What’s a Sybil Attack & How Do Blockchains Mitigate Them?

Posted by

A Sybil attack is an attempt to control a peer network by creating multiple fake identities. To outside observers, these fake identities appear to be unique users. However, behind the scenes, a single entity controls many identities at once. As a result, that entity can influence the network through additional voting power in a democratic network, or echo chamber messaging in a social network.

The United States’ recent trouble with Russian election influence via fake accounts on social media is an easy-to-understand example of a pseudo-Sybil attack. Although the fake accounts and bots didn’t hack into Facebook or Twitter, they still used multiple identities to influence the entire network. Because Sybil attacks are so subversive and easy to conceal, it can be difficult to tell when a single entity controls many accounts. Indeed, Facebook didn’t even realize the extent of fake accounts on their platform until internal investigations months after much of the damage was already done.

The name “Sybil attack” comes from a book, Sybil, about a woman with a dissociative identity disorder. Microsoft researchers first investigated and wrote about the implications of Sybil attacks on peer networks in the early 2000s. In this brief guide, we’ll look at the implications of Sybil attacks and how networks can prevent such attacks. If you’re considering using a blockchain platform, it’s important to understand their approach to Sybil threats and undue influence through identity creation on the network.

fakenews-2

Disproportionate Control

A Sybil attack grants undue influence to a single entity simply because that entity controls many pseudonyms. We hear all the time about fake Reddit accounts that upvote posts on behalf of a given company or cause. Amazon sellers can buy fake reviews from accounts around the world. These pseudonyms are hard to detect and remove. Read more

attack-edges
Sybil nodes might also surround and try to influence the information reaching other nodes on the network, gradually influencing the ledger or database through censorship.

Prevention

Blockchains and peer networks have various options when it comes to preventing Sybil attacks. Each option comes with its own benefits and drawbacks. Hybrid approaches to Sybil prevention, incorporating each of three key elements, are common to address concerns.

1. The cost to Create an Identity

The first way to mitigate a Sybil attack is to raise the cost of creating a new identity. Since identities can map to entities on a many to one ratio, we need a way to make it resource intensive to create too many identities. The challenge here, though, is there are many legitimate reasons why you might want to operate multiple identities. Redundancy, resource sharing, reliability, and anonymity are all good reasons to create multiple identities on a peer network.

The ideal cost of identity creation shouldn’t restrict people from joining the network or even creating a handful of identities. Instead, it should be just enough to make it unfeasible to create many identities in a short period of time.

Blockchains use the cost of creation as a Sybil protection feature through mining. In proof of work algorithms, in order to create a new identity on the mining network, you’ll need another computer with processing power to contribute. Read more.

2. Chain of Trust

A second way to fight Sybil attacks is requiring some type of trust before allowing a new identity to join the network. This usually takes the form of a reputation system, where only established, long-term users can invite or vouch for new entrants to the network. Other variations rely on a probationary system where new accounts are possible but they must remain active and unique for a certain period before they receive voting privileges. Chain of trust also extends to outright identity verification. Some peer networks require you to submit identification before joining. Others allow you to join if you can answer a two-factor authenticated security code. Still, others restrict account creation based on IP address.  All of these require some level of identity verification or trust building before an account receives voting privileges, making the creation of pseudonyms more challenging.

3. Unequal Reputation

The final way to mitigate the threat of Sybil attacks is by weighting user power based on reputation. Users that have been around the longest and proven themselves receive more voting power on communal decisions. This makes the system a meritocracy instead of a pure democracy, and it lowers the power of new users. As a result, many new or less-active accounts don’t grant a Sybil attacker any advantage against reputable older, more active accounts.

Sybil Attacks Are Hard to Prevent

slide_10

Sybil attacks involve false identities and hidden motives. As such, they can be difficult to detect and prevent until they’re already ongoing and apparent. Still, networks that implement a combination of these prevention measures see increased protection from Sybil attacks, mitigating the potential severity of the attack if and when it comes.

This article was originally published by Mr. Bennett Garner(editor at Coin Central and technology writer specializing in blockchain,). Read more about it https://coincentral.com/sybil-attack-blockchain/

hqdefault (1)

JOIN COIN CENTRAL’S NEWSLETTER Click Here

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s