Skip to main content

Securing Overlay Activities of Peers in Unstructured P2P Networks

  • Conference paper
Computational Intelligence and Security (CIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4456))

Included in the following conference series:

Abstract

This paper discusses how to secure overlay activities of peers on overlay level messages exchanged in unstructured P2P networks. We identify some attacks that can be effectively handled by appropriate cryptographic means. We then give a detection method against those attacks including message modification, replay attack, and message generation with wrong information. The method presumes the existence of a set of CAs, which are consulted when peers are newly joining the network and otherwise uninvolved in the peer activities. We also address the attack of a peer’s illegal dropping of relaying messages, which is hard to be traced to its doer even with the assist of cryptographic means. We propose an audit and topology adaptation technique to confine and weaken the ill effect of such an attack on other peers in the network. We demonstrate the effectiveness of the technique using a modified GnutellaSim [14] simulator with respect to various metrics. Being based upon a generic overlay model, the proposed techniques can be applied to any unstructured P2P network either separately or all together.

This work was supported by the 2006 Hongik University Research Fund.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Androutsellis-Theotokis, S., Spinellis, D.: A Survey of Peer-to-Peer Content Distribution Technologies. ACM Computing Surveys, 36(4) (2004)

    Google Scholar 

  2. Yang, B., Kamvar, S.D., Garcia-Molina, H.: Addressing the Non-Cooperation Problem in Competitive P2P Systems. In: Proc. Workshop on Economics of Peer-to-Peer Systems (2003)

    Google Scholar 

  3. Lv, Q., Ratnasamy, S., Shenker, S.: Can Heterogeneity Make Gnutella Scalable? In: Proc. Int’l Workshop on Peer-to-Peer Systems (2002)

    Google Scholar 

  4. Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making Gnutella-like P2P Systems Scalable. In: Proc. ACM SIGCOMM 2003, August (2003)

    Google Scholar 

  5. Zhao, J., Lu, J.: Pyramid: Building Incentive Architecture for Unstructured Peer-to-Peer Network. In: Proc. Advanced Int’l Conf. on Telecommunications and Int’l Conf. on Internet and Web Applications and Services (AICT/ICIW 2006) (2006)

    Google Scholar 

  6. Marti, S., Garcia-Molina, H.: Taxonomy of Trust: Categorizing P2P Reputation Systems. COMNET Special Issue on Trust and Reputation in Peer-to-Peer Systems (2005)

    Google Scholar 

  7. Risson, J., Moors, T.: Survey of Research Towards Robust Peer-to-Peer Networks: Search Methods. In: TR UNSW-EE-P2P-1-1, Univ. of New South Wales, Australia (2004)

    Google Scholar 

  8. Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.: Secure Routing for Structured Peer-to-Peer Overlay Networks. In: Proc. Usenix Symp. on Operating Systems (2002)

    Google Scholar 

  9. Dewan, P., Dasgupta, P.: Securing P2P Networks Using Peer Reputations: Is there a silver bullet? In: Proc. IEEE Consumer Communications and Networking Conf. (CCNC 2005), USA (2005)

    Google Scholar 

  10. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Tr. on Networking 11(1) (2003)

    Google Scholar 

  11. Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proc. ACM SIGCOMM 2001 (2001)

    Google Scholar 

  12. Rowstron, A., Druschel, P.: Pastry: Scalable, Distributed Object Location and Routing for Large-scale Peer-to-Peer Systems. In: Proc. IFIP/ACM Int’l Conf. Distributed Systems Platforms (Middleware 2001) (2001)

    Google Scholar 

  13. Gnutella Website, http://www.gnutella.com

  14. He, Q., Ammar, M., Riley, G., Raj, H., Fujimoto, R.: Mapping Peer Behavior to Packet-level Details: A Framework for Packet-level Simulation of Peer-to-Peer Systems. In: Proc. ACM/IEEE Int’l Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (2003)

    Google Scholar 

  15. Rabin, M.: Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance. Journal of the ACM 36(2) (1989)

    Google Scholar 

  16. Shamir, A.: How to Share a Secret. Communications of the ACM 22 (1979)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, JC., Yu, G. (2007). Securing Overlay Activities of Peers in Unstructured P2P Networks. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_83

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74377-4_83

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74376-7

  • Online ISBN: 978-3-540-74377-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics