Sybil Attack - Reading Assignment

  1. What is the general idea of a sybil attack? An entity that creates multiple identities to disrupt or gain influence to a peer to peer network.
  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur? The creation of multiple identities for free or very inexpensive.
    Easy to create multiple identities.
1 Like
  1. Many identities come from one taking over a peer-to-peer network. It depends on how cheaply these entities can be generated to a degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity.
  2. Generating many wallet addresses because it’s not costly.
  1. What is the general idea of a sybil attack?
    to subvert the identity or multiple identities to fake access or requests anything in peer to peer network making the apps or services unavailable
  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    not allowing to verify the peer with signature key - or using aVPN, in proof of work like bitcoin the requirement to mine the hash and spent energy to run computational process may be costly to to run a sybil attack.
1 Like

1.one identity posing as multiple identities attacking the network
2.identities creating more identities without a voting network to then have more say in what happens

1 Like

What is the general idea of a sybil attack?

This attack consists in trumping a reputation-based system with the use of a large number of fake entities .

What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

In the case of Bitcoin, an honest node could be surrounded with attacker nodes masquerading as ordinary nodes. A double-spend attack would be then be possible if the attacker nodes:

  • relay to the attacked node only blocks that they create
  • filter out certain transactions is the case where attacked node relies on zero confirmation
1 Like
  1. What is the general idea of a sybil attack?
    When one identity gives the illusion of many separate identities in order to appear and function with multiple distinct nodes. This gives that one identity excess control over the network

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur? The ability for one entity to create multiple different identities without being detected. This can be especially problematic within governance blockchains that have voting rights given if there are no checks & balances on this.

1 Like
  1. Disruption of a P2P network

  2. Creating new identities is easy

1 Like

1.) The network forwards information. The sybil attack tries to make false information appear trustworthy to the network algorithm, by creating a number of identities in the network, which forward the same false information to the target of the attack.
2.) On the most basic level, when everybody can create identities without incurred cost. That should not be the case with cryptocurrncies at all. So the real question is, if the prevention mechanism (e.g. proof of work) is strong enough, incurring high cost to a sybil attack, such that the attack is not worth it. Also the steady change of communication partner identities protects against a sybil attack, because the probability, that the target of the attack only communicates with false entities becomes minuscule.

1 Like

1. What is the general idea of a sybil attack?
when an entity creates multiple identities to gain control or influence of a P2P system.
An example could be if an entity creates multiple nodes targeting a specific region or node to fool the target into thinking it has the latest data or information but it doesn’t.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
If the targeted node is only getting its data/info from neighbors within a certain geo region, or if the targeted node is not reaching out to enough different nodes within different regions to verify it has the most accurate data/info. The more nodes the targeted node reaches out to verify data/info, the less likelihood of the attack happening.

1 Like
  1. What is the general idea of a sybil attack?

A single organization or person appears to be may identities to guide outcomes.

  1. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

Anonymous users and the ability to create many id’s or addresses.

1 Like
  1. What is the general idea of a sybil attack?

A//nThe general idea of a sybil attack is to attack a software creating many identities manipulated by only one entity to generate and gain influence over.

  1. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

A// The efficiency of creating many identities under one entity because of its anonymity and lack of control of this situation .

1 Like

Answer these questions:

  1. What is the general idea of a sybil attack?
    A sybil attack is one which generates large number of pseudonymous identities and uses them to gain a disproportionately large influence, like a disproportionate large representation during voting.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    If the cost to generate a new identity is low, a sybil attack can occur

1 Like
  1. What is the general idea of a sybil attack?
    It’s the concept of a malicious player creating multiple identities on a network, and through these multiple identities the malicious player can gain control over a targeted entity.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    Lack of mitigation techniques such as economic costs via proof of work, identify validation techniques or application specific defenses can make a system very vulnerable. If it is easy and cheap to create multiple identities and little or no mitigation techniques are in place, then it is easy to attack a system.

1 Like
  1. a sybil attack is that one person can create multiple accounts in a p2p network to increase their influence

  2. its easy to create more than one identity

1 Like
  1. What is the general idea of a sybil attack?

A type of attack on a computer [network service] in which an attacker subverts the service’s reputation system by creating a large number of [pseudonymous] identities and uses them to gain a disproportionately large influence.

  1. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

The 2020 Bitcoin address rewrite attacks. The attacker controlled a quarter of all Tor exit relays and employed [SSL stripping] to downgrade secure connections and divert funds to the wallet of the threat actor known as BTCMITM20.

1 Like

Many attacks may be waged against members of the Bitcoin network in order to deceive and ultimately steal products, resources or services by the act of double-spending.

A Sybil attack uses the appearance of a number of computers mimicking independent nodes of the Bitcoin network. The offending node, or entity, uses a number of identities, like multiple personalities, to achieve the goal of its user.

The target computer, relying on these multiple abstracts of identity alone, will believe that it is receiving updates to the Bitcoin ledger from multiple nodes for a period of time. The transaction being made, the aggressor node(s) will sever all links with the target node—the legitimate blockchain revealed/restored from legitimate nodes of the peer-to-peer network, and it will be as if the exchange of Bitcoin never happened.

A lack of identity verification on a peer-to-peer network such as this may be seen as a deficiency; and static reliance on certain nodes for block verification along with the desire to maintain anonymity make Sybil attacks theoretically possible.

  1. A sybil attack is where one person creates multiple accounts resulting in their having more influence on a peer to peer network

  2. If the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity or if the reputation system treats all entities identically they are more susceptible to a sybil attack.

What is the general idea of a sybil attack?

The general idea of a Sybil attack is to create many identities from the same entity for the purpose of controling influence on a network.

What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

The ability to create multiple identities of anonymous addresses is a deficiency within a cryptocurrency network.

  1. One person or entity creating multiple adresses,accounts and trying to act as multiple separate entities for their benefit from the network.

  2. a) In Voting when one perso can act as multiple people to influence network’s/protocol’s decision rate of malicious disrupter’s entity/group to alter in their favour.

b) In staking of certain coin is limited by coins or amount of USDT that can be put in. having multiple adresses can cause one person staking from multiple adresses as many.

  1. an attacker becomes a sufficient number of peers in a transaction to identify the remaining peer.
  2. earlier versions of RING transactions were too low, making it easier and less costly to imitate a peer and essentially removing pseudononimity