A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks

被引:0
|
作者
Trifa, Zied [1 ]
Khemakhem, Maher [2 ]
机构
[1] Univ Sfax, Dept Comp Sci, Sfax, Tunisia
[2] Univ King Abdulaziz, Coll Comp & Informat Technol, Jedda, Saudi Arabia
关键词
structured p2p overlay networks; malicious nodes; monitoring; mitigation;
D O I
10.1109/AICCSA.2017.224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Structured p2p overlay networks are vulnerable to malicious nodes which can control more than one identities. In such situation, they can mediate and monitor most overlay traffic. The decentralized and dynamic nature of such systems makes the detection of these nodes a very difficult task. In this paper we present a framework for monitoring and mitigating malicious attacks. We argued that monitoring traffic allows us to identify suspicious behavior. Our key idea is to divide the overlay into zones to reduce the number of monitors and capture traffic without disruption the routing protocol. Our solution generates measurements on the whole network and provides a Preset profile, finding a set of peers with malicious behavior that do not follow this profile. Evaluation shows that our framework has a good performance and can detect malicious nodes that are intended to malign the overlay.
引用
收藏
页码:128 / 134
页数:7
相关论文
共 50 条
  • [1] Analysis of Malicious Peers in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    [J]. 2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [2] Pollution Attacks Identification in Structured P2P Overlay Networks
    Trifa, Zied
    Hajlaoui, Jalel Eddine
    Khemakhem, Maher
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 674 - 686
  • [3] Securing Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 37 - 43
  • [4] Structured P2P Overlay Networks for Multimedia Traffic
    Singh, Mohanjeet
    Gupta, Anuj Kumar
    [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 80 - 85
  • [5] A Framework for Mobile Applications based on a structured P2P Overlay
    Kolberg, Mario
    Wilson, Michael
    Blunn, Martin
    Magill, Evan
    Burtwistle, Peter
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 46 - +
  • [6] Limiting sybil attacks in structured P2P networks
    Rowaihy, Hosam
    Enck, William
    McDaniel, Patrick
    La Porta, Thomas
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 2596 - +
  • [7] Improving messaging security in structured P2P overlay networks
    Yu, Heather
    Buford, John
    Merabti, Madjid
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 408 - 411
  • [8] Query Based Clustering Method in Structured P2P Overlay Networks
    Ma, Qing
    Zhao, Kun
    Wang, Xiaoxiang
    [J]. 2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 527 - 531
  • [9] Improving Routing Load Fairness in Structured P2P Overlay Networks
    Zhou, You
    Koyanagi, Keiichi
    [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 724 - 728
  • [10] MANET adaptive structured P2P overlay
    Shah, Nadir
    Qian, Depei
    Wang, Rui
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2012, 5 (02) : 143 - 160