Please use this identifier to cite or link to this item:
Title: SybilGuard: Defending against sybil attacks via social networks
Authors: Yu, H. 
Kaminsky, M.
Gibbons, P.B.
Flaxman, A.D.
Keywords: Social networks
Sybil attack
Sybil identity
Issue Date: 2008
Citation: Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.D. (2008). SybilGuard: Defending against sybil attacks via social networks. IEEE/ACM Transactions on Networking 16 (3) : 576-589. ScholarBank@NUS Repository.
Abstract: Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the system, the malicious user is able to "out vote"the honest users in collaborative tasks such as Byzantine failure defenses. This paper presents SybilGuard, a novel protocol for limiting the corruptive influences of sybil attacks. Our protocol is based on the "social network"among user identities, where an edge between two identities indicates a human-established trust relationship. Malicious users can create many identities but few trust relationships. Thus, there is a disproportionately small "cut"in the graph between the sybil nodes and the honest nodes. SybilGuard exploits this property to bound the number of identities a malicious user can create. We show the effectiveness of SybilGuard both analytically and experimentally. © 2008 IEEE.
Source Title: IEEE/ACM Transactions on Networking
ISSN: 10636692
DOI: 10.1109/TNET.2008.923723
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.


checked on Jan 21, 2019


checked on Jan 2, 2019

Page view(s)

checked on Jan 13, 2019

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.