Home > Research > Publications & Outputs > PASS


Text available via DOI:

View graph of relations

PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Publication date28/09/2015
Host publication2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS)
Number of pages10
ISBN (Electronic)9781467393027
<mark>Original language</mark>English


The decentralized design of Peer-To-Peer (P2P) protocols inherently provides for fault tolerance to non-malicious faults. However, the base P2P scalability and decentralization requirements often result in design choices that negatively impact their robustness to varied security threats. A prominent vulnerability are Eclipse attacks that aim at information hiding and consequently perturb a P2P overlay's reliable service delivery. Divergent lookups constitute an advocated mitigation technique but are size-limited to overlay networks with tens of thousands of peers. In this work, building upon divergent lookups, we propose a novel and scalable P2P address space slicing strategy (PASS) to efficiently mitigate attacks in overlays that host hundreds of thousands of peers. Moreover, we integrate and evaluate diversely designed lookup variants to assess their network overhead and mitigation rates. The proposed PASS approach shows mitigation rates reaching up to 100%. © 2015 IEEE.