Malicious Peers Eviction for P2P Overlays

被引:0
|
作者
Ismail, Hatem [1 ]
Germanus, Daniel [2 ]
Suri, Neeraj [1 ]
机构
[1] Tech Univ Darmstadt, DEEDS Grp, Darmstadt, Germany
[2] ENX Assoc, Frankfurt, Germany
关键词
P2P; DHT; Localized Attack; Eviction; Detection; Security; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the overlay. Such subsets may refer to peers that replicate critical or popular content. As a consequence, Localized Attacks (LA) target these subsets and despite using a relatively small amount of attacking malicious peers, LAs severely impair the overall network's reliability. Hence, we propose a new two-fold LA countermeasure to detect and evict malicious peers. Our countermeasure has been evaluated in a comprehensive simulation experiment study using a generic LA model that covers a wide range of known LAs such as Sybil, Eclipse or different poisoning attacks. The study shows reliability improvements of up to 97% in the presence of LAs, as well as successful evictions for up to 99% of the cases.
引用
收藏
页码:216 / 224
页数:9
相关论文
共 50 条
  • [1] The exclusion of malicious routing peers in structured P2P systems
    Rob, Bong-Soo
    Kwon, O-Hoon
    Flong, Sung Je
    Kim, Jong
    [J]. AGENTS AND PEER-TO-PEER COMPUTING, 2008, 4461 : 43 - 50
  • [2] Analysis of Malicious Peers in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    [J]. 2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [3] Bootstrapping P2P Overlays in MANETs
    Mawji, Afzal
    Hassanein, Hossam
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [4] Overlays in mobile P2P networks
    [J]. Zhang, G.-Y. (zhangguoyin@hrbeu.edu.cn), 1600, Chinese Academy of Sciences (24):
  • [5] Optimising P2P Overlays for Pervasive Environments
    Peng, Fei
    Malatras, Apostolos
    [J]. MANAGING THE DYNAMICS OF NETWORKS AND SERVICES, 2011, 6734 : 61 - 64
  • [6] Advanced Multimedia Search in P2P Overlays
    Grega, Michal
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, 2009, : 317 - 318
  • [7] Underlay Aware Resiliency in P2P Overlays
    Kumar, S. D. Madhu
    Bellur, Umesh
    Govindan, V. K.
    [J]. DISTRIBUTED COMPUTING AND NETWORKING, 2009, 5408 : 99 - +
  • [8] Implementation of adaptive control for P2P overlays
    Koulouris, T
    Henjes, R
    Tutschku, K
    De Meer, H
    [J]. ACTIVE NETWORKS, 2003, 2982 : 292 - 306
  • [9] Similarity discovery in structured P2P overlays
    Hsiao, HC
    King, CT
    [J]. 2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS, 2003, : 636 - 644
  • [10] P2P acclaimed by jury of peers
    Weatherford, Margaret
    [J]. IEEE Distributed Systems Online, 2001, 2 (03):