Sybil Attack - Reading Assignment

  1. What is the general idea of a sybil attack?
    Is one person/entity who creates many multiple identities in order to overpower and become the majority.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    One identity can create so many nodes to become >50% than the community, and when it has conquered >50% they can drive the nature of transactions that are happening on the nodes (validation, double spending, etc.). Though PoW has made this difficult to achieve due to the equipments and electricity needed to participate.

1 Like
  1. What is the general idea of a sybil attack?
    One person having many identities.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    I think at least for a crypto network, if one person is able to override the real nodes with his or her own, but in most cases, that would be very expensive

  1. One person can make multiple identities–enough to gain influence within a network.
  2. Some network deficiencies that could allow this to happen are: anonymous identities, voting power, cheap identity creation.
1 Like
  1. Identity spoofing.
  2. can create multiple identity(accounts).
  1. What is the general idea of a sybil attack?
    abusing a reputation system through making lots of fake accounts

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

the ability to create cheap unchecked accounts

1 Like
  1. It’s an attack in which the reputation system is subverted by creating multiple identities to masquerade as legitimate users.
  2. The peer-to-peer aspect of nodes that verify the bitcoin network can be subverted by an attack like this and change network voting outcomes.
1 Like
  1. A Sybil attack is carried out by introducing a significant number of new nodes to the network that will act maliciously in tandem, thereby thwarting consensus mechanisms by which dishonest nodes usually are punished or excluded.

  2. Some deficiencies might be lack of identity validation, affordable costs to carrying out such an attack, all nodes being equally trusted.

1 Like
  1. An individual creating multiple identities in a peer-to-peer network and thus seeming like many individuals in this network, thus increasing their influence in this network.

  2. It is easy to create new identities.

1 Like

1. What is the general idea of a sybil attack?
The main idea of a malicious actor performing a Sybil attack is gaining a disproportionately large influence on a network. It can be achieved by creating a big number of pseudonymous identities.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
The malicious actor can make you connect only to attacker nodes. Additionally, completely isolating a node from the honest network can be helpful in the execution of other attacks.

1 Like
  1. What is the general idea of a sybil attack?
    A sybil attack happens when an attacker creates a huge amount of pseudonymous identities in a network and uses them to gain disproportionately large influence on the network.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    Sybil attack in a network could occur if the network does not have adequate identity validation that mandates one-to-one relationship between network identity and user, or higher enough economic costs (e.g., proof of work) in creating identities, or adequate personhood validation where an unidentified user’s physical presence at a particular place and time is verified.

1 Like
  1. Where lots of fake and cheap identities are used to gain influence in a p2p network
  2. in networks where funds, resources or influence is limited per user, a sybil attack could gain more of these resources for the 1 person than is usually allowed. If it was a voting system for example the person behind the sybil attack would get more votes than normally allowed. an NFT that only allows one mint per user could mint multiple etc
1 Like

1.A sybil attack aims to create a large number of pseudonymous identities and uses them to gain a disproportionately large influence.
2. When you have a network that depends on a voting system, the more identities you can have in the network, the more votes you can cast and the more influence you have inside that network.

1 Like
  1. What is the general idea of a sybil attack?

The general idea of a Sybil attack is a large number of pseudonymous identities are used to gain a disproportionally large influence in order to for example control a network or affect voting outcomes.

  1. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

The deficiencies within a cryptocurrency network that can allow a sybil attack to occur are the unlimited and relative simplicity of creating new users in the network as well as its anonymous nature, which prevents proving each unique identity.

1 Like
  1. What is the general idea of a Sybil attack? Someone uses multiple pseudonymous identities to influence a node or nodes.
  2. What deficiencies within a system (such as a cryptocurrency network) can allow a Sybil attack to occur? The ability to control multiple nodes using different identities.
1 Like
  1. The use of several identities of a single entity to overthrow a peer-peer network on entities to gain disproportional influence over the network.
  2. A system where multiple identities can be created and allowed to participate in a peer-peer network.
1 Like

1.) The general idea of a sybil attack is that an attacker can steal a network’s reputation service by creating a large number of identities and using them to gain access to many identity proxies. A lot of peers in these networks also don’t have immediate access to these required identity proxies (such as those who don’t have a mobile phone or credit card) and thus share the same IP address as many other peers, making it easier for an attacker to steal many more users’ data.
2.) Deficiencies within a system that can allow a sybil attack to occur include identity-based validation (which provide limited anonymity among peers) and an attacker having the ability to present multiple identities in a peer-to-peer network.

1 Like
  1. One person controlling many identities on a peer to peer network with a voting system in order to controll the nodes.

  2. A ledger that relies on a voting system, in which a certain procentage of nodes has to validate the TX to add it to the blockchain.

1 Like
  1. A Sybil attack is a type of attack on computer network service with weak chain of trust between entities in network where the attacker subverts the reputation of the service by creating pseudonymous identities and uses them to gain substantial influence in the network.

  2. Deficiencies within a system (like a peer-to-peer network in cryptocurrencies) such as anonymity of nodes and a low barrier to entry can allow for a Sybil attack.
    Thankfully, in Bitcoin PoW imposes economic costs and make a Sybil attack too expensive.

1 Like
  1. A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service’s reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence.

  2. As of 2012, evidence showed that large-scale Sybil attacks could be carried out in a very cheap and efficient way in extant realistic systems such as BitTorrent Mainline DHT.

1 Like
  1. What is the general idea of a sybil attack?

The Sybil attack in computer security is an attack wherein a reputation system is subverted by creating multiple identities.[4] A reputation system’s vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically. As of 2012, evidence showed that large-scale Sybil attacks could be carried out in a very cheap and efficient way in extant realistic systems such as BitTorrent Mainline DHT.

  1. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

When a user can create multiple identity. There is no mechanism who make sure that one person create more than one identity.