Sybil Attack - Reading Assignment

  1. where one person create multiple identities to disrupt the influence of a peer to peer network
  2. the process of which nodes are being added to the block because it works on a mojority vote
  1. Creation of many fake identities by someone to conquer majority.
  2. Ease creation of new and multiple accounts in the network, one example could be the creation of multiple nodes to acquire monopoly of the verification process of transactions although this is unlikely to actually happen.
  1. One identity (or several) can pose as many identities, and like this they can gain influence in a network

2.Sybil attacks should be a problem in blockchain networks because blockchain networks depend on having influence divided between users

(i am not sure about this but i’ve heard of that 51% issue with blockchain technology and thought that influence = computing power so having 1 computer imitate several identities shouldn’t be such a big problem)

  1. to generate several IDs and affect the P2P network regarding performance, votes or communications
  2. a problem might be a voting system or a POS system (if stakes are very cheap) - the more votes or stakes you have the more you can influence the system. I think in a POW and POS system it could be very expensive to attack the network. Depending on how large the network already is
  1. What is the general idea of a sybil attack?
    A user creates many identities to gain disproportionately big influence.
  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    If it’s cheap to create several identities (compared to the benefit of disproportionately big influence).
1 Like
  1. One entity creating many identities to make it appear that they have more influence than in reality. Like fake accounts all agreeing with each other on social media.
  2. If it’s cheap to generate multiple identities, an entity could carry out a sybil attack, for example, during voting on a proposed upgrade
1 Like
  1. One can have multiple identities and thus influence the P2P network.
  2. New identities can be created easily.
1 Like

where an attacker is creating multiple identities to gain influence
when a network uses redundancy to secure the network

2 Likes

Sybil attacks refer to a vulnerability in networks, for example peer to peer networks where one entity attempts to gain influence over the network by creating many identities.
A crypto currency network becomes more vulnerable to this kind of attack if there is not a central entity that is validating identites

1 Like
  1. What is the general idea of a sybil attack?
    - the idea is that single attacker can present himself with multiple identities or agent creation itself is very cheap, so an attacker can spawn multiple agents, which he controls and use in order to achieve advantage in p2p/decentralized networks

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    - if a system does not verify identities or doesnt require some form of proof then it will be easy for an attacker to spawn multiple identities/agents and to use them in order to increase his influence.
    Having proof of work for example doesn’t mitigate the Sybil attack entirely, but at least makes it expensive.

1 Like
  1. What is the general idea of a sybil attack?
    To undergo a peer to peer system by creating a lot of “fake” identities which seem to be legdit and give the attacker influence.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    If it is very easy or cheap to create false identities. In a good network like BTC it would be expensive to have a certain amount on influence due to size and POW.

2 Likes

What is the general idea of a sybil attack?
Someone try to take over nodes in the network by using multiple identities.
What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
A bad consensus algorithm or not enough nodes not enough decentralization. 51% attack possible

2 Likes

1 Idea of sybil attack is then you can easily create new identities and take over the influence in the network.
2 The deficiencies in a state that allow a Sybill attack are the cost / effort to create identities and the amount influence allowed by entitled without a trust score.

2 Likes
  1. The main idea is to create a large number of fake ID & using them to subvert the system. As in voting on a system change, using those fake ID’s in favor of a change you want.

  2. Having anonymity is the problem in the case of cryptocurrencies. Having a 1 to 1 check for each entity might mitigate this problem, with the sacrifice of being anonymous.

1 Like
  1. is when an attacker is creating multiple identities to gain influences
  2. when a network uses redundancy to secure itself
1 Like
  1. What is the general idea of a sybil attack?
    It is an attack where attacker have created numerous identities to cast voting or other type influence in network.If attacker holds crucial amount of fake accounts then he or she can manipulate network toward attackers favor.
  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

However, blockchains are not immune to Sybil attacks, and they can undermine reputation scores. “Anyone can create unlimited accounts to prop each other and their reputation scores up”, Hon explains.

“With the support from these bad actors, the influence attributed to a single entity can be blown out of proportion, and this, in turn, allows that entity to manipulate data, and release fake news that appears credible”.

Really good article about Sybil attack: https://coinrivet.com/how-a-sybil-attack-can-infiltrate-peer-to-peer-networks/

1 Like
  1. An entity creates multiple identities in a peer to peer network and attempts to gain the majority of influence to carry out actions contrary to the rules of the network.

  2. Systems are susceptible to Sybil attacks if all identities have the same authority, it is cheap to generate identities or there is little or no validation of identities.

1 Like
  1. The Sybil attack in is an attack wherein a reputation system is subverted by creating multiple identities. A reputation system’s vulnerability to a Sybil attack depends on how cheaply identities can be generated. (Wikipedija)
  2. A singel entity can creating more than one identity. In a proof of stake system could someone creating multiply identity and have more stakes and then had more power on the network.
2 Likes
  1. Generally, a sybil attack occurs when one person creates multiple pseudonym identities in the network to exploit its reputation system.
  2. One entity can hijack the network by creating many identities that have voting power. This can be somewhat prevented by POW or POS.
1 Like
  1. What is the general idea of a sybil attack?

The general idea is, in a peer to peer network, for a single perpetrator to create many identities (this is also called sockpuppetry) to gain a lot of influence and e.g. affect voting.

E.g. in an online photo contest, a dishonest participant may create many fake accounts to vote for his photo and win the contest.

  1. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
  • lack central authentication to avoid anonyimity
  • easy to create new identities
  • cheap to create new identities (e.g. lack of proof of work: some blockchains use PoS - proof of stake)
1 Like