Identifying malicious peers before it's too late: A decentralized secure peer sampling service

Gian Paolo Jesi*, David Hales, Maarten van Steen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)

Abstract

Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled node s from the population comprising the system. PSS protocols are often implemented using "gossiping" approaches in which connected nodes exchange their links in a randomized way. However, such services can be defeated easily by malicious nodes executing "hub attacks"which distort the PSS such that all nodes in the network, ultimately, only gain access to malicious nodes. From this leading status - i.e. being a "hub" - the malicious nodes can affect the overlay in several ways, ranging from total network disruption to obtaining an application dependent advantage. We present a completely distributed defense against such attacks and give results from simulation experiments. The approach is generic as it is independent of the adopted PSS implementation.

Original languageEnglish
Title of host publicationFirst International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2007
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages237-246
Number of pages10
ISBN (Print)9780769529066
DOIs
Publication statusPublished - 18 Dec 2007
Externally publishedYes
Event1st International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2007 - Cambridge, United States
Duration: 9 Jul 200711 Jul 2007
Conference number: 1

Publication series

NameInternational Conference on Self-Adaptive and Self-Organizing Systems (SASO)
PublisherIEEE
Volume2007
ISSN (Print)1949-3673
ISSN (Electronic)1949-3681

Conference

Conference1st International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2007
Abbreviated titleSASO
CountryUnited States
CityCambridge
Period9/07/0711/07/07

Fingerprint

Dive into the research topics of 'Identifying malicious peers before it's too late: A decentralized secure peer sampling service'. Together they form a unique fingerprint.

Cite this