Securing overlay activities of peers in unstructured P2P networks

被引:0
|
作者
Park, Jun-Cheol [1 ]
Yu, Geonu [2 ]
机构
[1] Hongik Univ, Dept Comp Engn, Seoul 121791, South Korea
[2] LG Elect, MD Dev Grp, Seoul 451713, South Korea
关键词
D O I
10.1109/ICCIAS.2006.295433
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper discusses how to secure overlay activities of peers on overlay level messages exchanged in unstructured P2P networks. We identify some attacks that can be effectively handled by appropriate cryptographic means. We then give a detection method against those attacks including message modification, replay attack, and message generation with wrong information. The method presumes the existence of a set of CAs, which are consulted when peers are newly joining the network and otherwise uninvolved in the peer activities. We also address the attack of a peer's illegal dropping of relaying messages, which is hard to be traced to its doer even with the assist of cryptographic means. We propose an audit and topology adaptation technique to confine and weaken the ill effect of such an attack on other peers in the network. We demonstrate the effectiveness of the technique using a modified GnutellaSim [6] simulator with respect to various metrics. Being based upon a generic overlay model, the proposed techniques can be applied to any unstructured P2P network either separately or all together.
引用
收藏
页码:1105 / 1108
页数:4
相关论文
共 50 条
  • [1] Securing overlay activities of peers in unstructured P2P networks
    Park, Jun-Cheol
    Yu, Geonu
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 795 - +
  • [2] Securing Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 37 - 43
  • [3] Analysis of Malicious Peers in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    [J]. 2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [4] Research and Analysis of the Optimization of the Unstructured P2P Overlay Networks
    Zheng, He
    Yan, Ma
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4376 - 4379
  • [5] Content Based Retrieval System with Bloom in An Unstructured P2p Overlay Networks
    Thumilvannan, P. S.
    Uvaraj, S.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (05): : 48 - 52
  • [6] Bio-inspired search algorithms for unstructured P2P overlay networks
    Sesum-Cavic, Vesna
    Kuehn, Eva
    Kanev, Daniel
    [J]. SWARM AND EVOLUTIONARY COMPUTATION, 2016, 29 : 73 - 93
  • [7] Distributed social-based overlay adaptation for unstructured P2P networks
    Lin, Ching-Ju
    Chang, Yi-Ting
    Tsai, Shuo-Chan
    Chou, Cheng-Fu
    [J]. 2007 IEEE GLOBAL INTERNET SYMPOSIUM, 2007, : 1 - +
  • [8] On heterogeneous overlay construction and random node selection in unstructured p2p networks
    Vishnumurthy, Vivek
    Francis, Paul
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 1119 - 1130
  • [9] Efficient Search and Lookup in Unstructured P2P Overlay Networks Inspired by Swarm Intelligence
    Sesum-Cavic, Vesna
    Kuhn, Eva
    Fleischhacker, Lukas
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (03): : 351 - 368
  • [10] Solving overlay mismatching of unstructured P2P networks using physical locality information
    Zhao, Jia
    Lu, Jiande
    [J]. SIXTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2006, : 75 - +