Thomas Reidemeister, Klemens Böhm, Paul A. S. Ward, Erik Buchmann
{"title":"可内容寻址的点对点网络中的恶意行为","authors":"Thomas Reidemeister, Klemens Böhm, Paul A. S. Ward, Erik Buchmann","doi":"10.1109/CNSR.2005.39","DOIUrl":null,"url":null,"abstract":"Distributed hash tables (DHTs) promise to manage huge sets of key-value pairs in a peer-to-peer manner. The content-addressable network (CAN) is a prominent variant of DHT. A critical challenge when designing a CAN, or indeed any DHT, is ensuring that all data items are accessible despite the presence of malicious and faulty peers. Such peers may hinder other peers in accessing the keys in various ways. In this paper we identify various types of attacks and propose, where possible, some countermeasures. To counter man-in-the-middle attacks we have developed a dynamically-adjustable multi-path routing algorithm. We evaluate the efficacy of our method both analytically and by simulation. For networks with less than 1% malicious peers we were able to reduce the effect of such attacks by 80%.","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Malicious behaviour in content-addressable peer-to-peer networks\",\"authors\":\"Thomas Reidemeister, Klemens Böhm, Paul A. S. Ward, Erik Buchmann\",\"doi\":\"10.1109/CNSR.2005.39\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Distributed hash tables (DHTs) promise to manage huge sets of key-value pairs in a peer-to-peer manner. The content-addressable network (CAN) is a prominent variant of DHT. A critical challenge when designing a CAN, or indeed any DHT, is ensuring that all data items are accessible despite the presence of malicious and faulty peers. Such peers may hinder other peers in accessing the keys in various ways. In this paper we identify various types of attacks and propose, where possible, some countermeasures. To counter man-in-the-middle attacks we have developed a dynamically-adjustable multi-path routing algorithm. We evaluate the efficacy of our method both analytically and by simulation. For networks with less than 1% malicious peers we were able to reduce the effect of such attacks by 80%.\",\"PeriodicalId\":166700,\"journal\":{\"name\":\"3rd Annual Communication Networks and Services Research Conference (CNSR'05)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-05-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"3rd Annual Communication Networks and Services Research Conference (CNSR'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CNSR.2005.39\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CNSR.2005.39","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malicious behaviour in content-addressable peer-to-peer networks
Distributed hash tables (DHTs) promise to manage huge sets of key-value pairs in a peer-to-peer manner. The content-addressable network (CAN) is a prominent variant of DHT. A critical challenge when designing a CAN, or indeed any DHT, is ensuring that all data items are accessible despite the presence of malicious and faulty peers. Such peers may hinder other peers in accessing the keys in various ways. In this paper we identify various types of attacks and propose, where possible, some countermeasures. To counter man-in-the-middle attacks we have developed a dynamically-adjustable multi-path routing algorithm. We evaluate the efficacy of our method both analytically and by simulation. For networks with less than 1% malicious peers we were able to reduce the effect of such attacks by 80%.