DOC PREVIEW
Berkeley COMPSCI 294 - The Sybil Attack

This preview shows page 1-2-3-24-25-26 out of 26 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

The Sybil AttackOutlineSlide 3BackgroundMotivation (1/2)Motivation (2/2)Slide 7Model – OverviewModel – DefinitionsModel – CharacteristicsModel – ResourcesModel – Main IdeaSlide 13LemmasLemma 1: ResourcesSlide 16Lemma 1: ResourcesLemma 2: ConcurrencySlide 19Lemma 3: ResourcesLemma 4: ConcurrencySlide 22Slide 23Slide 24ConclusionPros/Cons1The Sybil Attack John R. DouceurMicrosoft ResearchPresented for Cs294-4 byBenjamin PoonCs294-4 Benjamin [email protected] 2OutlineBackgroundMotivationModelLemmasConclusionCs294-4 Benjamin [email protected] 3OutlineBackgroundMotivationModelLemmasConclusionCs294-4 Benjamin [email protected] 4BackgroundP2P systems use multiple, independent entities to mitigate possible damage by other hostile entitiesReplicationComputationsStorageFragmentationProtects against privacy violationsSybil AttackAttacker can assume multiple identitiesAims to control substantial fraction of systemCs294-4 Benjamin [email protected] 5Motivation (1/2)Must protect against Sybil AttackUsing replication or fragmentation requires ability to determine if entities are really differentPaper claims Sybil attacks always possible except under extreme, unrealistic assumptionsNeed logically centralized authorityCs294-4 Benjamin [email protected] 6Motivation (2/2)Centralized authority possibilitiesVeriSignExplicit certificationCFS (cooperative storage)Identities assigned using hash of IP addressProblem?SFS (network file system)Identities assigned using host identifier + DNS nameEMBASSY (multiparty trust system)Identities assigned using hardware-embedded cryptographic keysIssues?Cs294-4 Benjamin [email protected] 7OutlineBackgroundMotivationModelLemmasConclusionCs294-4 Benjamin [email protected] 8Model – OverviewGeneric distributed computing environmentEntities ECorrect C union Faulty F = ESend messagesPipeMessagescloudMessagesUninterrupted, finite-length bit stringCloudBroadcastBounded timeGuaranteedUnorderedCs294-4 Benjamin [email protected] 9Model – DefinitionsIdentityAbstract representation that persists across multiple communication eventsEntities perceive other entities through identitiesPresentEach entity presents an identity to other entities in the systemLocal entity LA specific entity that results are stated with respect toAcceptIf an entity e successfully presents an identity i for itself to L, L accepts iCs294-4 Benjamin [email protected] 10Model – CharacteristicsGeneralLeaves internals of cloud unspecifiedIncludes any topology/geometryFriendlyLimits obstructive power of corrupt entitiesDoS attacks not possibleStrengthens negative resultsQ: Any drawbacks of the model?Cs294-4 Benjamin [email protected] 11Model – ResourcesEntities can perform operations with complexity polynomial in n Allows public-key cryptographyEntities can establish point-to-point communicationCs294-4 Benjamin [email protected] 12Model – Main IdeaEach entity e attempts to present one legitimate identityEach faulty entity f additionally attempts to present one or more counterfeit identitiesGoal: system should accept all legitimate identities, zero counterfeitCs294-4 Benjamin [email protected] 13OutlineBackgroundMotivationModelLemmasConclusionCs294-4 Benjamin [email protected] 14LemmasFour lemmasCollectively show impracticality of establishing distinct identities in large-scale distributed systemProofs trivial (refer to paper)In absence of trusted authority, entities accept identities only when identity is:1. Validated by entity itself (direct validation)Lemmas 1 and 22. Vouched for by other already validated identities (indirect validation)Lemmas 3 and 4Cs294-4 Benjamin [email protected] 15Lemma 1: ResourcesLetmin = minimally capable entityRx = resources of xρ = Rf / Rminf can present floor(ρ) distinct identities to LCs294-4 Benjamin [email protected] 16Lemma 1: ResourcesGives lower bound on damage achievable by fAchieve upper bound by exploiting limitations in resourcesCommunication: L broadcasts request for identities and accept replies that come within given time intervalStorage: L challenges identities to store large amount of unique, uncompressible dataComputation: L challenges identities to solve unique computational puzzleCs294-4 Benjamin [email protected] 17Lemma 1: Resources Computational puzzle exampleGenerate large random value yChallenge identity to find (in limited time) pair of values x and z such that least significant n bits of hash(x | y | z) = 0Given y, find x, z s.t. LSBn(hash(x | y | z)) = 0Time to solve proportional to 2n-1Time to verify constantCs294-4 Benjamin [email protected] 18Lemma 2: ConcurrencyIf L accepts entities not validated simultaneouslyf presents a distinct identity to L using RfRf is freed and f repeats processSingle f can present many counterfeit identities to LCs294-4 Benjamin [email protected] 19Lemma 2: ConcurrencyWorks for temporal resources (computation and communication), not storageL can indefinitely extend challenge duration: periodically demand different data excerptsChallenge consumes R, so real work limitedCs294-4 Benjamin [email protected] 20Lemma 3: ResourcesIf L accepts any identity vouched for by q accepted identities, a group F can present many counterfeit identities to L if either:Size of group F >= q RF >= resources taken by q + |F| minimally capable entitiesCs294-4 Benjamin [email protected] 21Lemma 4: ConcurrencyIf correct entities C do not coordinate time intervals to accept identities, and if L accepts any identity vouched for by q accepted identitiesMinimally capable f can present floor( |C| / q ) counterfeit identities to LCs294-4 Benjamin [email protected] 22Lemma 4: ConcurrencyShows need for multiple entities in C to issue concurrent challengesMay or may not be possible depending on resourceCommunication: possible because of broadcast cloudStorage: information theory says “probably not”Computation: possible by combining puzzlesCs294-4


View Full Document

Berkeley COMPSCI 294 - The Sybil Attack

Documents in this Course
"Woo" MAC

"Woo" MAC

11 pages

Pangaea

Pangaea

14 pages

Load more
Download The Sybil Attack
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view The Sybil Attack and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view The Sybil Attack 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?