Detection and Mitigation of Sybil Attack in Peer-to-peer Network

Full Text (PDF, 411KB), PP.56-63

Views: 0 Downloads: 0

Author(s)

Arpita M. Bhise 1,* Shailesh D. Kamble 1

1. Yeshawantrao Chavan College of Engineering/Department of Computer Science and Engineering, Nagpur, 441110, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.09.08

Received: 15 Jan. 2016 / Revised: 25 Mar. 2016 / Accepted: 8 May 2016 / Published: 8 Sep. 2016

Index Terms

Peer-to-peer networks, Sybil attack, Sybil detection scheme, Sybil mitigation scheme, Sybil detection rate, false positive rate

Abstract

Peer-to-peer networks are widely used today. Due to this wide use, they are the target of many attackers. The most mentionable of them is the Sybil attack. This is an attack in which it creates many fake identities. In this paper, the detection scheme and efficient mitigation mechanism to counteract Sybil attack in the peer-to-peer network is proposed. The proposed Sybil detection scheme is used to detect Sybil attack. The detection of Sybil attack is depending upon the behavior of the packets. The identity and the location of the packet are checked. If the location and identity of the packet are changed than that of the mentioned, the packet is detected as a Sybil attack. Sybil mitigation scheme is the combination of cost incurred method and certified authentication method. The Sybil packet will be removed by closing read/write operations. The proposed scheme is evaluated on the basis of detection rate and false positive rate. The experimental results show that Sybil attack is accurately detected by the proposed system in terms of low false positive rate and high detection rate. Moreover, the proposed system works efficiently in terms of Sybil detection rate and false positive rate.

Cite This Paper

Arpita M. Bhise, Shailesh D. Kamble, "Detection and Mitigation of Sybil Attack in Peer-to-peer Network", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.9, pp.56-63 2016.DOI:10.5815/ijcnis.2016.09.08

Reference

[1]G. Wang, F. Musau, S. Guo and M. B. Abdullahi,“Neighbor Similarity Trust against Sybil Attack in P2P E- Commerce”, IEEE Transaction on Parallel & Distributed Systems, vol. 26, no. 3, pp. 824-833, Mar 2015.
[2]Lin Cai and Roberto Rojas-Cessa, “Containing Sybil Attacks on Trust Management Schemes for Peer-to-Peer Networks”, International Conference on Communication (ICC), 2014, pp. 841-846. IEEE.
[3]W. Wei, F. Xu, C. C. Tan and Q. Li, "SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 12, pp. 2492-2502, Dec 2013.
[4]N. Z. Gong, M. Frank and P. Mittal, "SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection," IEEE Transactions on Information Forensics and Security, vol. 9, no. 6, pp. 976-987, Jun 2014.
[5]J. Xue, Z. Yang, X. Yang, X. Wang, L. Chen and Y. Dai, "VoteTrust: Leveraging friend invitation graph to defend against social network Sybils," INFOCOM, 2013 Proceedings IEEE, Turin, 2013, pp. 2400-2408.
[6]P. Liu, X. Wang, X. Che, Z. Chen and Y. Gu, "Defense against sybil attacks in directed social networks," International Conference on Digital Signal Processing (DSP), 2014, pp. 239-243.
[7]C. Banerjee and S. Saxena, "Sybil node detection in peer-to-peer networks using indirect validation," India Conference (INDICON), 2014, pp. 1-7 .IEEE.
[8]X. Xiang, "A Sybil-resilient Contribution Transaction Protocol," International Conference on Computational Intelligence and Security (CIS), 2011, pp. 690-692.
[9]L. Xiao, L. J. Greenstein, N. B. Mandayam and W. Trappe, "Channel-Based Detection of Sybil Attacks in Wireless Networks," IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 492-503, Sept 2009.
[10]Y. Chen, J. Yang, W. Trappe and R. P. Martin, "Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks," IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2418-2434, Jun 2010.
[11]S. Chang, Y. Qi, H. Zhu, J. Zhao and X. Shen, "Footprint: Detecting Sybil Attacks in Urban Vehicular Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 6, pp. 1103-1114, Jun 2012.
[12]H. Yu, M. Kaminsky, P. B. Gibbons and A. D. Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks," IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 576-589, Jun 2008.
[13]H. Yu, P. B. Gibbons, M. Kaminsky and F. Xiao, "SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks", IEEE/ACM Transactions on Networking, vol. 18, no. 3, pp. 885-898, Jun 2010.
[14]B. S. Jyothi and J. Dharanipragada, "SyMon: Defending large structured P2P systems against Sybil attack," International Conference on Peer-to-Peer Computing, P2P 2009.pp. 21-30. IEEE.
[15]P. V. Kumar and M. Maheshwari, "Prevention of Sybil attack and priority batch verification in VANETs," International Conference on Information Communication and Embedded Systems (ICICES), 2014, pp. 1-5.
[16]X. Liang, X. Lin and X. S. Shen, "Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks," in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 310-320, Feb 2014.
[17]N. Tran, J. Li, L. Subramanian and S. S. M. Chow, "Optimal Sybil-resilient node admission control," Proc. in INFOCOM, 2011, pp. 3218-3226. IEEE.
[18]S. Sinha, A. Paul and S. Pal, "The sybil attack in Mobile Adhoc Network: Analysis and detection," International Conference on Computational Intelligence and Information Technology, (CIIT) 2013, pp. 458-466.
[19]J. Newsome, E. Shi, D. Song and A. Perrig, "The Sybil attack in sensor networks: analysis & defenses," Information Processing in Sensor Networks, IPSN 2004, pp. 259-268.
[20]M. Demirbas and Youngwhan Song, "An RSSI-based scheme for sybil attack detection in wireless sensor networks," International conference on World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2006, pp. 564 -570.
[21]G. Danezis and P. Mittal, “Sybilinfer: Detecting Sybil nodes using social networks,” NDSS, 2009.
[22]T. Nguyen, L. Jinyang, S. Lakshminarayanan, and S. M. Chow, “Optimal Sybil-resilient peer admission control,” International Conference Computer Communication, 2011, pp. 3218–3226, IEEE.
[23]L. Alvisi, A. Clement, A. Epasto, S. Lattanzi and A. Panconesi, "SoK: The Evolution of Sybil Defense via Social Networks," International Symposium on Security and Privacy (SP), 2013 pp. 382-396. IEEE.
[24]S. Golestani Najafabadi, H. R. Naji and A. Mahani, "Sybil attack Detection: Improving security of WSNs for smart power grid application," Smart Grid Conference (SGC), 2013, pp.273-278.
[25]R. Liu and Y. Wang, "A New Sybil Attack Detection for Wireless Body Sensor Network," International Conference on Computational Intelligence and Security (CIS), 2014, pp.367-370.
[26]V. Palanisamy, P. Annadurai and S. Vijilakshmi, "Curbing and curing sybil attack in ad hoc network," International Conference on Advanced Computing (ICAC), 2009, pp. 1-5.
[27]Q. Zhang, P. Wang, D. S. Reeves and P. Ning, "Defending against Sybil attacks in sensor networks," International Conference on Distributed Computing Systems Workshops, 2005, pp. 185-191.IEEE.
[28]B. Viswanath "Exploring the design space of social network-based Sybil defenses," International Conference on Communication Systems and Networks (COMSNETS), 2012, pp. 1-8.
[29]K. P. N. Puttaswamy, H. Zheng and B. Y. Zhao, "Securing Structured Overlays against Identity Attacks," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 10, pp. 1487-1498,2009.
[30]J. R. Douceur. “The Sybil attack.” IPTPS, Mar 2002.
[31]A. Bhise and S. D. Kamble, “Review on detection and mitigation of Sybil attack in the network”, International conference on Information Security and Privacy (ICISP), Dec. 2015.
[32]Mandeep Kaur, Manish Mahajan,"Movement Abnormality Evaluation Model in the Partially Centralized VANETs for Prevention Against Sybil Attack", IJMECS, vol.7, no.11, pp.20-27.
[33]Bibhu, V., Roshan, K., Singh, K. B., & Singh, D. K. Performance Analysis of black hole attack in VANET. International Journal of Computer Network and Information Security (IJCNIS), vol.4, no.11, pp.47-54, 2012.
[34]Joe, M. M., Shaji, R. S., & Kumar, K. A. Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers. International Journal of Computer Network and Information Security (IJCNIS), vol. 5, no. 8, 55, 2012.