Sybil Attack - Reading Assignment

What is the general idea of a sybil attack? Subverting the reputation system by creating multiple identities to gain a significant influence.

What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur? A network that relies on a voting system and has limited attack resistance/verification requirements can be vulnerable to a sybil attack.

1 Like
  1. A sybil attack is an attempt to control a peer to peer network by using fake accounts that provide a node more credibility.

  2. User- Validation can be a deficiency if a network fails to require this feature. Economic barriers also provide added protection, for example proof-of-stake requires the node to have their own assets at risk.

1 Like
  1. A sybil attack happens when a single entity of a network, in possession of multiple identities, uses its multiple pseudonyms in order to gain a disproportionately large influence in the network’s reputation system.

  2. Those deficiecies can enhances the risk of a sybil attack:

    • easy implementation of multilpy identities for a single entity (low levels of identity validation).
    • absence of significative economical costs for using multiple pseoudonyms in order to manipulate the network’s reputation system.
1 Like
  1. When a big amount of pseudonymous identities sway the reputation system of a network.
  2. When new identities can be cheaply created, when the reputation system treats identities unequally, and when the reputation system accepts inputs from entities which don’t have a chain of trust linking them to a trusted entity.
1 Like

A Sybil attack is when a single entity creates multiple accounts, or identities, for themselves on a network in an attempt to subvert the network’s reputation system, (consensus algorithm in the case of Bitcoin?) and manipulate the network in their favor. These extra identities are referred to as sock-puppet accounts when used on social media platforms.

The anonymous nature of cryptocurrencies would make it more difficult to employ identity-verification techniques on such networks.

1 Like

A sybil attack is when a hacker gains access to a peer to peer network and is able to create multiple accounts or entities.

Not having strong validation techniques/measures will allow for this type of attack.

1 Like
  1. It is an attack on the reputation of a network. Thus trying to gain more than 50% of the network control, in order to carry out the hack.

  2. The lack of identity validation proofs.

1 Like
  1. What is the general idea of a sybil attack?
    A single entity that produces multiple identities for the purpose of obtaining a disproportional advantage over peers in a network

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    Anonymity-does not require user verification of an identity to person in order to participate
    Voting based on identity
    POW is an economic disincentive to this however

1 Like
  1. One identity poses as multiple identities.
  2. Anonymity and low cost
1 Like

1. What is the general idea of a sybil attack?
A user (or small number of users) using fake sock puppet accounts to appear like a larger number of individual entities for the purpose of manipulating a reputation or voting system.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
A high level of anonymity or easily obtained verification measures.

1 Like
  1. The general idea of a sybil attack is that multiple identities are created on a reputation system.

  2. Deficiencies within a system (such as a cryptocurrency network) that can allow a sybil attack to occur include low prices at which to create identities, the number of identities that can be created, and the treatment of those entities.

1 Like

What is the general idea of a sybil attack?
A sybil attack is basically an attacker creating many different identities in order that the actor may gain control over the network. For example an actor could create hundreds of different social media accounts in order that they can than use those accounts to increase exposure to particular posts or pages.The cheaper and easier it is to create the accounts the easier it is to attack the network in this manner.

What deficiencies within a system such as a cryptocurrency network can allow a sybil attack to occur?
Within a blockchain network it can be very easy to create multiple wallets and this can make it very easy to attack a network in this manner. However many exchanges now require KYC verification and other forms of identity verification and also limit the number of accounts a user can gain staking benefits from. I am assuming this is done to prevent these type of attacks.

In the node environment one node can be surrounded by nodes controlled by one entity and thus the data going to and from that node can be corrupted. The best way to prevent this type of attack is to make sure you dont stay connected to one node for too long.

1 Like

1. What is the general idea of a sybil attack?
To manipulate a reputation system by creating a large number of pseudonymous identities in order to gain disproportional influence.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
When new identities can be easily generated in a system. When the system accepts inputs from entities that have no chain of trust. When the system treats all entities identically.

1 Like
  1. The general idea of a Sybil attack is a type of attack seen in peer-to-peer networks in which a node in the network operates multiple identities actively at the same time and undermines the authority/power of the system. The main aim of this attack is to gain the majority of influence in the network to carry out illegal actions in the system
  2. The deficiencies within a system (such as a cryptocurrency network) which can allow a Sybil attack to occur include:
    No validation of identities before allowing someone to join the network. Avoided by either “direct validation”. Where an already established member verifies the new joiner of the network. Or by “indirect validation”. Where an established member verifies some other members who can, in turn, verify other new network joiners. As the members verifying the new joiners are verified and validated by an established entity, the new joiners are trusted to be honest.
    No ‘cost’ to create an identity. To prevent multiple fake identities in the network, we can put a cost for every identity that aims to join the network. Bitcoin uses the Proof of Work (PoW) consensus algorithm to prove the authenticity of any block that is added to the blockchain. A considerable amount of computing power is required to do the work which provides incentive to the miners to do honest work(a bitcoin reward for every block mined) and no incentive for faulty work.
1 Like

creating pseudo identities for more influence
proof of work

1 Like
  1. The general idea of a sybil attack is to create pseudonyms to get more votes in a voting system.
  2. Low prices for creating new identities and weak reputation systems.
1 Like
  1. What is the general idea of a sybil attack?
    The attacker will create a number of pseudonymous identities to gain disproportional influence.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    No one to one identity validation.

1 Like

1. What is the general idea of a sybil attack?
In Sybil attacks an entity creates multiple identities to gain disproportionatley large influence of the network.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
Missing prevention for sybil attacks like Identity validation or economic costs.
One entity can create several identities and run nodes to gian more incluence in the network.

1 Like
  1. What is the general idea of a sybil attack?
    an attack which creates a big number of pseudonymous identities and uses them to gain an influence on a network
  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    No identity validation and low economic costs for entry, if it is easy and cheap to create unique identities then one actor can create multiple identities inorder to gain more influence on the network
1 Like
  1. An attacker that utilizes multiple identities on the network to gain a strong influence on a particular node so it would be misleading to think the received data on the blockchain is genuinely verified by multiple entities.

  2. A node not verifying its data with enough peers or no method to prove an identity’s entity. The network would need to improve how they handle consensus. Perhaps some form of trust score or limit the amount of identities created by one entity.

1 Like