西安电子科技大学学报 ›› 2021, Vol. 48 ›› Issue (1): 39-49.doi: 10.19665/j.issn1001-2400.2021.01.005

• • 上一篇    下一篇

分布式架构中的Sybil攻击及防御综述

徐智诚1,2(),李响1(),毛剑1(),刘建伟1(),周志洪2()   

  1. 1.北京航空航天大学 网络空间安全学院,北京 100191
    2.上海交通大学 上海市信息安全综合管理技术研究重点实验室,上海 200240
  • 收稿日期:2020-08-15 出版日期:2021-02-20 发布日期:2021-02-03
  • 通讯作者: 毛剑
  • 作者简介:徐智诚(1996—),男,北京航空航天大学硕士研究生,E-mail: xuzhicheng@buaa.edu.cn|李 响(1996—),女,北京航空航天大学硕士研究生,E-mail: llllx@buaa.edu.cn|刘建伟(1964—),男,教授,博士, E-mail: liujianwei@buaa.edu.cn|周志洪(1979—),男,讲师,博士, E-mail: zhouzhihong@sjtu.edu.cn
  • 基金资助:
    国家重点研发项目(2017YFB0802403);国家自然科学基金(U173315);国家自然科学基金(61571010);国家自然科学基金(61871023);北京市自然科学基金(4202036);上海市信息安全综合管理技术研究重点实验室开放课题(AGK2019001)

Overview of Sybil attacks and defenses in the distributed architecture

XU Zhicheng1,2(),LI Xiang1(),MAO Jian1(),LIU Jianwei1(),ZHOU Zhihong2()   

  1. 1. School of Cyber Science and Technology,Beihang University,Beijing 100191,China
    2. Shanghai Key Laboratory of Integrated Administration Technologies for Information Security,Shanghai Jiao Tong University,Shanghai 200240,China
  • Received:2020-08-15 Online:2021-02-20 Published:2021-02-03
  • Contact: Jian MAO

摘要:

近年来,分布式架构在互联网信息服务中的应用越来越广泛。分布式架构通常依靠多个独立节点应对潜在的恶意威胁,但是由于节点间缺乏认证,识别网络中的身份和节点的关系较困难,容易受到多重身份攻击,即Sybil攻击,这破坏了节点间的信任关系。对分布式架构中的Sybil攻击及其防御方法进行分析研究。首先,梳理了不同应用场景下Sybil攻击的攻击模型;然后,讨论了不同场景下常用的Sybil防御方法,总结了社交网络这一典型的分布式架构中两类不同的检测机制;最后,对Sybil攻击未来的研究趋势进行了展望。

关键词: 分布式架构, Sybil攻击, 社交网络

Abstract:

In recent years,the distributed architecture has been widely used in Internet information services.The distributed architecture usually relies on multiple independent nodes to deal with potential malicious threats.However,for lack of authentication between nodes and for the difficulty of recognizing the identity in the network and the relationship between nodes,it is vulnerable to multiple identity attacks,namely,the Sybil attacks,which destroy the trust relationship between nodes.In this paper,we analyze the Sybil attacks in the distributed architecture and their defense methods.First,we give a brief introduction to attack models of the Sybil attacks in different application scenarios.Then,we discuss common Sybil defenses in distributed architectures,and then emphasize two main Sybil defenses in the social network,a typical and popular distributed architecture.Finally,we prospect the trends of future research on the Sybil attack.

Key words: distributed architecture, sybil attack, social network

中图分类号: 

  • TN915.08