Evaluating P2P Networks against Eclipse Attacks

被引:4
|
作者
de Asis Lopez-Fuentes, Francisco [1 ]
Eugui-De-Alba, Inaki [1 ]
Ortiz-Ruiz, Otoniel M. [1 ]
机构
[1] Univ Autonoma Metropolitana, Dept Informat Technol, Unidad Cuajimalpa, Mexico City 11950, DF, Mexico
关键词
Peer-to-Peer networks; security; overlay network; Eclipse attack;
D O I
10.1016/j.protcy.2012.03.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to its distributed nature, the P2P networks are subject to more intricate attacks than client-server networks. Therefore, the security issues on a P2P network represent a great research challenge. Most P2P networks do not have a central management, and causes them can be endangered by its own nodes if enough of them decide to behave maliciously. In this paper, we evaluate the performance of P2P networks against an Eclipse attacks. Specifically, we evaluate the performance of the unstructured P2P networks and super-peer P2P systems against the Eclipse attack. To this end, our simulations are realized using schemes based on Gnutella and KazaA. Both networks are evaluated in terms of number of affected peers and their performance. Our results show that an Eclipse attack may have different effects on different kinds of P2P networks. (c) 2012 Published by Elsevier Ltd.
引用
收藏
页码:61 / 68
页数:8
相关论文
共 50 条
  • [1] Detecting and Mitigating P2P Eclipse Attacks
    Ismail, Hatem
    Germanus, Daniel
    Suri, Neeraj
    [J]. 2015 IEEE 21ST INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2015, : 224 - 231
  • [2] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks
    de Asis Lopez-Fuentes, Francisco
    Balleza-Gallegos, Salvador
    [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1262 - 1267
  • [3] Random visitor: Defense against identity attacks in P2P networks
    Gu, Jabeom
    Nah, Jaehoon
    Kwon, Hyeokchan
    Jang, Jongsoo
    Park, Sehyun
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (04): : 1058 - 1073
  • [4] ID mapping attacks in P2P networks
    Cerri, D
    Ghioni, A
    Paraboschi, S
    Tiraboschi, S
    [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1785 - 1790
  • [5] Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks
    Germanus, Daniel
    Langenberg, Robert
    Khelil, Abdelmajid
    Suri, Neeraj
    [J]. 2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 11 - 20
  • [6] Random visitor: A defense against identity attacks in P2P overlay networks
    Gu, Jabeom
    Nah, Jaehoon
    Chae, Cheoljoo
    Lee, Jaekwang
    Jang, Jongsoo
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 282 - +
  • [7] Securing network coding against pollution attacks in P2P converged ubiquitous networks
    He, Ming
    Gong, Zhenghu
    Chen, Lin
    Wang, Hong
    Dai, Fan
    Liu, Zhihong
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 642 - 650
  • [8] On the robustness of three classes of rateless codes against pollution attacks in P2P networks
    Gaeta, Rossano
    Grangetto, Marco
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (06) : 3595 - 3604
  • [9] Limiting sybil attacks in structured P2P networks
    Rowaihy, Hosam
    Enck, William
    McDaniel, Patrick
    La Porta, Thomas
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 2596 - +
  • [10] On the robustness of three classes of rateless codes against pollution attacks in P2P networks
    Rossano Gaeta
    Marco Grangetto
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 3595 - 3604