SyMon: A practical approach to defend large structured P2P systems against Sybil Attack

Sybil attack is one of the most challenging problems that plague current decentralized Peer-to-Peer(P2P) systems. In Sybil attack, a single malicious user creates multiple peer identities known as sybils. These sybils are employed to target honest peers and hence subvert the system. In this paper, we describe a novel solution that enables all honest peers to protect themselves from sybils with high probability in large structured P2P systems. In our proposed sybil defense system, we associate every peer with another non-sybil peer known as SyMon. A given peer’s SyMon is chosen dynamically such that the chances of both of them being sybils are very low. The chosen SyMon is entrusted with the responsibility of moderating the transactions involving the given peer and hence makes it almost impossible for sybils to compromise the system. We show the effectiveness of our proposed system in defending against Sybil attack both analytically and experimentally. In addition to this, we explore the feasibility of our proposed solution in two P2P applications: reputation systems for P2P based file sharing applications and P2P applications susceptible to Denial-of-Service(DOS) attack, systems known to be highly vulnerable to Sybil attack. In each of our case studies, we discuss possible ways in which our solution can be employed to defend the system against Sybil attack.

[1]  Matei Ripeanu,et al.  Peer-to-peer architecture case study: Gnutella network , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[2]  Anne-Marie Kermarrec,et al.  Peer counting and sampling in overlay networks: random walk methods , 2006, PODC '06.

[3]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[4]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[5]  Eran Tromer,et al.  On the Cost of Factoring RSA-1024 , 2003 .

[6]  Butler W. Lampson,et al.  SPKI Certificate Theory , 1999, RFC.

[7]  Thomas F. La Porta,et al.  Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[8]  Warwick Ford,et al.  Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework , 2003, RFC.

[9]  Nikita Borisov,et al.  Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).

[10]  Ashish Goel,et al.  Avoiding ballot stuffing in eBay-like reputation systems , 2005, P2PECON '05.

[11]  C. Costa,et al.  Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems , 2007 .

[12]  Ari Juels,et al.  $evwu Dfw , 1998 .

[13]  Emin Gün Sirer,et al.  Fighting peer-to-peer SPAM and decoys with object reputation , 2005, P2PECON '05.

[14]  Brent Waters,et al.  New client puzzle outsourcing techniques for DoS resistance , 2004, CCS '04.

[15]  Nicolas Christin,et al.  Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.

[16]  D. Janaki Ram,et al.  SyMon: Defending large structured P2P systems against Sybil attack , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[17]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[18]  Bruce Schneier,et al.  Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..

[19]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[20]  Adam Wierzbicki,et al.  Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing , 2006 .

[21]  Carl A. Gunter,et al.  Using rhythmic nonces for puzzle-based DoS resistance , 2008, CSAW '08.

[22]  Keith W. Ross,et al.  Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems , 2005, AINTEC.

[23]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[24]  Lakshminarayanan Subramanian,et al.  Sybil-Resilient Online Content Voting , 2009, NSDI.

[25]  Anirban DasGupta,et al.  The matching, birthday and the strong birthday problem: a contemporary review , 2005 .

[26]  Kris Tiri,et al.  Side-Channel Attack Pitfalls , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[27]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[28]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[29]  Adi Shamir,et al.  Factoring Estimates for a 1024-Bit RSA Modulus , 2003, ASIACRYPT.

[30]  Seif Haridi,et al.  A Practical Approach to Network Size Estimation for Structured Overlays , 2008, IWSOS.

[31]  Miguel Castro,et al.  Controlling the Cost of Reliability in Peer-to-Peer Overlays , 2003, IPTPS.

[32]  Gade Krishna,et al.  A scalable peer-to-peer lookup protocol for Internet applications , 2012 .

[33]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[34]  Hari Balakrishnan,et al.  Malware prevalence in the KaZaA file-sharing network , 2006, IMC '06.

[35]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[36]  Qinyuan Feng,et al.  RepTrap: a novel attack on feedback-based reputation systems , 2008, SecureComm.

[37]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[38]  Brent Waters,et al.  Harvesting verifiable challenges from oblivious online sources , 2007, CCS '07.

[39]  William Stallings Secure Hash Algorithm , 2011, Encyclopedia of Cryptography and Security.

[40]  Hannes Hartenstein,et al.  Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[41]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..

[42]  Jussara M. Almeida,et al.  Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems , 2007, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007).