A Sybil attack is a type of attack on a computer
network service
In computer networking, a network service is an application running at the network layer and above, that provides data storage, manipulation, presentation, communication or other capability which is often implemented using a client–server or pe ...
in which an attacker subverts the service's reputation system by creating a large number of
pseudonymous
A pseudonym (; ) or alias () is a fictitious name that a person assumes for a particular purpose, which differs from their original or true meaning (orthonym). This also differs from a new name that entirely or legally replaces an individual's ow ...
identities and uses them to gain a disproportionately large influence. It is named after the subject of the book ''
Sybil'', a case study of a woman diagnosed with
dissociative identity disorder. The name was suggested in or before 2002 by Brian Zill at
Microsoft Research
Microsoft Research (MSR) is the research subsidiary of Microsoft. It was created in 1991 by Richard Rashid, Bill Gates and Nathan Myhrvold with the intent to advance state-of-the-art computing and solve difficult world problems through technologi ...
. The term pseudospoofing had previously been coined by L. Detweiler on the
Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".
Description
The Sybil attack in
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
is an attack wherein a
reputation system
A reputation system is a program or algorithm that allow users of an online community to rate each other in order to build trust (social sciences), trust through reputation. Some common uses of these systems can be found on E-commerce websites s ...
is subverted by creating multiple identities. A reputation system's vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically. , evidence showed that large-scale Sybil attacks could be carried out in a very cheap and efficient way in extant realistic systems such as
BitTorrent
BitTorrent is a Protocol (computing), communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a Decentralised system, decentralized manner. The protocol is d ...
Mainline DHT.
An ''entity'' on a peer-to-peer network is a piece of
software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications.
The history of software is closely tied to the development of digital comput ...
that has access to local resources. An entity advertises itself on the peer-to-peer network by presenting an ''identity''. More than one identity can correspond to a single entity. In other words, the mapping of identities to entities is many to one. Entities in peer-to-peer networks use multiple identities for purposes of redundancy, resource sharing, reliability and integrity. In peer-to-peer networks, the identity is used as an
abstraction
Abstraction is a process where general rules and concepts are derived from the use and classifying of specific examples, literal (reality, real or Abstract and concrete, concrete) signifiers, first principles, or other methods.
"An abstraction" ...
so that a remote entity can be aware of identities without necessarily knowing the correspondence of identities to local entities. By default, each distinct identity is usually assumed to correspond to a distinct local entity. In reality, many identities may correspond to the same local entity.
An adversary may present multiple identities to a peer-to-peer network in order to appear and function as multiple distinct nodes. The adversary may thus be able to acquire a disproportionate level of control over the network, such as by affecting voting outcomes.
In the context of (human)
online communities
An online community, also called an internet community or web community, is a community whose members engage in computer-mediated communication primarily via the Internet. Members of the community usually share common interests. For many, on ...
, such multiple identities are sometimes known as
sockpuppets.
The less common term ''inverse-Sybil attack'' has been used to describe an attack in which many entities appear as a single identity.
Example
A notable Sybil attack in conjunction with a traffic confirmation attack was launched against the
Tor anonymity network for several months in 2014.
There are other examples of Sybil attacks run against Tor network users. This includes the 2020 Bitcoin address rewrite attacks. The attacker controlled a quarter of all Tor exit relays and employed
SSL stripping to downgrade secure connections and divert funds to the wallet of the threat actor known as BTCMITM20.
Another notable example is the 2017–2021 attack run by threat actor KAX17. This entity controlled over 900 malicious servers, primarily middle points, in an attempt to deanonymize Tor users.
Prevention
Known approaches to Sybil attack prevention include identity validation, social trust graph algorithms,
economic
An economy is an area of the Production (economics), production, Distribution (economics), distribution and trade, as well as Consumption (economics), consumption of Goods (economics), goods and Service (economics), services. In general, it is ...
costs, personhood validation, and
application-specific defenses.
Identity validation
Validation techniques can be used to prevent Sybil attacks and dismiss
masquerading hostile entities. A local entity may accept a remote identity based on a central authority which ensures a one-to-one correspondence between an identity and an entity and may even provide a reverse lookup. An identity may be validated either directly or indirectly. In direct validation the local entity
queries the central authority to validate the remote identities. In indirect validation the local entity relies on already-accepted identities which in turn vouch for the validity of the remote identity in question.
Practical network applications and services often use a variety of ''identity proxies'' to achieve limited Sybil attack resistance, such as
telephone number verification,
credit card verification, or even based on the
IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
of a client. These methods have the limitations that it is usually possible to obtain multiple such identity proxies at some cost – or even to obtain many at low cost through techniques such as
SMS spoofing or
IP address spoofing
In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the purpose of impersonating another computing system.
Background
The basic protocol for sending ...
. Use of such identity proxies can also
exclude those without ready access to the required identity proxy: e.g., those without their own mobile phone or credit card, or users located behind
carrier-grade network address translation
Network address translation (NAT) is a method of mapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic Router (computing), routing device. The te ...
who share their IP addresses with many others.
Identity-based validation techniques generally provide accountability at the expense of
anonymity
Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person cho ...
, which can be an undesirable tradeoff especially in online forums that wish to permit
censorship
Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
-free information exchange and open discussion of sensitive topics. A
validation authority can attempt to preserve users' anonymity by refusing to perform reverse lookups, but this approach makes the validation authority a prime target for attack. Protocols using
threshold cryptography can potentially distribute the role of such a validation authority among multiple servers, protecting users' anonymity even if one or a limited number of validation servers is compromised.
Social trust graphs
Sybil prevention techniques based on the connectivity characteristics of
social graphs can also limit the extent of damage that can be caused by a given Sybil attacker while preserving anonymity. Examples of such prevention techniques include
SybilGuard,
SybilLimit, the
Advogato Trust Metric,
SybilRank, and the sparsity based metric to identify Sybil clusters in a distributed P2P based reputation system.
These techniques cannot prevent Sybil attacks entirely, and may be vulnerable to widespread small-scale Sybil attacks. In addition, it is not clear whether real-world online social networks will satisfy the trust or connectivity assumptions that these algorithms assume.
Economic costs
Alternatively, imposing economic costs as artificial
barriers to entry
In theories of Competition (economics), competition in economics, a barrier to entry, or an economic barrier to entry, is a fixed cost that must be incurred by a new entrant, regardless of production or sales activities, into a Market (economics) ...
may be used to make Sybil attacks more expensive.
Proof of work
Proof of work (also written as proof-of-work, an abbreviated PoW) is a form of cryptographic proof in which one party (the ''prover'') proves to others (the ''verifiers'') that a certain amount of a specific computational effort has been expended ...
, for example, requires a user to prove that they expended a certain amount of computational effort to solve a
cryptographic
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
puzzle. In
Bitcoin
Bitcoin (abbreviation: BTC; Currency symbol, sign: ₿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
and related permissionless
cryptocurrencies
A cryptocurrency (colloquially crypto) is a digital currency designed to work through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it.
Individual coin ownership records ...
, miners compete to append blocks to a
blockchain
The blockchain is a distributed ledger with growing lists of Record (computer science), records (''blocks'') that are securely linked together via Cryptographic hash function, cryptographic hashes. Each block contains a cryptographic hash of th ...
and earn rewards roughly in proportion to the amount of computational effort they invest in a given time period. Investments in other resources such as
storage or
stake in existing cryptocurrency may similarly be used to impose economic costs.
Personhood validation
As an alternative to identity verification that attempts to maintain a strict "one-per-person" allocation rule, a validation authority can use some mechanism other than knowledge of a user's real identity – such as verification of an ''unidentified'' person's physical presence at a particular place and time as in a ''pseudonym party'' – to enforce a one-to-one correspondence between online identities and real-world users. Such
proof of personhood approaches have been proposed as a basis for permissionless
blockchain
The blockchain is a distributed ledger with growing lists of Record (computer science), records (''blocks'') that are securely linked together via Cryptographic hash function, cryptographic hashes. Each block contains a cryptographic hash of th ...
s and
cryptocurrencies
A cryptocurrency (colloquially crypto) is a digital currency designed to work through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it.
Individual coin ownership records ...
in which each human participant would wield exactly one vote in
consensus. A variety of approaches to proof of personhood have been proposed, some with deployed implementations, although many usability and security issues remain.
Application-specific defenses
A number of distributed protocols have been designed with Sybil attack protection in mind. SumUp and DSybil are Sybil-resistant algorithms for online content recommendation and voting. Whānau is a Sybil-resistant
distributed hash table
A distributed hash table (DHT) is a Distributed computing, distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and any participating node (networking), node can efficiently retrieve the ...
algorithm.
I2P's implementation of
Kademlia
Kademlia is a distributed hash table for decentralized peer-to-peer computer networks designed by Petar Maymounkov and David Mazières in 2002. It specifies the structure of the network and the exchange of information through node (networking), no ...
also has provisions to mitigate Sybil attacks.
See also
*
Astroturfing
Astroturfing is the deceptive practice of hiding the Sponsor (commercial), sponsors of an orchestrated message or organization (e.g., political, economic, advertising, religious, or public relations) to make it appear as though it originates from ...
*
Ballot stuffing
Electoral fraud, sometimes referred to as election manipulation, voter fraud, or vote rigging, involves illegal interference with the process of an election, either by increasing the vote share of a favored candidate, depressing the vote share o ...
*
Social bot
A social bot, also described as a social AI or social algorithm, is a software agent that communicates autonomously on social media. The messages (e.g. tweets) it distributes can be simple and operate in groups and various configurations with ...
*
Sockpuppetry
References
External links
*
*
*
*
A Survey of Solutions to the Sybil AttackOn Network formation: Sybil attacks and Reputation systems*{{cite book , doi=10.1007/11429760_22 , chapter=Trust Transfer: Encouraging Self-recommendations Without Sybil Attack , title=Trust Management , volume=3477 , pages=321–37 , series=Lecture Notes in Computer Science , year=2005 , last1=Seigneur , first1=Jean-Marc , last2=Gray , first2=Alan , last3=Jensen , first3=Christian Damsgaard , isbn=978-3-540-26042-4 , citeseerx=10.1.1.391.5003
A Survey of DHT Security Techniquesby Guido Urdaneta, Guillaume Pierre and Maarten van Steen. ACM Computing surveys, 2009.
by Marco Lazzari. Proceedings of the IADIS International Conference e-Society 2010.
Internet manipulation and propaganda
Computer network security
Reputation management