Sybil Attack is an online network security system threat in which an individual attempts to create multiple account identities.

Multiple nodes or computer coordinates to control the network.

It's the same principle as creating multiple personal social media accounts - simple.

This has relevant implications in the cryptocurrency world. Just think of what would happen if someone attempted to put multiple nodes on a blockchain network.

The word "Sybil" comes from the case of a woman named Sybil Dorsett who was diagnosed with "multiple personality disorder".


What problems can Sybil attacks cause?

If an attacker creates enough fake identities (or Sybil identities), they can defeat the real nodes on the network with a majority vote.

In this case, they can then refuse to receive or transmit blocks, effectively preventing other users from entering the network.

In a relatively large-scale Sybil attack, the premise is that when attackers control most of the computer network or hash rate, they can conduct an attack covering 51% of the system. In this case, they can easily change the order of transactions and prevent them from being confirmed. They can even take over and reverse transactions, causing double-spending issues.

Over the years, computer scientists have devoted a lot of time to studying how to detect and prevent Sybil attacks. Each study has varying degrees of effectiveness, but there is still no guarantee of a perfect prevention solution.


So how does blockchain mitigate Sybil attacks?

Many blockchains use different "consensus algorithms" to help resist Sybil attacks, such as Proof of Work, Proof of Stake, and

Proof of entrustment. These consensus algorithms are not actually effective against Sybil attacks, they just make the attacker's attempts to execute successful

difficult and thus impractical.

For example, the Bitcoin blockchain applies a specific set of rules for the generation of new blocks.

One of the rules is that if you want to have the ability to create blocks, your total mechanism processing power must be proportional to the ability to submit proof of work. This means that you must have the computer power required to create a new block, which is very costly and difficult for an attacker to do.

However, due to the intense intensity of Bitcoin mining and the motivation for high returns, miners are keen on legitimate mining methods.

without attempting a Sybil attack.

In fact, in addition to Sybil attacks, there are other common types of attacks.

If you want to know more, please continue to pay attention to more information about Binance Academy!