skip to main content
10.1145/3136825.3136865acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
extended-abstract

CAP: collaborative attack on pastry

Published: 13 October 2017 Publication History

Abstract

Pastry is a popular DHT overlay for its capability to facilitate storage and retrieval of data/ file among large number of nodes, efficiently without any centralized server. Performance is one of the major concerns in such networks. This work, frames a collaborative attack against Pastry named CAP to reduce the performance. Malicious nodes in CAP, intelligently poison the routing tables by sending fake state-table update messages to a target node. The malicious nodes drop (or forwards to another malicious node) the look-up requests received from a peer. Impact of CAP is observed and found to be significant degradation in performance. Further, we propose a defense mechanism to reduce the effects of such attack.

References

[1]
Todd Baumeister, Yingfei Dong, Zhenhai Duan, and Guanyu Tian. 2012. A routing table insertion (RTI) attack on Freenet. In Cyber Security (CyberSecurity), 2012 International Conference on. IEEE, 8--15.
[2]
Todd Baumeister, Yingfei Dong, Guanyu Tian, and Zhenhai Duan. 2013. Using randomized routing to counter routing table insertion attack on Freenet. In Global Communications Conference (GLOBECOM), 2013 IEEE. IEEE, 754--759.
[3]
Miguel Castro, Peter Druschel, Ayalvadi Ganesh, Antony Rowstron, and Dan S Wallach. 2002. Secure routing For structured pecr-to-peer overlay networks. ACM SIGOPS Operating Systems Review 36, SI (2002), 299--314.
[4]
Rafael Barra de Almeida, Jose Augusto Miranda Natif, Ana Paula Couto da Silva, and Alex Borges Vieira. 2013. Pollution and whitewashing attacks in a P2P live streaming system: analysis and counter-attack. In Communications (ICC), 2013 IEEE International Conference on. IEEE, 2006--2010.
[5]
Peter Druschel and Antony Rowstron. 2001. PAST: A large-scale, persistent peer-to-peer storage utility. In Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on. IEEE, 75--80.
[6]
Nikos Fotiou, Konstantinos V Katsaros, George Xylomenos, and George C Polyzos. 2015. H-pastry: An inter-domain topology aware overlay for the support of name-resolution services in the Future internet. Computer Communications 62 (2015), 13--22.
[7]
Daniel Germanus, Stefanie Koos. Thorsten Strufe, and Neeraj Suri. 2014. Mitigating eclipse attacks in peer-lo-peer networks. In Communications and Network Security (CNS), 2014 IEEE Conference on. IEEE, 400--408.
[8]
Ming He, Zhenghu Gong, Lin Chen, Hong Wang, Fan Dai, and Zhihong Liu. 2015. Securing network coding against pollution attacks in p2p converged ubiquitous networks. Peer-to-Peer Networking and Applications 8, 4 (2015), 642--650.
[9]
Hosam Rowaihy, William Enck, Patrick Mcdaniel and Thomas La Porta. 2005. Limiting sybil attacks in structured peer-to-peer networks. Technical report, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, USA (2005).
[10]
Antony Rowstron and Peter Druschel. 2001. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing. Springer, 329--350.
[11]
Antony Rowstron, Anne-Marie Kermarrec, Miguel Castro, and Peter Druschel. 2001. SCRIBE: The design of a large-scale event notification infrastructure. Networked group communication 2233 (2001), 30--43.
[12]
Mebratu Tsehayu. 2015. Secure Routing in Structured P2P Overlay. Master's thesis. Mid Sweden University, Sundsvall, Sweden.
[13]
Guido Urdaneta, Guillaume Pierre, and Maarten Van Steen. 2011. A survey of DHT security techniques. ACM Computing Surveys (CSUR) 43, 2 (2011), 8.
[14]
Wei Wang and Wenhong Zhao, 2015. Model the P2P Attack in Computer Networks. (2015).

Cited By

View all
  • (2018)Blockchain based Security Framework for P2P Filesharing system2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)10.1109/ANTS.2018.8710078(1-6)Online publication date: 16-Dec-2018

Index Terms

  1. CAP: collaborative attack on pastry

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '17: Proceedings of the 10th International Conference on Security of Information and Networks
    October 2017
    321 pages
    ISBN:9781450353038
    DOI:10.1145/3136825
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 October 2017

    Check for updates

    Author Tags

    1. packet dropping attack
    2. pastry
    3. routing-table poisoning
    4. structured P2P

    Qualifiers

    • Extended-abstract

    Funding Sources

    • Ministry of Electronics and Information Technology, Government of India

    Conference

    SIN '17
    SIN '17: Security of Information and Networks
    October 13 - 15, 2017
    Jaipur, India

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Blockchain based Security Framework for P2P Filesharing system2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)10.1109/ANTS.2018.8710078(1-6)Online publication date: 16-Dec-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media