target user ratings. One such attack is the Sybil attack where an entity masquerades as several identities with the intention of diverting user ratings. In this work, we propose classical and spatial evolutionary game theory as possible solutions to the Sybil attack in recommender systems. We model the attack using the two techniques and use replicator dynamics in the classical model to solve for evolutionary stable strategies. Results from both models agree that under conditions that are easily achievable by a system administrator, the probability of an attack strategy drops to zero implying degraded fitness for Sybils that eventually die out.

[1]  Feng Xiao,et al.  DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[2]  Sophie Ahrens,et al.  Recommender Systems , 2012 .

[3]  Max Q.-H. Meng,et al.  Conflict and coalition models in inhomogeneous power allocation for wireless sensor networks , 2009, 2008 IEEE International Conference on Robotics and Biomimetics.

[4]  Sanghoon Lee,et al.  A cross-layer optimization for energy-efficient MAC protocol with delay and rate constraints , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[5]  Marc Lelarge,et al.  A local mean field analysis of security investments in networks , 2008, NetEcon '08.

[6]  Sebastian Ueckert August An Introduction to Evolutionary Game Theory , 2007 .

[7]  Mustaque Ahamad,et al.  Incentives in BitTorrent induce free riding , 2005, P2PECON '05.

[8]  Jon M. Kleinberg,et al.  Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review] , 2013, IEEE Technol. Soc. Mag..

[9]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[10]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[11]  Brian Neil Levine,et al.  Quantifying Resistance to the Sybil Attack , 2008, Financial Cryptography.

[12]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[13]  Libin Yang,et al.  Preventing dropping packets attack in sensor networks: A game theory approach , 2008, Wuhan University Journal of Natural Sciences.

[14]  Ilangko Balasingham,et al.  Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory , 2010, FMOODS/FORTE.

[15]  Shengyong Chen,et al.  Game Theory for Wireless Sensor Networks: A Survey , 2012, Sensors.

[16]  F. Maxwell Harper,et al.  An Economic Model of User Rating in an Online Recommender System , 2005, User Modeling.

[17]  Zhu Han,et al.  Physical layer security game: How to date a girl with her boyfriend on the same table , 2009, 2009 International Conference on Game Theory for Networks.

[18]  William H. Sandholm,et al.  Deterministic Evolutionary Dynamics , 2005 .

[19]  Anthony Ephremides,et al.  MAC games for distributed wireless network security with incomplete information of selfish and malicious user types , 2009, 2009 International Conference on Game Theory for Networks.

[20]  K. J. Ray Liu,et al.  Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.

[21]  Murat Kantarcioglu,et al.  When Do Firms Invest in Privacy-Preserving Technologies? , 2010, GameSec.

[22]  Gang Wei,et al.  A game theoretic approach for power allocation with QoS constraints in wireless multimedia sensor networks , 2009, Multimedia Tools and Applications.

[23]  Sigmund,et al.  Introduction to Evolutionary Game Theory , 2010 .

[24]  Ayman I. Kayssi,et al.  Solving sybil attacks using evolutionary game theory , 2016, SAC.

[25]  Yue Zhao,et al.  Spatial games and the maintenance of cooperation in an asymmetric Hawk-Dove game , 2013 .

[26]  Zhu Han,et al.  Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.

[27]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[28]  David Easley,et al.  Networks, Crowds, and Markets: Modeling Network Traffic Using Game Theory , 2010 .