Analysis of Malicious Peers in Structured P2P Overlay Networks

被引:0
|
作者
Trifa, Zied [1 ]
Khemakhem, Maher [1 ]
机构
[1] Univ Sfax, Dept Comp Sci, Sfax, Tunisia
关键词
structured P2P systems; security; monitoring; mitigation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The malicious behavior peer has crucial impact on the efficiency and integrity of structured p2p systems. The increasing complexity found in such systems, helps in some part to explain the large scale of the challenge faced in dealing with such problem. In such systems, node trust is often essential. However, the destructive and malicious intent of misbehaving peers is often overlooked, despite being one of the most difficult troubles faced in such systems. In this paper we propose a study of these malicious peers. We use a monitoring process, which involves the placement of few instrumented peers within the network. The goal of the monitoring process is to gather a wide set of metrics on the behavior of a peer. To achieve this, we analyze a large trace of messages and operations in the overlay, which gives an insight on the proprieties and peer behaviors. We focus on the communication protocol between peers. Our measurement infrastructure consists in a set of fake peers called Sybils doted with specific controllers in different level of the system. These Sybils are connected to different zones in the network and controlled by a coordinator.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Research and Analysis of the Optimization of the Unstructured P2P Overlay Networks
    Zheng, He
    Yan, Ma
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4376 - 4379
  • [22] An Overlapping Structured P2P for REIK Overlay Network
    Liu, Wenjun
    Song, Jingjing
    Yu, Jiguo
    [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 1022 - 1028
  • [23] An Overlapping Structured P2P for REIK Overlay Network
    Liu, Wenjun
    Song, Jingjing
    Yu, Jiguo
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 532 - 535
  • [24] On the Effects of Overlay Localization on P2P Networks
    Kiraly, Csaba
    Lo Cigno, Renato
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, 2009, : 383 - +
  • [25] Overlay networks - A scalable alternative for P2P
    Doval, D
    O'Mahony, D
    [J]. IEEE INTERNET COMPUTING, 2003, 7 (04) : 79 - 82
  • [26] Topology awareness of overlay P2P networks
    Rostami, Habib
    Habibi, Jafar
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2007, 19 (07): : 999 - 1021
  • [27] Simulating trust overlay in P2P networks
    Zhang, Yan
    Wang, Wei
    Lu, Shunying
    [J]. COMPUTATIONAL SCIENCE - ICCS 2007, PT 1, PROCEEDINGS, 2007, 4487 : 632 - +
  • [28] P2P overlay networks of constant degree
    Chen, GH
    Xu, CZ
    Shen, HY
    Chen, DX
    [J]. GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 412 - 419
  • [29] Semantic Overlay Networks for P2P systems
    Crespo, A
    Garcia-Molina, H
    [J]. AGENTS AND PEER-TO-PEER COMPUTING, 2005, 3601 : 1 - 13
  • [30] A P2P computing system for overlay networks
    Chmaj, Grzegorz
    Walkowiak, Krzysztof
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01): : 242 - 249