Analysis of Malicious Peers in Structured P2P Overlay Networks

被引:0
|
作者
Trifa, Zied [1 ]
Khemakhem, Maher [1 ]
机构
[1] Univ Sfax, Dept Comp Sci, Sfax, Tunisia
关键词
structured P2P systems; security; monitoring; mitigation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The malicious behavior peer has crucial impact on the efficiency and integrity of structured p2p systems. The increasing complexity found in such systems, helps in some part to explain the large scale of the challenge faced in dealing with such problem. In such systems, node trust is often essential. However, the destructive and malicious intent of misbehaving peers is often overlooked, despite being one of the most difficult troubles faced in such systems. In this paper we propose a study of these malicious peers. We use a monitoring process, which involves the placement of few instrumented peers within the network. The goal of the monitoring process is to gather a wide set of metrics on the behavior of a peer. To achieve this, we analyze a large trace of messages and operations in the overlay, which gives an insight on the proprieties and peer behaviors. We focus on the communication protocol between peers. Our measurement infrastructure consists in a set of fake peers called Sybils doted with specific controllers in different level of the system. These Sybils are connected to different zones in the network and controlled by a coordinator.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Small world overlay P2P networks
    Hui, KYK
    Lui, JCS
    Yau, DKY
    [J]. 2004 TWELFTH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2004, : 201 - 210
  • [32] Dimensioning of Overlay Networks for P2P Multicasting
    Walkowiak, Krzysztof
    [J]. PROCEEDINGS OF THE 2010 IEEE-IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2010, : 805 - 808
  • [33] Feature interactions in P2P overlay networks
    Buford, John
    Dhara, K.
    Kolberg, M.
    Krishnaswamy, V.
    Wu, X.
    [J]. 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 304 - +
  • [34] The dangers of poorly connected peers in structured P2P networks and a solution based on incentives
    Hartmann, Bjoern-Oliver
    Boehm, Klemens
    Khachatryan, Andranik
    Schosser, Stephan
    [J]. PROCEEDINGS OF THE IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE: WI 2007, 2007, : 500 - 508
  • [35] A structured mesh overlay network for P2P applications on mobile ad hoc networks
    Wongsaardsakul, Thirapon
    Kanchanasut, Kanchana
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2007, 4882 : 67 - 72
  • [36] Modeling QoS in P2P File-sharing with Benign and Malicious Peers by Stochastic Activity Networks
    Zhang, Peiqing
    Helvik, Bjarne E.
    [J]. 2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 461 - 465
  • [37] Gemini: Probabilistic routing algorithm in structured P2P overlay
    Li, M
    Hu, JF
    Dong, HT
    Wang, DS
    Zheng, WM
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 519 - 526
  • [38] A Framework for Mobile Applications based on a structured P2P Overlay
    Kolberg, Mario
    Wilson, Michael
    Blunn, Martin
    Magill, Evan
    Burtwistle, Peter
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 46 - +
  • [39] HRing: A structured P2P overlay based on Harmonic Series
    Zhuge, Hai
    Chen, Xue
    Sun, Xiaoping
    Yao, Erlin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, 19 (02) : 145 - 158
  • [40] SiMPSON: Efficient Similarity Search in Metric Spaces over P2P Structured Overlay Networks
    Vu, Quang Hieu
    Lupu, Mihai
    Wu, Sai
    [J]. EURO-PAR 2009: PARALLEL PROCESSING, PROCEEDINGS, 2009, 5704 : 498 - +