Analysis of Malicious Peers in Structured P2P Overlay Networks

被引:0
|
作者
Trifa, Zied [1 ]
Khemakhem, Maher [1 ]
机构
[1] Univ Sfax, Dept Comp Sci, Sfax, Tunisia
关键词
structured P2P systems; security; monitoring; mitigation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The malicious behavior peer has crucial impact on the efficiency and integrity of structured p2p systems. The increasing complexity found in such systems, helps in some part to explain the large scale of the challenge faced in dealing with such problem. In such systems, node trust is often essential. However, the destructive and malicious intent of misbehaving peers is often overlooked, despite being one of the most difficult troubles faced in such systems. In this paper we propose a study of these malicious peers. We use a monitoring process, which involves the placement of few instrumented peers within the network. The goal of the monitoring process is to gather a wide set of metrics on the behavior of a peer. To achieve this, we analyze a large trace of messages and operations in the overlay, which gives an insight on the proprieties and peer behaviors. We focus on the communication protocol between peers. Our measurement infrastructure consists in a set of fake peers called Sybils doted with specific controllers in different level of the system. These Sybils are connected to different zones in the network and controlled by a coordinator.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 128 - 134
  • [2] The exclusion of malicious routing peers in structured P2P systems
    Rob, Bong-Soo
    Kwon, O-Hoon
    Flong, Sung Je
    Kim, Jong
    [J]. AGENTS AND PEER-TO-PEER COMPUTING, 2008, 4461 : 43 - 50
  • [3] Securing Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 37 - 43
  • [4] Securing overlay activities of peers in unstructured P2P networks
    Park, Jun-Cheol
    Yu, Geonu
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1105 - 1108
  • [5] Securing overlay activities of peers in unstructured P2P networks
    Park, Jun-Cheol
    Yu, Geonu
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 795 - +
  • [6] Structured P2P Overlay Networks for Multimedia Traffic
    Singh, Mohanjeet
    Gupta, Anuj Kumar
    [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 80 - 85
  • [7] Malicious Peers Eviction for P2P Overlays
    Ismail, Hatem
    Germanus, Daniel
    Suri, Neeraj
    [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 216 - 224
  • [8] Improving messaging security in structured P2P overlay networks
    Yu, Heather
    Buford, John
    Merabti, Madjid
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 408 - 411
  • [9] Pollution Attacks Identification in Structured P2P Overlay Networks
    Trifa, Zied
    Hajlaoui, Jalel Eddine
    Khemakhem, Maher
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 674 - 686
  • [10] Performance analysis of P2P networks with malicious nodes
    Zhanyou Ma
    Qiannan Si
    Yilin Liu
    Shunzhi Wang
    [J]. Cluster Computing, 2022, 25 : 4325 - 4337