Sybil Attack - Reading Assignment

  1. In a sybil attack, pseudonyms are stolen or created to influence P2P networks in a bad way.
  2. A crypto network with anonymity for its users might be exposed to such an attack.
1 Like
  1. The Sybil is an attack wherein a “reputation system” is subverted by creating multiple identities.
  2. Deficiencies that can lead to Sybil attacks:
  • cheaply generated identities
  • system easily accepting inputs from entities that do not have a chain of trust linking them to a trusted entity
  • whether or not the reputation system treats all entities identically
1 Like

1. What is the general idea of a sybil attack?

The general idea of a Sybil attack is to create enough identities to gain some sort of power and/or control over a reputation system.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

A cryptocurrency network could be so small or not distributed widely enough that it would be economically cheap for a malicious entity to perform a Sybil attack on that particular network. The idea being that the more energy is deployed to run a network, the harder it becomes to gain and deploy enough energy to attack it.

1 Like

1. What is the general idea of a sybil attack?
“The Sybil attack in computer security is an attack wherein a reputation system is subverted by creating multiple identities”

1. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
“A reputations system’s vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically.”

1 Like
  1. A Sybil attack is where one or a small group of entities create enough “identities” or “user accounts” to disproportionately affect the network to achieve their desired result. (affecting a voting mechanic, etc…)

  2. The primary issues/deficiencies I see are within user validation & economic costs. In theory, if the economic incentive(and/or disincentive to act out) is enough and users are validated in a manner that makes sense to the project, that would eliminate the primary attack vectors in my mind.

1 Like
  1. It´s an attack that create multiple identities to manage the network based on controlling the majority of the nodes of the network that allows you to validate fake transactions.

  2. If most miners in a network are in the same country (for example: China) the government could seize the miners and perform a 51% attack.

1 Like

1. What is the general idea of a Sybil attack?

When a single entity creates multiple pseudonymous identities to gain control over the network service it is known as a Sybil attack. Vulnerability to a Sybil attack depends on how cheaply identities can be generated.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a Sybil attack to occur?

When you have a network that depends on a voting system, and if a person can create multiple identities over the network very easily without any validation then the system is susceptible to Sybil attack.

1 Like
  1. Sybil Attacks - One person can easily create multiple identities to gain influenmce thus providing nodes corrupt information - this depends on how cheap the attacker can gain these identities. More than one identity can correspond to a single entity.

  2. Poor consensus - if voting or governance was ratio 1:1. Once example of preventing sybil attacks is PoW - which is why BTC remains so strong in preventing such attacks.

1 Like
  1. creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It will confuse the network p2p since its posing as many identities while its actually one local identity.

  2. crypto systems with voting coins can be held and controlled by one identity that owns large sum of coins and pretending to be different identities in the network.

1 Like
  1. A Sybil attack in computer security, also known as sockpuppets,
    is when a reputation system is destabilized. Multiple identities are entered into
    the system. And if there is not a chain of trust linking the system to a
    trusted entity, the computer’s security is vulnerable.

  2. Deficiencies within a system that can allow a Sybil attack to occur are not
    having: 1. Identity validation 2. Social-Trust-Graphs 3. Economic cost

  3. Personhood validation and 5. Application-Specific-Defenses. Proof Of
    Work is the economic cost (3) used by miners to build trust and security
    when it comes to cryptocurrency.

1 Like
  1. An attacker creates many pseudonimous identities to gain more influence in the network.
  2. Ease to create multiple accounts.
1 Like
  1. Creating many identities to interrupt the peer to peer network

  2. If it is cheap to create identitis. A lack of changing peers. A vote system.

1 Like

What is the general idea of a sybil attack?

To create a fake identity to fool the network

What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

How easy it is to create multiple identities that are very similar to each other.

1 Like
  1. One entity to gain a dominating presence in a peer to peer network by creating multiple accounts
  2. The anonymity of addresses and the ability to create new identities easily and quickly
1 Like
  1. The general idea is using multiple fake id’s to dominate/overwhelm a system.

  2. No limits on number of accounts/user, low barriers to entry, limited identity management/validation, ecosystems that allow multiple users to be created freely and anonymously are generally a vulnerability to a Sybil attack.

1 Like
  1. to use multiple identities to create a large group of people, for lack of a better word. to attack a system.
  2. blockchain proof of work uses a large group of people to prove each block. an extremely large sybil attack could cause problems
1 Like
  1. The main idea is create a large number of identities to have the control of the reputation system.

  2. A deficiency can be the low cost of creating the identities

1 Like
  1. In a Sybil attack, the attacker subverts the reputation system of a [network service by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence.
  2. easy to create many identities
1 Like

A.1. The general idea of a Sybil attack is to isolate a particular node from the rest of the nodes in the network by allowing the target node to connect to several other nodes controlled by one entity.

A.2. Sybil attacks can result in double-spending by limiting the target node access to the entire blockchain network. This can be avoided by cycling communications randomly through several nodes in the network and connecting and disconnecting communications between nodes i.e. do not hold a communication to a particular node for extended periods of time. PoW consensus is an effective way to avoid Sybil attacks.

1 Like

1.One person can create more identities and therefore gaining big influence.
2.More identities can be created cheapily and easily.

1 Like