翻訳と辞書
Words near each other
・ Sybertooth
・ Sybertsville, Pennsylvania
・ Sybi Hida
・ Sybian
・ Sybil (1921 film)
・ Sybil (1976 film)
・ Sybil (2007 film)
・ Sybil (album)
・ Sybil (book)
・ Sybil (cat)
・ Sybil (novel)
・ Sybil (singer)
・ Sybil (wife of Pain fitzJohn)
・ Sybil Andrews
・ Sybil Arundale
Sybil attack
・ Sybil Atteck
・ Sybil Audrey Marie Lupp
・ Sybil B. G. Eysenck
・ Sybil Bauer
・ Sybil Bennett
・ Sybil Brand
・ Sybil Brand Institute
・ Sybil C. Mobley
・ Sybil Campbell
・ Sybil Christopher
・ Sybil Claiborne
・ Sybil Connolly
・ Sybil Danning
・ Sybil Dorsett


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Sybil attack : ウィキペディア英語版
Sybil attack
The Sybil attack in computer security is an attack wherein a reputation system is subverted by forging identities in peer-to-peer networks. It is named after the subject of the book ''Sybil'', a case study of a woman diagnosed with dissociative identity disorder.〔http://www.npr.org/2011/10/20/141514464/real-sybil-admits-multiple-personalities-were-fake〕 The name was suggested in or before 2002 by Brian Zill at Microsoft Research. The term "pseudospoofing" had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".
==Description==

In a Sybil attack the attacker subverts the reputation system of a peer-to-peer network by creating a large number of pseudonymous identities, using them to gain a disproportionately large influence. A reputation system's vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically. Evidence shows large-scale Sybil attack can be carried out in a very cheap and efficient way in realistic systems like BitTorrent Mainline DHT.
An ''entity'' on a peer-to-peer network is a piece of software which has access to local resources. An entity advertises itself on the peer-to-peer network by presenting an ''identity''. More than one identity can correspond to a single entity. In other words, the mapping of identities to entities is many to one. Entities in peer-to-peer networks use multiple identities for purposes of redundancy, resource sharing, reliability and integrity. In peer-to-peer networks, the identity is used as an abstraction so that a remote entity can be aware of identities without necessarily knowing the correspondence of identities to local entities. By default, each distinct identity is usually assumed to correspond to a distinct local entity. In reality many identities may correspond to the same local entity.
A faulty node or an adversary may present multiple identities to a peer-to-peer network in order to appear and function as multiple distinct nodes. After becoming part of the peer-to-peer network, the adversary may then overhear communications or act maliciously. By masquerading and presenting multiple identities, the adversary can control the network substantially.
In the context of (human) online communities, such multiple identities are known as sockpuppets.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Sybil attack」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.