skip to main content
10.1145/1133572.1133613acmconferencesArticle/Chapter ViewAbstractPublication PagesewConference Proceedingsconference-collections
Article

Defending against eclipse attacks on overlay networks

Published:19 September 2004Publication History

ABSTRACT

Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor nodes. These pointers are used both to maintain the overlay and to implement application functionality, for example, to locate content stored by overlay nodes. If an attacker controls a large fraction of the neighbors of correct nodes, it can "eclipse" correct nodes and prevent correct overlay operation. This Eclipse attack is more general than the Sybil attack. Attackers can use a Sybil attack to launch an Eclipse attack by inventing a large number of seemingly distinct overlay nodes. However, defenses against Sybil attacks do not prevent Eclipse attacks because attackers may manipulate the overlay maintenance algorithm to mount an Eclipse attack. This paper discusses the impact of the Eclipse attack on several types of overlay and it proposes a novel defense that prevents the attack by bounding the degree of overlay nodes. Our defense can be applied to any overlay and it enables secure implementations of overlay optimizations that choose neighbors according to metrics like proximity. We present preliminary results that demonstrate the importance of defending against the Eclipse attack and show that our defense is effective.

References

  1. S. Banerjee, B. Bhattacharjee, and C. Kommareddy. Scalable Application Layer Multicast. In Proceedings of ACM SIGCOMM, Aug. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bittorrent, 2004. http://bitconjurer.org/BitTorrent/.Google ScholarGoogle Scholar
  3. M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proc. OSDI 2002, Boston, MA, Dec. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Castro, P. Druschel, Y. C. Hu, and A. Rowstron. Exploiting network proximity in peer-to-peer overlay networks. Technical Report MSR-TR-2002-82, Microsoft Research, May 2002.Google ScholarGoogle Scholar
  5. Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker. Making Gnutella-like P2P systems scalable. In ACM SIGCOMM, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. R. Douceur. The Sybil Attack. In Proceedings for the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, Massachusetts, Mar. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. J. Freedman, E. Sit, J. Cates, and R. Morris. Tarzan: A Peer-to-Peer Anonymizing Network Layer. In Proceedings of IPTPS '02, Cambridge, Massachusetts, Mar. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. The Gnutella protocol specification, 2000. http://dss.clip2.com/GnutellaProtocol04.pdf.Google ScholarGoogle Scholar
  9. K. P. Gummadi, R. Gummadi, S. D. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica. The impact of DHT routing geometry on resilience and proximity. In ACM SIGCOMM, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Hildrum and J. Kubiatowicz. Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-Peer Networks. In 17th International Symposium on Distributed Computing, Oct. 2003.Google ScholarGoogle ScholarCross RefCross Ref
  11. Y. hua Chu, S. G. Rao, and H. Zhang. A Case For End System Multicast. In Proc. of ACM Sigmetrics, pages 1--12, Santa Clara, CA, June 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Jannotti, D. K. Gifford, K. L. Johnson, M. F. Kaashoek, and J. W. O'Toole. Overcast: Reliable multicasting with an overlay network. In Proc. OSDI 2000, San Diego, California, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. KaZaa. http://www.kazaa.com/.Google ScholarGoogle Scholar
  14. A. Mislove, G. Oberoi, A. Post, C. Reis, P. Druschel, and D. S. Wallach. AP3: Anonymization of Group Communication. In ACM SIGOPS European Workshop, Sept. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. MSPastry. http://research.microsoft.com/~antr/Pastry.Google ScholarGoogle Scholar
  16. OverNet, 2004. http://www.overnet.com/.Google ScholarGoogle Scholar
  17. S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In SIGCOMM, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Ratnasamy, S. Shenker, and I. Stoica. Routing algorithms for DHTs: Some open questions. In IPTPS, Mar. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. K. Reiter and A. D. Rubin. Anonymous Web transactions with Crowds. Communications of the ACM, 42(2):32--48, Feb. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In IFIP/ACM Middleware, Nov. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Singh. Secure proximity aware routing. In 1st IRIS Workshop, Aug. 2003.Google ScholarGoogle Scholar
  22. I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for Internet applications. In ACM SIGCOMM, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. E. Zegura, K. Calvert, and S. Bhattacharjee. How to model an internetwork. In INFOCOM96, San Francisco, California, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph. Tapestry: An Infrastructure for Fault-Resilient Wide-area Location and Routing. Technical Report UCB-CSD-01-1141, U. C. Berkeley, Apr. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    EW 11: Proceedings of the 11th workshop on ACM SIGOPS European workshop
    September 2004
    214 pages
    ISBN:9781450378079
    DOI:10.1145/1133572

    Copyright © 2004 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 19 September 2004

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    EW 11 Paper Acceptance Rate37of37submissions,100%Overall Acceptance Rate37of37submissions,100%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader