Sybil Attacks Explained

Beginner
แƒ’แƒแƒ›แƒแƒฅแƒ•แƒ”แƒงแƒœแƒ”แƒ‘แƒฃแƒšแƒ˜ Dec 7, 2018แƒ’แƒแƒœแƒแƒฎแƒšแƒ”แƒ‘แƒฃแƒšแƒ˜ Aug 17, 2023
2m

A Sybil attack is a kind of security threat on an online system where one person tries to take over the network by creating multiple accounts, nodes or computers.

Thisย canย be as simple as one person creating multiple social media accounts.

But in the world of cryptocurrencies, a more relevant example is where somebody runs multiple nodes on a blockchain network.ย 

The word โ€œSybilโ€ in the name comes from a case study about a woman named Sybil Dorsett, who was treated for Dissociative Identity Disorder โ€“ also called Multiple Personality Disorder.


What problems can Sybil attacks cause?

  • Attackers may be able to out-vote the honest nodes on the network if they create enough fake identities (or Sybil identities). They can then refuse to receive or transmit blocks, effectively blocking other users from a network.
  • In really large-scale Sybil attacks, where the attackers manage to control the majority of the network computing power or hash rate, they can carry out a 51% attack. In such cases, they may change the ordering of transactions, and prevent transactions from being confirmed. They may even reverse transactions that they made while in control, which can lead to double spending.ย 

Over the years, computer scientists have dedicated a lot of time and research to figure out how to detect and prevent Sybil attacks, with varying degrees of effectiveness. For now, thereโ€™s no guaranteed defense.


So how do blockchains mitigate Sybil attacks?

Many blockchains use different โ€œconsensus algorithmsโ€ to help defend against Sybil attacks, such as Proof of Work, Proof of Stake, and Delegated Proof of Stake.
These consensus algorithms donโ€™t actually prevent Sybil attacks, they just make it very impractical for an attacker to successfully carry out a Sybil attack.

For example, Bitcoinโ€™s blockchainย applies a specific set of rules to the generation of new blocks.

One of the rules is thatย the ability to create a blockย must be proportional toย the total processing power of the Proof of Work mechanism. That means that you have toย actually ownย the computer power required to create a new block, which makes it very difficult and costly for an attacker to do.ย 

Since mining Bitcoin is so intensive, miners have a very strong incentive to keep mining honestly, instead of attempting a Sybil attack.


Besides Sybil attacks, there are a few other common types of attacks. Stay tuned to Binance Academy for more!

แƒžแƒแƒกแƒขแƒ”แƒ‘แƒ˜แƒก แƒ’แƒแƒ–แƒ˜แƒแƒ แƒ”แƒ‘แƒ
แƒ“แƒแƒ™แƒแƒ•แƒจแƒ˜แƒ แƒ”แƒ‘แƒฃแƒšแƒ˜ แƒกแƒขแƒแƒขแƒ˜แƒ”แƒ‘แƒ˜
A Beginner's Guide to Bitcoin's Lightning Network
A Beginnerโ€™s Guide to Segregated Witness (SegWit)
What Is Proof of Reserves and How it Works on Binance
แƒ“แƒแƒแƒ แƒ”แƒ’แƒ˜แƒกแƒขแƒ แƒ˜แƒ แƒ”แƒ— แƒแƒœแƒ’แƒแƒ แƒ˜แƒจแƒ˜
แƒ—แƒฅแƒ•แƒ”แƒœแƒ˜ แƒชแƒแƒ“แƒœแƒ˜แƒก แƒžแƒ แƒแƒฅแƒขแƒ˜แƒ™แƒแƒจแƒ˜ แƒ’แƒแƒ›แƒแƒกแƒแƒงแƒ”แƒœแƒ”แƒ‘แƒšแƒแƒ“ แƒ’แƒแƒฎแƒกแƒ”แƒœแƒ˜แƒ— Binance-แƒ˜แƒก แƒแƒœแƒ’แƒแƒ แƒ˜แƒจแƒ˜ แƒ“แƒฆแƒ”แƒกแƒ•แƒ”.