Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Susceptibility analysis of structured P2P systems to localized eclipse attacks
AU - Germanus, D.
AU - Langenberg, R.
AU - Khelil, A.
AU - Suri, Neeraj
PY - 2012/10/8
Y1 - 2012/10/8
N2 - Peer-to-Peer (P2P) protocols are susceptible to Localized Eclipse Attacks (LEA), i.e., attacks where a victim peer's environment is masked by malicious peers which are then able to instigate progressively insidious security attacks. To obtain effective placement of malicious peers, LEAs significantly benefit from overlay topology-awareness. Hence, we propose heuristics for Chord, Pastry and Kademlia to assess the protocols' LEA susceptibility based on their topology characteristics and overlay routing mechanisms. As a result, our method can be used for P2P protocol parameter tuning in order to substantially mitigate LEAs. We present evaluations highlighting LEA's impact on contemporary P2P protocols. Our proposed heuristics are abstract in nature, making them applicable plus customizable for many other structured P2P protocols. We validate our model's accuracy through a simulation case study. © 2012 IEEE.
AB - Peer-to-Peer (P2P) protocols are susceptible to Localized Eclipse Attacks (LEA), i.e., attacks where a victim peer's environment is masked by malicious peers which are then able to instigate progressively insidious security attacks. To obtain effective placement of malicious peers, LEAs significantly benefit from overlay topology-awareness. Hence, we propose heuristics for Chord, Pastry and Kademlia to assess the protocols' LEA susceptibility based on their topology characteristics and overlay routing mechanisms. As a result, our method can be used for P2P protocol parameter tuning in order to substantially mitigate LEAs. We present evaluations highlighting LEA's impact on contemporary P2P protocols. Our proposed heuristics are abstract in nature, making them applicable plus customizable for many other structured P2P protocols. We validate our model's accuracy through a simulation case study. © 2012 IEEE.
KW - Eclipse Attack
KW - Overlay Topology Analysis
KW - Peer-to-Peer Security
KW - Customizable
KW - Kademlia
KW - Malicious peer
KW - Overlay routing
KW - Overlay topologies
KW - P2P protocols
KW - Peer-to-peer protocols
KW - Peer-to-peer securities
KW - Security attacks
KW - Structured P2P
KW - Structured P2P systems
KW - Susceptibility analysis
KW - Topology characteristics
KW - Topology-awareness
KW - Computer simulation
KW - Distributed computer systems
U2 - 10.1109/SRDS.2012.70
DO - 10.1109/SRDS.2012.70
M3 - Conference contribution/Paper
SN - 9781467323970
SP - 11
EP - 20
BT - 2012 IEEE 31st Symposium on Reliable Distributed Systems
PB - IEEE
ER -