Abstract
This paper discusses how to secure overlay activities of peers on overlay level messages exchanged in unstructured P2P networks. We identify some attacks that can be effectively handled by appropriate cryptographic means. We then give a detection method against those attacks including message modification, replay attack, and message generation with wrong information. The method presumes the existence of a set of CAs, which are consulted when peers are newly joining the network and otherwise uninvolved in the peer activities. We also address the attack of a peer’s illegal dropping of relaying messages, which is hard to be traced to its doer even with the assist of cryptographic means. We propose an audit and topology adaptation technique to confine and weaken the ill effect of such an attack on other peers in the network. We demonstrate the effectiveness of the technique using a modified GnutellaSim [14] simulator with respect to various metrics. Being based upon a generic overlay model, the proposed techniques can be applied to any unstructured P2P network either separately or all together.
This work was supported by the 2006 Hongik University Research Fund.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Androutsellis-Theotokis, S., Spinellis, D.: A Survey of Peer-to-Peer Content Distribution Technologies. ACM Computing Surveys, 36(4) (2004)
Yang, B., Kamvar, S.D., Garcia-Molina, H.: Addressing the Non-Cooperation Problem in Competitive P2P Systems. In: Proc. Workshop on Economics of Peer-to-Peer Systems (2003)
Lv, Q., Ratnasamy, S., Shenker, S.: Can Heterogeneity Make Gnutella Scalable? In: Proc. Int’l Workshop on Peer-to-Peer Systems (2002)
Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making Gnutella-like P2P Systems Scalable. In: Proc. ACM SIGCOMM 2003, August (2003)
Zhao, J., Lu, J.: Pyramid: Building Incentive Architecture for Unstructured Peer-to-Peer Network. In: Proc. Advanced Int’l Conf. on Telecommunications and Int’l Conf. on Internet and Web Applications and Services (AICT/ICIW 2006) (2006)
Marti, S., Garcia-Molina, H.: Taxonomy of Trust: Categorizing P2P Reputation Systems. COMNET Special Issue on Trust and Reputation in Peer-to-Peer Systems (2005)
Risson, J., Moors, T.: Survey of Research Towards Robust Peer-to-Peer Networks: Search Methods. In: TR UNSW-EE-P2P-1-1, Univ. of New South Wales, Australia (2004)
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.: Secure Routing for Structured Peer-to-Peer Overlay Networks. In: Proc. Usenix Symp. on Operating Systems (2002)
Dewan, P., Dasgupta, P.: Securing P2P Networks Using Peer Reputations: Is there a silver bullet? In: Proc. IEEE Consumer Communications and Networking Conf. (CCNC 2005), USA (2005)
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Tr. on Networking 11(1) (2003)
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proc. ACM SIGCOMM 2001 (2001)
Rowstron, A., Druschel, P.: Pastry: Scalable, Distributed Object Location and Routing for Large-scale Peer-to-Peer Systems. In: Proc. IFIP/ACM Int’l Conf. Distributed Systems Platforms (Middleware 2001) (2001)
Gnutella Website, http://www.gnutella.com
He, Q., Ammar, M., Riley, G., Raj, H., Fujimoto, R.: Mapping Peer Behavior to Packet-level Details: A Framework for Packet-level Simulation of Peer-to-Peer Systems. In: Proc. ACM/IEEE Int’l Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (2003)
Rabin, M.: Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance. Journal of the ACM 36(2) (1989)
Shamir, A.: How to Share a Secret. Communications of the ACM 22 (1979)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, JC., Yu, G. (2007). Securing Overlay Activities of Peers in Unstructured P2P Networks. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_83
Download citation
DOI: https://doi.org/10.1007/978-3-540-74377-4_83
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74376-7
Online ISBN: 978-3-540-74377-4
eBook Packages: Computer ScienceComputer Science (R0)