Solving sybil attacks using evolutionary game theory

Recommender systems have become quite popular recently. However, such systems are vulnerable to several types of attacks that target user ratings. One such attack is the Sybil attack where an entity masquerades as several identities with the intention of diverting user ratings. In this work, we propose evolutionary game theory as a possible solution to the Sybil attack in recommender systems. After modeling the attack, we use replicator dynamics to solve for evolutionary stable strategies. Our results show that under certain conditions that are easily achievable by a system administrator, the probability of an attack strategy drops to zero implying degraded fitness for Sybil nodes that eventually die out.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Brian Neil Levine,et al.  Quantifying Resistance to the Sybil Attack , 2008, Financial Cryptography.

[3]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[4]  Libin Yang,et al.  Preventing dropping packets attack in sensor networks: A game theory approach , 2008, Wuhan University Journal of Natural Sciences.

[5]  Murat Kantarcioglu,et al.  When Do Firms Invest in Privacy-Preserving Technologies? , 2010, GameSec.

[6]  Ilangko Balasingham,et al.  Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory , 2010, FMOODS/FORTE.

[7]  Jon M. Kleinberg,et al.  Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review] , 2013, IEEE Technol. Soc. Mag..

[8]  Marc Lelarge,et al.  A local mean field analysis of security investments in networks , 2008, NetEcon '08.

[9]  Mustaque Ahamad,et al.  Incentives in BitTorrent induce free riding , 2005, P2PECON '05.

[10]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[11]  Shengyong Chen,et al.  Game Theory for Wireless Sensor Networks: A Survey , 2012, Sensors.

[12]  Gang Wei,et al.  A game theoretic approach for power allocation with QoS constraints in wireless multimedia sensor networks , 2009, Multimedia Tools and Applications.

[13]  Sigmund,et al.  Introduction to Evolutionary Game Theory , 2010 .

[14]  Zhu Han,et al.  Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.

[15]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[16]  K. J. Ray Liu,et al.  Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.

[17]  Zhu Han,et al.  Physical layer security game: How to date a girl with her boyfriend on the same table , 2009, 2009 International Conference on Game Theory for Networks.

[18]  F. Maxwell Harper,et al.  An Economic Model of User Rating in an Online Recommender System , 2005, User Modeling.

[19]  David Easley,et al.  Networks, Crowds, and Markets: Modeling Network Traffic Using Game Theory , 2010 .

[20]  William H. Sandholm,et al.  Deterministic Evolutionary Dynamics , 2005 .

[21]  Anthony Ephremides,et al.  MAC games for distributed wireless network security with incomplete information of selfish and malicious user types , 2009, 2009 International Conference on Game Theory for Networks.

[22]  Sophie Ahrens,et al.  Recommender Systems , 2012 .

[23]  Max Q.-H. Meng,et al.  Conflict and coalition models in inhomogeneous power allocation for wireless sensor networks , 2009, 2008 IEEE International Conference on Robotics and Biomimetics.

[24]  Sanghoon Lee,et al.  A cross-layer optimization for energy-efficient MAC protocol with delay and rate constraints , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[25]  Sebastian Ueckert August An Introduction to Evolutionary Game Theory , 2007 .

[26]  Feng Xiao,et al.  DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.