Abstract
Recent solutions to defend against the Sybil attack, in which a node generates multiple identities, using social networks. In these solutions, social networks are assumed to be fast mixing, and Sybil nodes—which disrupt the fast mixing property of social networks—are detected. Little is known about the cause of the mixing quality in social graphs, and how to improve it in slow mixing ones. In this work we relate the mixing time of social graphs to graph degeneracy, which captures cohesiveness of the graph. We experimentally show that fast-mixing graphs tend to have a larger single core whereas slow-mixing graphs tend to have smaller multiple cores. We then propose several heuristics to improve the mixing of slow-mixing graphs using their topological structures by augmenting them. We show that our heuristics greatly improve Sybil defenses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Avrachenkov, K., Ribeiro, B., Towsley, D.: Improving random walk estimation accuracy with uniform restarts. In: Kumar, R., Sivakumar, D. (eds.) WAW 2010. LNCS, vol. 6516, pp. 98–109. Springer, Heidelberg (2010)
Batagelj, V., Zaversnik, M.: An \(O(m)\) algorithm for cores decomposition of networks. Arxiv, preprint cs/0310049 (2003)
Cai, Z., Jermaine, C.: The latent community model for detecting sybil attacks in social networks. In: NDSS (2012)
Danezis, G., Mittal, P.: SybilInfer: detecting sybil nodes using social networks. In: NDSS (2009)
Dellamico, M., Roudier, Y.: A measurement of mixing time in social networks. In: IWSTM (2009)
Douceur, John R.: The sybil attack. In: Druschel, Peter, Kaashoek, MFrans, Rowstron, Antony (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Erdős, P., Hajnal, A.: On chromatic number of graphs and set-systems. Acta Math. Hung. 17(1), 61–99 (1966)
Jerrum, M., Sinclair, A.: Conductance and the rapid mixing property for markov chains: the approximation of the permanent resolved. In: STOC, pp. 235–244. ACM (1988)
Lee, C.-H., Xu, X., Eun, D.Y.: Beyond random walk and metropolis-hastings samplers: why you should not backtrack for unbiased graph sampling. In: Harrison, P.G., Arlitt, M.F., Casale, G. (eds) SIGMETRICS, pp. 319–330. ACM (2012)
Lesniewski-Laas, C.: A Sybil-proof one-hop DHT. In: Proceedings of the 1st Workshop on SNS, pp. 19–24. ACM (2008)
Lesniewski-Laas, C.: Design and applications of a secure and decentralized distributed hash table. Ph.D thesis, Massachusetts Institute of Technology (2010)
Lesniewski-Lass, C., Kaashoek, M.F.: Whānau: a sybil-proof distributed hash table. In: NSDI, pp. 3–17 (2010)
Li, F., Mittal, P., Caesar, M., Borisov, N.: Sybilcontrol: practical sybil defense with computational puzzles. In: Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing, pp. 67–78. ACM (2012)
Lick, D., White, A.: k-Degenerate graphs. Can. J. Math. 22, 1082–1096 (1970)
Mittal, P., Caesar, M., Borisov, N.: X-Vine: secure and pseudonymous routing using social networks. In: NDSS (2012)
Mohaisen, A., Hopper, N., Kim, Y.: Designs to account for trust in social network-based sybil defenses. In: ACM CCS (2010)
Mohaisen, A., Hopper, N., Kim, Y.: Keep your friends close: Incorporating trust in social network-based sybil defenses. In: INFOCOM (2011)
Mohaisen, A., Luo, P., Li, Y., Kim, Y., Zhang, Z.: Measuring bias in the mixing time of social graphs due to graph sampling. In: MILCOM (2012)
Mohaisen, A., Tran, H., Hopper, N., Kim, Y: Understanding social network properties for trustworthy computing, In: SIMPLEX (2011)
Mohaisen, A., Tran, H., Hopper, N., Kim, Y.: Understanding the mixing patterns of social networks. Technical report, UMN (2011)
Mohaisen, A., Tran, H., Hopper, N., Kim, Y.: On the mixing time of directed social graphs and implications. In: ACM ASIACCS (2012)
Mohaisen, A., Yun, A., Kim, Y.: Measuring the mixing time of social graphs. In: IMC, pp. 383–389. ACM (2010)
Ribeiro, B.F., Towsley, D.F.: Estimating and sampling graphs with multidimensional random walks. In: IMC (2010)
Shi, L., Yu, S., Lou, W., Hou, Y.T.: Sybilshield: an agent-aided social network-based sybil defense among multiple communities. In: INFOCOM (2013)
Sinclair, A.: Improved bounds for mixing rates of mc and multicommodity flow. Comb., Prob. & Comp. 1, 351–370 (1992)
Yang, C., Harkreader, R.C., Zhang, J., Shin, S., Gu, G.: Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: WWW (2012)
Yu, H.: Sybil defenses via social networks: a tutorial and survey. SIGACT News 42(3), 80–101 (2011)
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social net defense against sybil attacks. In: S&P (2008)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against sybil attacks via social networks. In: SIGCOMM (2006)
Yu, H., Shi, C., Kaminsky, M., Gibbons, P.B., Xiao, F.: Dsybil: optimal sybil-resistance for recommendation systems. In: IEEE Symposium on Security and Privacy (2009)
Zhou, Z., Zhang, N., Gong, Z., Das, G.: Faster random walks by rewiring online social networks on-the-fly. In: ICDE (2013)
Acknowledgement
Part of this work appears in our unpublished prior study in [20]. The first author would like to thank Y. Kim, N. Hopper, and H. Tran for their help with the prior work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Mohaisen, A., Hollenbeck, S. (2014). Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs. In: Kim, Y., Lee, H., Perrig, A. (eds) Information Security Applications. WISA 2013. Lecture Notes in Computer Science(), vol 8267. Springer, Cham. https://doi.org/10.1007/978-3-319-05149-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-05149-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05148-2
Online ISBN: 978-3-319-05149-9
eBook Packages: Computer ScienceComputer Science (R0)