Securing Structured P2P Overlay Networks

被引:0
|
作者
Trifa, Zied [1 ]
Khemakhem, Maher [1 ]
机构
[1] Univ Sfax, Dept Comp Sci, Sfax, Tunisia
关键词
structured P2P systems; security; monitoring; mitigation;
D O I
10.1109/3PGCIC.2013.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed systems, such as structured P2P overlay networks, are vulnerable to malicious peers. This is due to their flexibility, which allows to any given single participant to appear as many. This will lead, unfortunately, to the possibility of allowing such participant to control much more peers than it can actually do. This is commonly known as Sybil attack. On the other hand, the voluntary arrival and departure of thousands or millions of peers creates a collective effect called Churn. Consequently, an attacker could exploit this way by generating peers which joining and leaving the network very quickly in order to corrupt the best function of the network. Moreover, an attacker could generate a pollution attack leading to corrupt or delete data stored in the system. In such situation, these attacks enable the malicious participant to mediate and monitor most overlay traffics, enabling arbitrarily the denial of service or censorship attacks. Unfortunately, most of existing security solutions are incapable or ineffective to detect malicious peers in dynamic and decentralized systems such as structured P2P systems. Hence, we propose in this paper a Monitoring Framework, which attempts to secure structured P2P networks by monitoring, analyzing, detecting, and mitigating misbehavior peers.
引用
收藏
页码:37 / 43
页数:7
相关论文
共 50 条
  • [1] Securing overlay activities of peers in unstructured P2P networks
    Park, Jun-Cheol
    Yu, Geonu
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1105 - 1108
  • [2] Securing overlay activities of peers in unstructured P2P networks
    Park, Jun-Cheol
    Yu, Geonu
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 795 - +
  • [3] Structured P2P Overlay Networks for Multimedia Traffic
    Singh, Mohanjeet
    Gupta, Anuj Kumar
    [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 80 - 85
  • [4] Analysis of Malicious Peers in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    [J]. 2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [5] Pollution Attacks Identification in Structured P2P Overlay Networks
    Trifa, Zied
    Hajlaoui, Jalel Eddine
    Khemakhem, Maher
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 674 - 686
  • [6] Improving messaging security in structured P2P overlay networks
    Yu, Heather
    Buford, John
    Merabti, Madjid
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 408 - 411
  • [7] Improving Routing Load Fairness in Structured P2P Overlay Networks
    Zhou, You
    Koyanagi, Keiichi
    [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 724 - 728
  • [8] Query Based Clustering Method in Structured P2P Overlay Networks
    Ma, Qing
    Zhao, Kun
    Wang, Xiaoxiang
    [J]. 2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 527 - 531
  • [9] MANET adaptive structured P2P overlay
    Shah, Nadir
    Qian, Depei
    Wang, Rui
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2012, 5 (02) : 143 - 160
  • [10] MANET adaptive structured P2P overlay
    Nadir Shah
    Depei Qian
    Rui Wang
    [J]. Peer-to-Peer Networking and Applications, 2012, 5 : 143 - 160