Analysis of Malicious Peers in Structured P2P Overlay Networks

被引:0
|
作者
Trifa, Zied [1 ]
Khemakhem, Maher [1 ]
机构
[1] Univ Sfax, Dept Comp Sci, Sfax, Tunisia
关键词
structured P2P systems; security; monitoring; mitigation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The malicious behavior peer has crucial impact on the efficiency and integrity of structured p2p systems. The increasing complexity found in such systems, helps in some part to explain the large scale of the challenge faced in dealing with such problem. In such systems, node trust is often essential. However, the destructive and malicious intent of misbehaving peers is often overlooked, despite being one of the most difficult troubles faced in such systems. In this paper we propose a study of these malicious peers. We use a monitoring process, which involves the placement of few instrumented peers within the network. The goal of the monitoring process is to gather a wide set of metrics on the behavior of a peer. To achieve this, we analyze a large trace of messages and operations in the overlay, which gives an insight on the proprieties and peer behaviors. We focus on the communication protocol between peers. Our measurement infrastructure consists in a set of fake peers called Sybils doted with specific controllers in different level of the system. These Sybils are connected to different zones in the network and controlled by a coordinator.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Probabilistic prediction of peers' performance in P2P networks
    Despotovic, Z
    Aberer, K
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2005, 18 (07) : 771 - 780
  • [42] Semantic Overlay Networks for Social Recommendation in P2P
    Garcia-Sola, Alberto
    Botia, Juan A.
    [J]. INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE 2008, 2009, 50 : 274 - 283
  • [43] The essence of P2P: A reference architecture for overlay networks
    Aberer, K
    Alima, LO
    Ghodsi, A
    Girdzijauskas, S
    Haridi, S
    Hauswirth, M
    [J]. Fifth IEEE International Conference on Peer-to-Peer Computing, Proceedings, 2005, : 11 - 20
  • [44] Improvement of routing structure in P2P overlay networks
    Hu, JF
    Wu, YH
    Li, M
    Zheng, WM
    [J]. GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 292 - 299
  • [45] A generic trust overlay simulator for P2P networks
    Wang, Wei
    Zeng, Guosun
    [J]. 12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 401 - +
  • [46] Towards intelligent P2P IPTV overlay management through classification of peers
    Muhammad Ali
    Rizwan Asghar
    Ihsan Ullah
    Atiq Ahmed
    Waheed Noor
    Junaid Baber
    [J]. Peer-to-Peer Networking and Applications, 2022, 15 : 827 - 838
  • [47] Towards intelligent P2P IPTV overlay management through classification of peers
    Ali, Muhammad
    Asghar, Rizwan
    Ullah, Ihsan
    Ahmed, Atiq
    Noor, Waheed
    Baber, Junaid
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 827 - 838
  • [48] Soft computing approach based malicious peers detection using geometric and trust features in P2P networks
    T. Premakumari
    M. Chandrasekaran
    [J]. Cluster Computing, 2019, 22 : 12227 - 12232
  • [49] Soft computing approach based malicious peers detection using geometric and trust features in P2P networks
    Premakumari, T.
    Chandrasekaran, M.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 12227 - 12232
  • [50] Resource engagement analysis of overlay hybrid P2P architectures in Personal Networks
    Atanasovski, Vladimir
    Gavrilovska, Liljana
    [J]. ITI 2006: PROCEEDINGS OF THE 28TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2006, : 595 - +