Experimental Sybil Identification Method using Graph Deep Learning.
Preprint available on arXiv.
In the preprint, you will find:
- An extensive conceptual analysis of decentralized governance and a theoretical explanation of polycentric governance
- A literature review of DAO research
- An extensive conceptual analysis of Sybils
- Identified threat models for decentralized systems (especially Quadratic Funding/Voting)
- An explanation of decentralized identity systems that attempt to prevent Sybil attacks, and their limitations
- A literature review of deanonymization research on social networks
- An extensive empirical analysis of DAO governance, including:
- A wavelet time series decomposition for behavioural analysis
- A novel "wallet fingerprint" method for identifying unique users (aka Sybils)
- A multi-layer ML model to predict Sybils
- A heirarchical LLM RAG method for automatically generating governance histories of crypto platforms, from Github Issues and Comments
In decentralized governance systems, the presence of sybils poses substantial challenges for accurately measuring user influence, decision-making, and other aspects of community structure. These spurious identities can distort the representation of user roles, creating an inaccurate picture that also makes comparisons with other Online Communities literature problematic. This research seeks to address this challenge by developing a graph deep learning method tested against a popular DAO governance forum Snapshot.org. Specifically, the method involves a Graph Convolutional Neural Net (GCNN) with multiple engineered feature layers that learn vector node embeddings from a voting graph to construct a “similarity” subgraph, where similar nodes are identified using a fast vector search algorithm (Facebook AI Similarity Search, aka FAISS) and relabelled into clusters. The similarity graph is then reduced by combining predicted sybils.
For inquiries, please contact quinndupont AT ieee.org
See the preprint for details arXiv.
Forensic investigation of Wallet Fingerprint Vector Embeddings for Anonymous DAO Voters
Download Interactive 2D Plot of Clustered Anonymous Voters for Ten DAOs
Clustered (HDBSCAN) Wallet Fingerprints for Anonymous DAO Voters
Download Interactive 2D Plot of Anonymous Voters for Ten DAOs
Unfortunately, these large interactive HTML files do not display in Github. Download the HTML file and open in your browser to view the Bokeh plot locally.
aave.mp4
We are pleased to have received a $15,000 grant in Covalent API credits and 12 months of Premium access which will allow us to continue our sybil research. We will continue to experiment with graph walking methods in an attempt to find direct validation methods for sybils. In our preliminary research, we used the Covalent API to e.g., determine the cost to buy governance proposals:
This research presents a significant and multifaceted contribution to addressing the issue of sybil attacks in decentralized governance systems. At its core, it offers an advanced method for sybil detection, crucial for enhancing the integrity and reliability of such systems. This methodology not only fortifies the security of decentralized networks but also paves the way for more democratic and equitable governance models within the Web3 space.
A key aspect of this project is its open-source nature, which creates a collaborative environment conducive to innovation and continuous improvement. This approach not only speeds up the advancement of sybil detection technologies but also nurtures a sense of transparency and trust among community members.
Moreover, the implications of this research extend beyond immediate technical applications. It holds the potential to shape future policies and practices in digital governance, particularly in the realm of digital identity verification, far beyond the confines of blockchain technology.
Practical applications of this method are vast. Social scientists and DAO researchers will find it invaluable for generating more precise evaluations of decentralized voting and governance. Additionally, system designers can leverage this method to transform graph signals for more effective modelling. Infrastructure engineers, too, stand to benefit, as they can develop and deploy automated, online versions of this method for proactive sybil defense—a significant step forward given the current gap between today’s sybil defense mechanisms and the advancements in deep learning and artificial intelligence that have emerged recently and are utilized by this method.
The method itself employs a multilayered, high-dimensional graph convolutional neural network (GCNN) alongside a rapid vector embeddings search and label propagation technique. This inductive, highly parameterized method has been tested extensively with the Snapshot.org dataset, proving its efficacy in identifying, labeling, clustering, and amalgamating sybil nodes using well-established and intuitive deep learning techniques. Although the method has shown promising results (~2-5% graph reduction), it requires further refinement, validation, and feedback from the wider community to reach its full potential. A visualization from the algorithm-in-progress shows the method’s ability to identify sybil nodes, label and combine them, and to construct a sub-graph of “true identities.”
Example of size and distribution of sybil clusters:
Example of graph visualization of clustered graph with predicted sybils:
The foundational research is already complete and the primary methods have been developed. Due to the complex, inductive nature of this research, the experimental results may not validate and the method may prove ultimately unsuccessful in practical settings.
Quinn DuPont’s public financial disclosure regarding crypto is available here: http://iqdupont.com (no investment in crypto).
We would like to thank Donncha Kavanagah (UCD) for early feedback and Covalent for sponsorship.