Home > Research > Publications & Outputs > Detecting and mitigating P2P eclipse attacks

Links

Text available via DOI:

View graph of relations

Detecting and mitigating P2P eclipse attacks

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Detecting and mitigating P2P eclipse attacks. / Ismail, H.; Germanus, D.; Suri, Neeraj.
2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2015. p. 224-231.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Ismail, H, Germanus, D & Suri, N 2015, Detecting and mitigating P2P eclipse attacks. in 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, pp. 224-231. https://doi.org/10.1109/ICPADS.2015.36

APA

Ismail, H., Germanus, D., & Suri, N. (2015). Detecting and mitigating P2P eclipse attacks. In 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS) (pp. 224-231). IEEE. https://doi.org/10.1109/ICPADS.2015.36

Vancouver

Ismail H, Germanus D, Suri N. Detecting and mitigating P2P eclipse attacks. In 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE. 2015. p. 224-231 doi: 10.1109/ICPADS.2015.36

Author

Ismail, H. ; Germanus, D. ; Suri, Neeraj. / Detecting and mitigating P2P eclipse attacks. 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2015. pp. 224-231

Bibtex

@inproceedings{6ae5ce360bad4699984340f2462d96db,
title = "Detecting and mitigating P2P eclipse attacks",
abstract = "Peer-to-Peer (P2P) protocols increasingly constitute the foundations for many large-scale applications as the inherently distributed nature of P2P easily supports both scalability and fault-tolerance. However, the decentralized design of P2P also exposes it to a variety of distributed threats with Eclipse Attacks (EAs) being a prominent type to impact P2P functionality. While the basic technique of divergent lookups has been demonstrated for suitability to mitigate EA, it can only (effectively) address limited variants of EAs. This paper investigates both the detection and mitigation potential of enhanced divergent lookups for handling complex EA scenarios. In addition, we propose an approach that can identify malicious peers with a high degree of accuracy. Our simulations have shown EA mitigation rates of up to 96% in case 25% of the peers are malicious. Also, our approach allows for anonymity-fostering, fully decentralized usage, and facilitating downstream mechanisms such as malicious peer removal. {\textcopyright} 2015 IEEE.",
keywords = "Eclipse Attacks, P2P, Fault tolerance, Fault tolerant computer systems, Decentralized design, High degree of accuracy, Large-scale applications, Lookups, Malicious peer, Peer-to-peer protocols, Peer to peer networks",
author = "H. Ismail and D. Germanus and Neeraj Suri",
year = "2015",
month = dec,
day = "14",
doi = "10.1109/ICPADS.2015.36",
language = "English",
pages = "224--231",
booktitle = "2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Detecting and mitigating P2P eclipse attacks

AU - Ismail, H.

AU - Germanus, D.

AU - Suri, Neeraj

PY - 2015/12/14

Y1 - 2015/12/14

N2 - Peer-to-Peer (P2P) protocols increasingly constitute the foundations for many large-scale applications as the inherently distributed nature of P2P easily supports both scalability and fault-tolerance. However, the decentralized design of P2P also exposes it to a variety of distributed threats with Eclipse Attacks (EAs) being a prominent type to impact P2P functionality. While the basic technique of divergent lookups has been demonstrated for suitability to mitigate EA, it can only (effectively) address limited variants of EAs. This paper investigates both the detection and mitigation potential of enhanced divergent lookups for handling complex EA scenarios. In addition, we propose an approach that can identify malicious peers with a high degree of accuracy. Our simulations have shown EA mitigation rates of up to 96% in case 25% of the peers are malicious. Also, our approach allows for anonymity-fostering, fully decentralized usage, and facilitating downstream mechanisms such as malicious peer removal. © 2015 IEEE.

AB - Peer-to-Peer (P2P) protocols increasingly constitute the foundations for many large-scale applications as the inherently distributed nature of P2P easily supports both scalability and fault-tolerance. However, the decentralized design of P2P also exposes it to a variety of distributed threats with Eclipse Attacks (EAs) being a prominent type to impact P2P functionality. While the basic technique of divergent lookups has been demonstrated for suitability to mitigate EA, it can only (effectively) address limited variants of EAs. This paper investigates both the detection and mitigation potential of enhanced divergent lookups for handling complex EA scenarios. In addition, we propose an approach that can identify malicious peers with a high degree of accuracy. Our simulations have shown EA mitigation rates of up to 96% in case 25% of the peers are malicious. Also, our approach allows for anonymity-fostering, fully decentralized usage, and facilitating downstream mechanisms such as malicious peer removal. © 2015 IEEE.

KW - Eclipse Attacks

KW - P2P

KW - Fault tolerance

KW - Fault tolerant computer systems

KW - Decentralized design

KW - High degree of accuracy

KW - Large-scale applications

KW - Lookups

KW - Malicious peer

KW - Peer-to-peer protocols

KW - Peer to peer networks

U2 - 10.1109/ICPADS.2015.36

DO - 10.1109/ICPADS.2015.36

M3 - Conference contribution/Paper

SP - 224

EP - 231

BT - 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)

PB - IEEE

ER -