Abstract
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled node s from the population comprising the system. PSS protocols are often implemented using "gossiping" approaches in which connected nodes exchange their links in a randomized way. However, such services can be defeated easily by malicious nodes executing "hub attacks"which distort the PSS such that all nodes in the network, ultimately, only gain access to malicious nodes. From this leading status - i.e. being a "hub" - the malicious nodes can affect the overlay in several ways, ranging from total network disruption to obtaining an application dependent advantage. We present a completely distributed defense against such attacks and give results from simulation experiments. The approach is generic as it is independent of the adopted PSS implementation.
Original language | English |
---|---|
Title of host publication | First International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2007 |
Place of Publication | Piscataway, NJ |
Publisher | IEEE |
Pages | 237-246 |
Number of pages | 10 |
ISBN (Print) | 9780769529066 |
DOIs | |
Publication status | Published - 18 Dec 2007 |
Externally published | Yes |
Event | 1st International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2007 - Cambridge, United States Duration: 9 Jul 2007 → 11 Jul 2007 Conference number: 1 |
Publication series
Name | International Conference on Self-Adaptive and Self-Organizing Systems (SASO) |
---|---|
Publisher | IEEE |
Volume | 2007 |
ISSN (Print) | 1949-3673 |
ISSN (Electronic) | 1949-3681 |
Conference
Conference | 1st International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2007 |
---|---|
Abbreviated title | SASO |
Country/Territory | United States |
City | Cambridge |
Period | 9/07/07 → 11/07/07 |