Home > Research > Publications & Outputs > Detecting and mitigating P2P eclipse attacks

Links

Text available via DOI:

View graph of relations

Detecting and mitigating P2P eclipse attacks

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Close
Publication date14/12/2015
Host publication2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)
PublisherIEEE
Pages224-231
Number of pages8
ISBN (electronic)9780769557854
<mark>Original language</mark>English

Abstract

Peer-to-Peer (P2P) protocols increasingly constitute the foundations for many large-scale applications as the inherently distributed nature of P2P easily supports both scalability and fault-tolerance. However, the decentralized design of P2P also exposes it to a variety of distributed threats with Eclipse Attacks (EAs) being a prominent type to impact P2P functionality. While the basic technique of divergent lookups has been demonstrated for suitability to mitigate EA, it can only (effectively) address limited variants of EAs. This paper investigates both the detection and mitigation potential of enhanced divergent lookups for handling complex EA scenarios. In addition, we propose an approach that can identify malicious peers with a high degree of accuracy. Our simulations have shown EA mitigation rates of up to 96% in case 25% of the peers are malicious. Also, our approach allows for anonymity-fostering, fully decentralized usage, and facilitating downstream mechanisms such as malicious peer removal. © 2015 IEEE.