Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Detecting and mitigating P2P eclipse attacks
AU - Ismail, H.
AU - Germanus, D.
AU - Suri, Neeraj
PY - 2015/12/14
Y1 - 2015/12/14
N2 - Peer-to-Peer (P2P) protocols increasingly constitute the foundations for many large-scale applications as the inherently distributed nature of P2P easily supports both scalability and fault-tolerance. However, the decentralized design of P2P also exposes it to a variety of distributed threats with Eclipse Attacks (EAs) being a prominent type to impact P2P functionality. While the basic technique of divergent lookups has been demonstrated for suitability to mitigate EA, it can only (effectively) address limited variants of EAs. This paper investigates both the detection and mitigation potential of enhanced divergent lookups for handling complex EA scenarios. In addition, we propose an approach that can identify malicious peers with a high degree of accuracy. Our simulations have shown EA mitigation rates of up to 96% in case 25% of the peers are malicious. Also, our approach allows for anonymity-fostering, fully decentralized usage, and facilitating downstream mechanisms such as malicious peer removal. © 2015 IEEE.
AB - Peer-to-Peer (P2P) protocols increasingly constitute the foundations for many large-scale applications as the inherently distributed nature of P2P easily supports both scalability and fault-tolerance. However, the decentralized design of P2P also exposes it to a variety of distributed threats with Eclipse Attacks (EAs) being a prominent type to impact P2P functionality. While the basic technique of divergent lookups has been demonstrated for suitability to mitigate EA, it can only (effectively) address limited variants of EAs. This paper investigates both the detection and mitigation potential of enhanced divergent lookups for handling complex EA scenarios. In addition, we propose an approach that can identify malicious peers with a high degree of accuracy. Our simulations have shown EA mitigation rates of up to 96% in case 25% of the peers are malicious. Also, our approach allows for anonymity-fostering, fully decentralized usage, and facilitating downstream mechanisms such as malicious peer removal. © 2015 IEEE.
KW - Eclipse Attacks
KW - P2P
KW - Fault tolerance
KW - Fault tolerant computer systems
KW - Decentralized design
KW - High degree of accuracy
KW - Large-scale applications
KW - Lookups
KW - Malicious peer
KW - Peer-to-peer protocols
KW - Peer to peer networks
U2 - 10.1109/ICPADS.2015.36
DO - 10.1109/ICPADS.2015.36
M3 - Conference contribution/Paper
SP - 224
EP - 231
BT - 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)
PB - IEEE
ER -