What is Sybil attack?
Sybil attack is an attack by a computer hacker on the Peer-to-peer (P2P) network. It is named after the novel Sybil , which tells a medical treatment of a woman with an extremely dissociative identity disorder. The attack focuses on the P2P reputation system and allows Hacker to have an unfair advantage in influencing the reputation and scores of files stored in the P2P network. Several factors determine how bad the attack can be Sybil, such as whether all entities can equally affect the reputation system, how easy it is to create an entity and whether the program receives undoubted entities and their entry. Verification of accounts is the best way to prevent administrators from preventing these attacks, but this sacrifices the anonymity of users.
There is a component known as a reputation system in the P2P network. This system is responsible for the evaluation, opinions and scores for files, service providers and anything else in the network of P2P Network. It allows other users to know whether they are useful or being handed over. By inflating the score with dangerous or worthless eNtits seem useful and can cause visitors to be cheated in download or use of entity. Hacker initiates Sybil attack to achieve this goal.
Sybil attack includes a hacker that creates a huge amount of entities or accounts. This allows the hacker to inflate the reputation of the subject by voting hundreds or thousands - or more - time until other members trust the subject. In this scenario, the hacker will be able to control the effect of almost all entities on the P2P network by voting up or down, and it can allow the hacker to get additional entities thrown out of the P2P network.
How much effect will the Sybil attack depend on the P2P network settings. If all entities, regardless of their reputation, can affect other enthusiasm as it allows hacker to be more efficient. If the accounts are easily created and require little information, the hacker is able to quickly collect a large number of accounts. If it isSomeone is new or finds that it is an undeveloped entity, but its input is still considered a reputation system, the attacker can continue to influence the system if the accounts are not removed from the system.
The most effective way to deal with the attack Sybil is for the administrator to start verification techniques and ensure that people own only one entity or account. This causes new users to send sensitive information or forces it to reveal information about themselves that some users can be invasion of privacy. This lack of anonymity may make some users want to connect to the P2P network, but prevents Sybil from attacking.