Please use this identifier to cite or link to this item: https://doi.org/10.1109/SP.2008.13
DC FieldValue
dc.titleSybilLimit: A near-optimal social network defense against sybil attacks
dc.contributor.authorYu, H.
dc.contributor.authorGibbons, P.B.
dc.contributor.authorKaminsky, M.
dc.contributor.authorXiao, F.
dc.date.accessioned2013-07-04T08:27:07Z
dc.date.available2013-07-04T08:27:07Z
dc.date.issued2008
dc.identifier.citationYu, H., Gibbons, P.B., Kaminsky, M., Xiao, F. (2008). SybilLimit: A near-optimal social network defense against sybil attacks. Proceedings - IEEE Symposium on Security and Privacy : 3-17. ScholarBank@NUS Repository. https://doi.org/10.1109/SP.2008.13
dc.identifier.isbn9780769531687
dc.identifier.issn10816011
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/41420
dc.description.abstractDecentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sybil nodes). Without a trusted central authority, defending against sybil attacks is quite challenging. Among the small number of decentralized approaches, our recent SybilGuard protocol [42] leverages a key insight on social networks to bound the number of sybil nodes accepted. Although its direction is promising, SybilGuard can allow a large number of sybil nodes to be accepted. Furthermore, SybilGuard assumes that social networks are fast mixing, which has never been confirmed in the real world. This paper presents the novel SybilLimit protocol that leverages the same insight as SybilGuard but offers dramatically improved and near-optimal guarantees. The number of sybil nodes accepted is reduced by a factor of Θ(√n), or around 200 times in our experiments for a million-node system. We further prove that SybilLimit's guarantee is at most a log n factor away from optimal, when considering approaches based on fast-mixing social networks. Finally, based on three large-scale real-world social networks, we provide the first evidence that real-world social networks are indeed fast mixing. This validates the fundamental assumption behind SybilLimit's and SybilGuard's approach. © 2008 IEEE.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/SP.2008.13
dc.sourceScopus
dc.typeConference Paper
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1109/SP.2008.13
dc.description.sourcetitleProceedings - IEEE Symposium on Security and Privacy
dc.description.page3-17
dc.identifier.isiut000256560300001
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.