Journal of Xidian University ›› 2021, Vol. 48 ›› Issue (1): 39-49.doi: 10.19665/j.issn1001-2400.2021.01.005

Previous Articles     Next Articles

Overview of Sybil attacks and defenses in the distributed architecture

XU Zhicheng1,2(),LI Xiang1(),MAO Jian1(),LIU Jianwei1(),ZHOU Zhihong2()   

  1. 1. School of Cyber Science and Technology,Beihang University,Beijing 100191,China
    2. Shanghai Key Laboratory of Integrated Administration Technologies for Information Security,Shanghai Jiao Tong University,Shanghai 200240,China
  • Received:2020-08-15 Online:2021-02-20 Published:2021-02-03
  • Contact: Jian MAO E-mail:xuzhicheng@buaa.edu.cn;llllx@buaa.edu.cn;maojian@buaa.edu.cn;liujianwei@buaa.edu.cn;zhouzhihong@sjtu.edu.cn

Abstract:

In recent years,the distributed architecture has been widely used in Internet information services.The distributed architecture usually relies on multiple independent nodes to deal with potential malicious threats.However,for lack of authentication between nodes and for the difficulty of recognizing the identity in the network and the relationship between nodes,it is vulnerable to multiple identity attacks,namely,the Sybil attacks,which destroy the trust relationship between nodes.In this paper,we analyze the Sybil attacks in the distributed architecture and their defense methods.First,we give a brief introduction to attack models of the Sybil attacks in different application scenarios.Then,we discuss common Sybil defenses in distributed architectures,and then emphasize two main Sybil defenses in the social network,a typical and popular distributed architecture.Finally,we prospect the trends of future research on the Sybil attack.

Key words: distributed architecture, sybil attack, social network

CLC Number: 

  • TN915.08

Baidu
map