Susceptibility analysis of structured P2P systems to localized eclipse attacks

Germanus, D. and Langenberg, R. and Khelil, A. and Suri, Neeraj (2012) Susceptibility analysis of structured P2P systems to localized eclipse attacks. In: 2012 IEEE 31st Symposium on Reliable Distributed Systems. IEEE, pp. 11-20. ISBN 9781467323970

Full text not available from this repository.

Abstract

Peer-to-Peer (P2P) protocols are susceptible to Localized Eclipse Attacks (LEA), i.e., attacks where a victim peer's environment is masked by malicious peers which are then able to instigate progressively insidious security attacks. To obtain effective placement of malicious peers, LEAs significantly benefit from overlay topology-awareness. Hence, we propose heuristics for Chord, Pastry and Kademlia to assess the protocols' LEA susceptibility based on their topology characteristics and overlay routing mechanisms. As a result, our method can be used for P2P protocol parameter tuning in order to substantially mitigate LEAs. We present evaluations highlighting LEA's impact on contemporary P2P protocols. Our proposed heuristics are abstract in nature, making them applicable plus customizable for many other structured P2P protocols. We validate our model's accuracy through a simulation case study. © 2012 IEEE.

Item Type:
Contribution in Book/Report/Proceedings
Subjects:
?? ECLIPSE ATTACKOVERLAY TOPOLOGY ANALYSISPEER-TO-PEER SECURITYCUSTOMIZABLEKADEMLIAMALICIOUS PEEROVERLAY ROUTINGOVERLAY TOPOLOGIESP2P PROTOCOLSPEER-TO-PEER PROTOCOLSPEER-TO-PEER SECURITIESSECURITY ATTACKSSTRUCTURED P2PSTRUCTURED P2P SYSTEMSSUSCEPTIBILITY ANA ??
ID Code:
137524
Deposited By:
Deposited On:
14 Oct 2019 13:46
Refereed?:
Yes
Published?:
Published
Last Modified:
20 Sep 2023 02:28