Novel Sybil Defense Scheme for Peer-to-peer Applications

被引:0
|
作者
Shamieh, Fuad [1 ]
Alharbi, Roa [1 ]
机构
[1] Univ Western Ontario, Dept Elect & Comp Engn, London, ON, Canada
关键词
component; peer-to-peer; proactive; sybil attack; OVERLAY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The importance of peer-to-peer (P2P) network overlays produced enormous interest in the research community due to their robustness, scalability, and increase of data availability. P2P networks are overlays of logically connected hosts and other nodes including servers. P2P networks allow users to share their files without the need for any centralized servers. Since P2P networks are largely constructed of end-hosts, they are susceptible to abuse and malicious activity, such as sybil attacks. Impostors perform sybil attacks by assigning nodes multiple addresses, as opposed to a single address, with the goal of degrading network quality. Sybil nodes will spread malicious data and provide bogus responses to requests. To prevent sybil attacks from occurring, a novel defense mechanism is proposed. In the proposed scheme, the DHT key-space is divided and treated in a similar manner to radio frequency allocation incensing. An overlay of trusted nodes is used to detect and handle sybil nodes with the aid of source-destination pairs reporting on each other. The simulation results show that the proposed scheme detects sybil nodes in large sized networks with thousands of interactions.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Mitigating Peer-to-Peer Botnets by Sybil attacks
    Zhou Hangxia
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 241 - 243
  • [2] A Sybil-Resilient Peer-to-Peer Network Protocol
    Xu Xiang
    Zhou Hangxia
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 682 - 685
  • [3] Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems
    Jetter, Oliver
    Dinger, Jochen
    Hartenstein, Hannes
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [4] Securing peer-to-peer overlay networks from Sybil attack
    Lua, Eng Keong
    2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1213 - 1218
  • [5] Defeating against sybil-attacks in peer-to-peer networks
    Xiang, Xu
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1218 - 1222
  • [6] Defending Against sybil-attacks in Peer-to-Peer Networks
    Xu Xiang
    Lu Huijuan
    Chen Lianna
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 329 - 340
  • [7] Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets
    Wang, Tian-Zuo
    Wang, Huai-Min
    Liu, Bo
    Ding, Bo
    Zhang, Jing
    Shi, Pei-Chang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2731 - 2749
  • [8] Lemming: A novel resource lookup scheme for peer-to-peer networks
    Liao, XF
    Jin, H
    Chen, H
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2004, 3207 : 1024 - 1033
  • [9] A Novel Cooperative Caching Scheme for Unstrutured Peer-to-Peer Networks
    Mori, Tomonori
    Asaka, Takuya
    Takahashi, Tatsuro
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 765 - 769
  • [10] A definition of Peer-to-Peer networking for the classification of Peer-to-Peer architectures and applications
    Schollmeier, R
    FIRST INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, 2002, : 101 - 102