Sybil Attack - Reading Assignment

  1. What is the general idea of a sybil attack?

General idea of a sybil attack is subversion of the network service reputation system by creating multiple identities and using them to gain a disproportionately large influence.

  1. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

„A reputation system’s vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically. „ In regards to cryptocurrencies, sybil attack is a security threat if somebody runs multiple nodes on a blockchain network.

1 Like
  1. Someone creates many identities to flood and confuse the network and get more influence.
  2. The attack method is cheap and simple in a system of voting.
1 Like
  1. In general, a sybil attack is controlling enough of a network to be able to control who sees what information.
  2. The deficiencies in a cryptocurrency network that can allow sybil attacks is the way that all nodes communicate. Since there is no way to see who operates a node, one node cannot tell who to trust for broadcasting accurate transactions or blocks.
1 Like
  1. The general idea of a Sybil attack is to use as many identities as possible to corrupt the target which could be a network or community.

  2. There are different types of deficiencies within a system such as a cryptocurrency network that can allow a Sybil attack to occur for example a voting system which uses accounts without proof of a unique identity or there are low requirements (easy, low cost) to create as many identities as possible.

1 Like
  1. One subversive entity posing as many to overwhelm a system
  2. Susceptibility of an attacked system is proportional to its knowledge of the identity of incoming requests, (chain of trust) whether or not the system treats all access requests as equal and the amount of effort or cost required to create the attacking multitude of entities.
1 Like
  1. What is the general idea of a sybil attack?
    The idea is to use many identities for a single entity which can allow that entity to have much more influence than it should on a P2P network.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    The inability to identify or validate users in a network makes easier for sybil attacks to occur because they rely on the network treating their new multiple identities the same as every other identity.

1 Like

By creating many identities that pretend to be someone or something to gain access to the various levels of a system and its resources (depending on the system). A today real-world example would be bots that have been released into the social media world that attempt to influence the “real” users of the systems.

Being an anonymous system there are no real identities only linkages to an identity of a source.

1 Like
  1. What is the general idea of a sybil attack?
    Ans: one attacker infiltrates an entire network by creating multiple fake identities to act as adversarial nodes
  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    Ans: when a network of computers is attacked by inserting fake or malicious nodes.on crypto networks much harder. This is because the cost of the attack makes it impractical.A cost is involved transferring cryptocurrencies - Gas fees on Ethereum.Sybil attack can do on a network is insert easily detected fake data, blocks containing bad information.
1 Like

To disrupt a Peer 2 Peer Network by pretending to be another identity and creating more than one Account to increase the influence on the network / community.

To less changing Peers and to less Proof / Consensus.

1 Like
  1. What is the general idea of a sybil attack?
    It’s a kind of security threat on an online system where one person tries to take over the network by creating multiple accounts, nodes or computers.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    If an online network lacks consensus algorithms (Proof of Work, PoS, DPoS and so on) then one could potentially exploit Sybil attack by creating multiple identities to gain more influence in the network.

1 Like
  1. Using fake corrupted users the system is influenced to make decisions.

  2. False users voting because of no proof of identity.

1 Like

To create multiple identities in order to subvert the reputation system of a network

Some cryptocurrencies uses voting system for their governance , a sybil attack could be used to gain power to then highly influence the decisions of the governance.

1 Like

1. What is the general idea of a sybil attack?
One entity creates many identities to gain more influence.
2.What deficiencies within a system(such as a crypocurrency network) can allow a sybil attack to occur?
When it’s easy to create multiple identities.

1 Like

1. What is the general idea of a sybil attack?

One entity (an ‘attacker’) may adopt multiple identities in order to gain a disproportionate control
or influence over - and/or disrupt - the regular functioning of a networked system.

As an example: if 1 entity has 1 identity which = 1 vote,
1 nefarious entity may setup multiple (xx) identities to yield = multiple (xx) votes.

1 single entity with multiple identities and multiple votes,
thereby gains unfair advantage over other single entities who only have a single vote.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

A cryptocurrency network is typically decentralized, so lack of a centralized (central) figure of Authority
to perform proper authentication and verification of identities could lead to this sort of attack.

However, authentication systems such as Proof of Work / Proof of Stake, etc., can both assert
the entity=identity issue, as well as make it too expensive-prohibitive to setup &/or maintain
mutliple entity-identities.

1 Like

1)One person controlling many identities interacting with p2p network.
2)The p2p structure itself creates a situation where more than one identity can correspond to one entity.

1 Like
  1. What is the general idea of a sybil attack? The attackers create multiple identities to trick a reputation system in believing that that the different false identities are separate when in reality they are part of the same entity. This allows the attacker to influence the system without other users realising what is going on.
  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur? The desire for anonymity and the absence of a single authorising body.
1 Like
  1. A Sybil attack is where a bad actor pretends to be many identities to gain a disproportionate influence over the network.
  2. If it was easy, fast and inexpensive to create multiple accounts this would allow a Sybil attack to be made for lower effort/cost.
1 Like
  1. What is the general idea of a sybil attack?
    TO create multiple accounts and gain influence in the peer to peer protocol…

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    very possible but very expensive in the POW of bitcoin…

1 Like

1)For a single entity to create as much identities as possible to gain influence in that network.
2) If an entity has unlimited funds, it could create multiples unidentified entities to control the nodes voting on the peer to peer system

1 Like

1 The general idea of Sybil attack in computer security is to create several identities in a peer to peer network with the intent to control the nodes in the network
2 Due to large amount of money in order to control many nodes on the network to control the voting system and do malicious things

1 Like