Sybil Attack - Reading Assignment

  1. One single person can act (so attack) as multiple person in the network.
  2. A Sybil attack can occur because the system is anonymous.
  1. To create multiple “aliases” or variations of an entity with hopes that these aliases may match any of the “identities” that correspond with the given entity. Essentially, by spamming different similar user names or virtual identities, it may be possible to impersonate a given address or user.

  2. A bitcoin address rewrite similar to the one that happened with the Tor Network, where multiple addresses can be linked to one user or transaction…

although I think that Segwit was able to alleviate some of this by separating transaction ID’s from the blockchain itself(?)

help! I’m not sure about the 2nd answer! :frowning:

  1. A Sybil attack is where one person can appear on the network at many people and this enable one person to wield the influence of many people …in networks that have voting to effect policy changes this could pose a problem where one person has more power than he should have
  2. If a network lacks proof of work then it would be cheap and easy…if a network lacks some form of identifying the person on the other end like cc number of ip address

What is the general idea of a sybil attack?
A Sybil attack is a kind of security threat on an online system where one person tries to take over the network by creating multiple accounts, nodes or computers.Sybil Attack is a type of attack seen in peer-to-peer networks.
For example, if I were an attacker that create multiple identities nodes surround of your node.I can decide what information you can get or not get and because of this I can make you vulnerable to have double spend.
What I can do is I can buy something from you and then I give you a block that has transaction in it tell where I pay you.You only get my block not the real block from outside and then I and all nodes surround disconnected from your node and after that you connect again with the real node and then realize that transaction never exist.So, basically, I disconnected you from the real bitcoin network.

What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
What cuse sybill attack occur is lack of validation and specific set of rules to the generation of new blocks to propogate in network.
For example, the rules about ability to create a block must be proportional to the total processing power of the Proof of Work mechanism. It means you have to own the computer power required to create a new block, which makes it very difficult and costly for an attacker to do.

refer: https://academy.binance.com/en/articles/sybil-attacks-explained

1 Like
  1. The general idea is to create more (fake) identities in order to influence the network.
  2. Low cost to create multiple identities to for instance appear credible…
1 Like
  1. Its especially working in a pseudonymous system. In a pseudonymous system an attacker could take advantage of that and create as many accounts as he wants to without letting know it know the other parts of the system. He could manipulate the system then in different kind of ways.

  2. The risk reward ration for a sybil attack could be too good. Too much reward and no penalty for the attack for example.

1 Like
  1. One individual creating multiple identities on the same network to gain influence on that network
  2. When it is low cost and/or involves little effort to create multiple identities

1. What is the general idea of a sybil attack?
A Sybil attack consists of an attacker creating many identities to gain influence and subvert the reputation system of a computer network service.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
It is easier for a Sybil attack to take place if the system does not have prevention measures in place. These include a form of identity validation, or economic costs to make it expensive to create multiple identities, personhood validation, or application-specific defenses…

1 Like

A Sybil Attack is when the attacker takes over the network by creating multiple identities, they can act like multiple nodes to control transaction orders which might lead to duble spending for example.

A Sybil attack might occur when it does not include a big cost or resources for the attacker to create multiple identities. Since BTC mining requires lots of computing power, it might not be worthwile for the attacker to have multiple computers to create enough identities.

  • What is the general idea of a sybil attack?
    An attacker assuming a large amount of psudonyms / identities to gain influence of the attacked network.
  • What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    Lack of personhood / 1 to 1 connection between a wallet to a real person / identity may lead to someone gaining a large influence / stake of the network for the person’s own benefit.
  1. The idea is that an adversary creates multiple identities to gain a disproportionately large influence on a computer network service.
  2. The ease at which a single entity can create and simultaneously control multiple identities.
1 Like

a Sybil attack is when one user creates many users under one entity in order to gain a high amount of influence in a network

its very easy and cheap to create identities on most blockchain networks

1 Like

1. What is the general idea of a Sybil attack?
An attacker subverting the service’s reputation system of a computer network creating a large amount of pseudonymous identities using them to gain disproportionately large influence on the network.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a Sybil attack to occur?
The low cost, great ease and anonymity to create identities on the system.

1 Like

1. What is the general idea of a sybil attack?

its a type of an attack on computer network service in which an attacker subverts the service’s reputation system by creating a large number of pseudonymous identities and uses them to gain disproportionately large influence.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

When its easy for a network of computers getting attacked by inserting fake or malicious nodes and creating multiple fake identites to act as adversarial nodes.

1 Like
  1. What is the general idea of a sybil attack?

If someone is running multiple nodes with malicious intentions and someone connects only to those nodes, it is possible that the node operator is not showing me the correct transactions.

  1. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

If I connect to only one node or nodes which are operated by the same operator. The best is to change the nodes regularly.

  1. A Sybil attack is when an entity creates many identities in order to gain a disproportinate amount of influence within a network.
  2. Deficiencies: how easily an entity can create multiple identities with without verification.
  1. The general idea is to create as many false identities by one entity so it could influence the nodes in peer to peer network.
  2. Networks that work on anonymity can allow creating multiple false accounts that can be used by one party to corrupt the network consensus.
1 Like
  1. Forging multiple identities/users to take over votes, reputation systems, node control… Anything that requires large numbers of users to attain.

  2. Lack of ID verification, (Proof-of-person solves that) anonymity, ease of faking multiple identities, low cost…

1 Like

Google maps traffic jam sybil attack :upside_down_face:

https://www.dailydot.com/debug/performance-artist-traffic-jam-google-maps/

2 Likes
  1. a sybil attack occurs when a person creates many digital identities on a network to look bigger and have a bigger influence than what it actually has
  2. a peer-to-peer network might suffer from such attack if there are not enough nodes to ensure safety, in this case the corrupted nodes can outnumber the normal nodes of the network and possibly manipulate data
1 Like