Please use this identifier to cite or link to this item:
Title: SybilLimit: A near-optimal social network defense against sybil attacks
Authors: Yu, H. 
Gibbons, P.B.
Kaminsky, M.
Xiao, F.
Issue Date: 2008
Citation: Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F. (2008). SybilLimit: A near-optimal social network defense against sybil attacks. Proceedings - IEEE Symposium on Security and Privacy : 3-17. ScholarBank@NUS Repository.
Abstract: Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sybil nodes). Without a trusted central authority, defending against sybil attacks is quite challenging. Among the small number of decentralized approaches, our recent SybilGuard protocol [42] leverages a key insight on social networks to bound the number of sybil nodes accepted. Although its direction is promising, SybilGuard can allow a large number of sybil nodes to be accepted. Furthermore, SybilGuard assumes that social networks are fast mixing, which has never been confirmed in the real world. This paper presents the novel SybilLimit protocol that leverages the same insight as SybilGuard but offers dramatically improved and near-optimal guarantees. The number of sybil nodes accepted is reduced by a factor of Θ(√n), or around 200 times in our experiments for a million-node system. We further prove that SybilLimit's guarantee is at most a log n factor away from optimal, when considering approaches based on fast-mixing social networks. Finally, based on three large-scale real-world social networks, we provide the first evidence that real-world social networks are indeed fast mixing. This validates the fundamental assumption behind SybilLimit's and SybilGuard's approach. © 2008 IEEE.
Source Title: Proceedings - IEEE Symposium on Security and Privacy
ISBN: 9780769531687
ISSN: 10816011
DOI: 10.1109/SP.2008.13
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.


checked on Mar 17, 2019


checked on Mar 6, 2019

Page view(s)

checked on Jan 13, 2019

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.