skip to main content
10.1145/2168836.2168867acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Canal: scaling social network-based Sybil tolerance schemes

Published: 10 April 2012 Publication History

Abstract

There has been a flurry of research on leveraging social networks to defend against multiple identity, or Sybil, attacks. A series of recent works does not try to explicitly identify Sybil identities and, instead, bounds the impact that Sybil identities can have. We call these approaches Sybil tolerance; they have shown to be effective in applications including reputation systems, spam protection, online auctions, and content rating systems. All of these approaches use a social network as a credit network, rendering multiple identities ineffective to an attacker without a commensurate increase in social links to honest users (which are assumed to be hard to obtain). Unfortunately, a hurdle to practical adoption is that Sybil tolerance relies on computationally expensive network analysis, thereby limiting widespread deployment.
To address this problem, we first demonstrate that despite their differences, all proposed Sybil tolerance systems work by conducting payments over credit networks. These payments require max flow computations on a social network graph, and lead to poor scalability. We then present Canal, a system that uses landmark routing-based techniques to efficiently approximate credit payments over large networks. Through an evaluation on real-world data, we show that Canal provides up to a three-order-of-magnitude speedup while maintaining safety and accuracy, even when applied to social networks with millions of nodes and hundreds of millions of edges. Finally, we demonstrate that Canal can be easily plugged into existing Sybil tolerance schemes, enabling them to be deployed in an online fashion in real-world systems.

References

[1]
M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In ACM Transactions on Internet Technology, volume 5, pages 299--314, 2005.
[2]
N. Borisov. Computational puzzles as Sybil defenses. In Proceedings of the 6th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'06), 2006.
[3]
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In SIGOPS Operating Systems Review, volume 36, pages 299--314, 2002.
[4]
H. Chun, H. Kwak, Y.-H. Eom, Y.-Y. Ahn, S. Moon, and H. Jeong. Comparison of online social relations in volume vs interaction: A case study of cyworld. In Proceedings of the 8th ACM/USENIX Internet Measurement Conference (IMC'08), 2008.
[5]
P. Dandekar, A. Goel, R. Govindan, and I. Post. Liquidity in credit networks: A little trust goes a long way. In Proceedings of the 12th ACM Conference on Electronic Commerce (EC'11), 2011.
[6]
G. Danezis and P. Mittal. SybilInfer: Detecting Sybil nodes using social networks. In Proceedings of the 16th Network and Distributed System Security Symposium (NDSS'09), 2009.
[7]
A. Das Sarma, S. Gollapudi, M. Najork, and R. Panigrahy. A sketch-based distance oracle for web-scale graphs. In Proceedings of the 3rd ACM International Conference of Web Search and Data Mining (WSDM'10), 2010.
[8]
E. A. Dinic. An algorithm for the solution of the max-flow problem with the polynomial estimation. Doklady Akademii Nauk SSSR, 194(4), 1970.
[9]
D. do B. DeFigueiredo and E. T. Barr. Trustdavis: A non-exploitable online reputation system. In Proceedings of the 7th IEEE International Conference on E-Commerce Technology (IEEE E-Commerce), 2005.
[10]
J. Douceur. The Sybil Attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02), 2002.
[11]
L. R. Ford and D. R. Fulkerson. Maximal flow through a network. In Canadian Journal of Mathematics, volume 8, pages 399--404.
[12]
A. Ghosh, M. Mahdian, D. M. Reeves, D. M. Pennock, and R. Fugger. Mechanism design on trust networks. In Proceedings of the 3rd International Conference on Internet and Network Economics (WINE'07), 2007.
[13]
A. V. Goldberg and R. E. Tarjan. A new approach to the maximum flow problem. In Proceedings of the 18th annual ACM Symposium on Theory of Computing (STOC'86), 1986.
[14]
R. E. Gomory and T. Hu. Multi-terminal network flows. In Journal of the Society for Industrial and Applied Mathematics (SIAM), volume 9, pages 551--570, 1961.
[15]
D. Gregor and A. Lumsdaine. The parallel BGL: A generic library for distributed graph computations. In Proceedings of the Parallel Object-Oriented Scientific Computing (POOSC), 2005.
[16]
A. Gubichev, S. Bedathur, S. Seufert, and G. Weikum. Fast and accurate estimation of shortest paths in large graphs. In Proceedings of the 19th ACM international conference on Information and knowledge management (CIKM'10), 2010.
[17]
T. Hartmann and D. Wagner. Fully-dynamic cut tree construction. Technical Report 2011.25, Karlsruhe Institute of Technology, 2011.
[18]
J. Jiang, C. Wilson, X. Wang, P. Huang, W. Sha, Y. Dai, and B. Y. Zhao. Understanding latent interactions in online social networks. In Proceedings of the 10th ACM/USENIX Internet Measurement Conference (IMC'10), 2010.
[19]
J. Leskovec, K. Lang, and M. Mahoney. Empirical comparison of algorithms for network community detection. In Proceedings of the 19th International World Wide Web Conference (WWW'10), 2010.
[20]
C. Lesniewski-Laas and M. F. Kaashoek. Whanau: A Sybil-proof distributed hash table. In Proceedings of the 7th Symposium on Networked Systems Design and Implementation (NSDI'10), 2010.
[21]
G. Malewicz, M. H. Austern, A. J. Bik, J. C. Dehnert, I. Horn, N. Leiser, and G. Czajkowski. Pregel: A system for large-scale graph processing. In Proceedings of the International Conference on Management of Data (SIGMOD'10), 2010.
[22]
A. Mislove, H. S. Koppula, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Growth of the Flickr social network. In Proceedings of the 1st ACM SIGCOMM Workshop on Social Networks (WOSN'08), 2008.
[23]
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In Proceedings of the 7th ACM/USENIX Internet Measurement Conference (IMC'07), 2007.
[24]
A. Mislove, A. Post, K. P. Gummadi, and P. Druschel. Ostra: Leveraging trust to thwart unwanted communication. In Proceedings of the 5th Symposium on Networked Systems Design and Implementation (NSDI'08), 2008.
[25]
M. Mitzenmacher and E. Upfal. Probability and Computing. Cambridge University Press, Cambridge, UK, 2005.
[26]
A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. In Proceedings of the 10th ACM/USENIX Internet Measurement Conference (IMC'10), 2010.
[27]
M. Mondal, B. Viswanath, A. Clement, P. Druschel, K. P. Gummadi, A. Mislove, and A. Post. Limiting large-scale crawls of social networking sites. In Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication (SIGCOMM'11, poster session), 2011.
[28]
M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker. Dirty jobs: The role of freelance labor in web service abuse. In Proceedings of the 20th USENIX conference on Security (SEC'11), 2011.
[29]
A. Post, V. Shah, and A. Mislove. Bazaar: Strengthening user reputations in online marketplaces. In Proceedings of the 8th Symposium on Networked Systems Design and Implementation (NSDI'11), 2011.
[30]
D. Quercia and S. Hailes. Sybil attacks against mobile users: Friends and foes to the rescue. In Proceedings of the 29th Conference on Information Communications (INFOCOM'10), 2010.
[31]
S. Seuken and D. C. Parkes. On the Sybil-proofness of accounting mechanisms. In Proceedings of the 6 th Workshop on the Economics of Networks, Systems and Computation (NetEcon'11), 2011.
[32]
T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems (SNS'11), 2011.
[33]
D. Streitfeld. Ferreting out fake reviews online. http://nytimes.com/2011/08/20/technology/finding-fake-reviews-online.html.
[34]
N. Tran, J. Li, L. Subramanian, and S. S. Chow. Optimal Sybil-resilient node admission control. In Proceedings of the 30th Conference on Information Communications (INFOCOM'11), 2011.
[35]
N. Tran, B. Min, J. Li, and L. Subramanian. Sybil-resilient online content voting. In Proceedings of the 6th Symposium on Networked Systems Design and Implementation (NSDI'09), 2009.
[36]
P. Tsuchiya. The landmark hierarchy: A new hierarchy for routing in very large networks. In Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication (SIGCOMM'88), 1988.
[37]
L. G. Valiant. A bridging model for parallel computation. Communications of the ACM, 1990.
[38]
B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in Facebook. In Proceedings of the 2nd ACM SIGCOMM Workshop on Social Networks (WOSN'09), 2009.
[39]
B. Viswanath, M. Mondal, A. Clement, P. Druschel, K. P. Gummadi, A. Mislove, and A. Post. Exploring the design space of social network-based Sybil defense. In Proceedings of the 4th International Conference on Communication Systems and Network (COMSNETS'12), 2012.
[40]
B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An analysis of social network-based Sybil defenses. In Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication (SIGCOMM'10), 2010.
[41]
K. Walsh and E. G. Sirer. Experience with a distributed object reputation system for peer-to-peer filesharing. In Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI'06), 2006.
[42]
Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social network Sybils in the wild. In Proceedings of the 11th ACM/USENIX Internet Measurement Conference (IMC'11), 2011.
[43]
H. Yu. Sybil defenses via social networks: A tutorial and survey. SIGACT News, 42(3), 2011.
[44]
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A near-optimal social network defense against Sybil attacks. In Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P'08), 2008.
[45]
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending against Sybil attacks via social networks. In Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication (SIGCOMM'06), 2006.
[46]
C. M. Zhang and V. Paxson. Detecting and analyzing automated activity on twitter. In Proceedings of the 12th International Conference on Passive and Active Measurement (PAM'11), 2011.

Cited By

View all
  • (2024)Game Theoretic Defense Framework Against Sybil AttacksSN Computer Science10.1007/s42979-024-03153-05:7Online publication date: 4-Sep-2024
  • (2023)CryptoMaze: Privacy-Preserving Splitting of Off-Chain PaymentsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.314847620:2(1060-1073)Online publication date: 1-Mar-2023
  • (2022)MeritRank: Sybil Tolerant Reputation for Merit-based Tokenomics2022 4th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)10.1109/BRAINS55737.2022.9908685(95-102)Online publication date: 27-Sep-2022
  • Show More Cited By

Index Terms

  1. Canal: scaling social network-based Sybil tolerance schemes

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    EuroSys '12: Proceedings of the 7th ACM european conference on Computer Systems
    April 2012
    394 pages
    ISBN:9781450312233
    DOI:10.1145/2168836
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 April 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. credit networks
    2. social network-based sybil defense
    3. social networks
    4. sybil attacks
    5. sybil tolerance

    Qualifiers

    • Research-article

    Conference

    EuroSys '12
    Sponsor:
    EuroSys '12: Seventh EuroSys Conference 2012
    April 10 - 13, 2012
    Bern, Switzerland

    Acceptance Rates

    Overall Acceptance Rate 241 of 1,308 submissions, 18%

    Upcoming Conference

    EuroSys '25
    Twentieth European Conference on Computer Systems
    March 30 - April 3, 2025
    Rotterdam , Netherlands

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Game Theoretic Defense Framework Against Sybil AttacksSN Computer Science10.1007/s42979-024-03153-05:7Online publication date: 4-Sep-2024
    • (2023)CryptoMaze: Privacy-Preserving Splitting of Off-Chain PaymentsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.314847620:2(1060-1073)Online publication date: 1-Mar-2023
    • (2022)MeritRank: Sybil Tolerant Reputation for Merit-based Tokenomics2022 4th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)10.1109/BRAINS55737.2022.9908685(95-102)Online publication date: 27-Sep-2022
    • (2021)SpearProceedings of the 3rd ACM Conference on Advances in Financial Technologies10.1145/3479722.3480997(183-191)Online publication date: 26-Sep-2021
    • (2020)Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood ProtocolsFrontiers in Blockchain10.3389/fbloc.2020.5901713Online publication date: 12-Nov-2020
    • (2020)Mining Deficiencies of Online Reputation Systems: Methodologies, Experiments and ImplicationsIEEE Transactions on Services Computing10.1109/TSC.2017.273020613:5(887-900)Online publication date: 1-Sep-2020
    • (2020)Private and Fast Routing in Credit Networks2020 International Conference on Networking and Network Applications (NaNA)10.1109/NaNA51271.2020.00009(1-7)Online publication date: Dec-2020
    • (2020)HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)10.1109/ICBC48266.2020.9169405(1-5)Online publication date: May-2020
    • (2020)FSTR: Funds Skewness Aware Transaction Routing for Payment Channel Networks2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN48063.2020.00060(464-475)Online publication date: Jun-2020
    • (2020)Coordinated Landmark-based Routing for Blockchain Offline Channels2020 Second International Conference on Blockchain Computing and Applications (BCCA)10.1109/BCCA50787.2020.9274462(108-114)Online publication date: 2-Nov-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media