可内容寻址的点对点网络中的恶意行为

Thomas Reidemeister, Klemens Böhm, Paul A. S. Ward, Erik Buchmann
{"title":"可内容寻址的点对点网络中的恶意行为","authors":"Thomas Reidemeister, Klemens Böhm, Paul A. S. Ward, Erik Buchmann","doi":"10.1109/CNSR.2005.39","DOIUrl":null,"url":null,"abstract":"Distributed hash tables (DHTs) promise to manage huge sets of key-value pairs in a peer-to-peer manner. The content-addressable network (CAN) is a prominent variant of DHT. A critical challenge when designing a CAN, or indeed any DHT, is ensuring that all data items are accessible despite the presence of malicious and faulty peers. Such peers may hinder other peers in accessing the keys in various ways. In this paper we identify various types of attacks and propose, where possible, some countermeasures. To counter man-in-the-middle attacks we have developed a dynamically-adjustable multi-path routing algorithm. We evaluate the efficacy of our method both analytically and by simulation. For networks with less than 1% malicious peers we were able to reduce the effect of such attacks by 80%.","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Malicious behaviour in content-addressable peer-to-peer networks\",\"authors\":\"Thomas Reidemeister, Klemens Böhm, Paul A. S. Ward, Erik Buchmann\",\"doi\":\"10.1109/CNSR.2005.39\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Distributed hash tables (DHTs) promise to manage huge sets of key-value pairs in a peer-to-peer manner. The content-addressable network (CAN) is a prominent variant of DHT. A critical challenge when designing a CAN, or indeed any DHT, is ensuring that all data items are accessible despite the presence of malicious and faulty peers. Such peers may hinder other peers in accessing the keys in various ways. In this paper we identify various types of attacks and propose, where possible, some countermeasures. To counter man-in-the-middle attacks we have developed a dynamically-adjustable multi-path routing algorithm. We evaluate the efficacy of our method both analytically and by simulation. For networks with less than 1% malicious peers we were able to reduce the effect of such attacks by 80%.\",\"PeriodicalId\":166700,\"journal\":{\"name\":\"3rd Annual Communication Networks and Services Research Conference (CNSR'05)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-05-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"3rd Annual Communication Networks and Services Research Conference (CNSR'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CNSR.2005.39\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CNSR.2005.39","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

分布式哈希表(dht)承诺以点对点的方式管理大量的键值对。内容可寻址网络(CAN)是DHT的一个突出变体。在设计CAN或任何DHT时,一个关键的挑战是确保所有数据项都是可访问的,尽管存在恶意和错误的对等点。这样的对等体可能会以各种方式阻碍其他对等体访问密钥。在本文中,我们识别了各种类型的攻击,并在可能的情况下提出了一些对策。为了对抗中间人攻击,我们开发了一种动态可调的多路径路由算法。我们通过分析和仿真来评估我们的方法的有效性。对于恶意节点少于1%的网络,我们能够将此类攻击的影响降低80%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Malicious behaviour in content-addressable peer-to-peer networks
Distributed hash tables (DHTs) promise to manage huge sets of key-value pairs in a peer-to-peer manner. The content-addressable network (CAN) is a prominent variant of DHT. A critical challenge when designing a CAN, or indeed any DHT, is ensuring that all data items are accessible despite the presence of malicious and faulty peers. Such peers may hinder other peers in accessing the keys in various ways. In this paper we identify various types of attacks and propose, where possible, some countermeasures. To counter man-in-the-middle attacks we have developed a dynamically-adjustable multi-path routing algorithm. We evaluate the efficacy of our method both analytically and by simulation. For networks with less than 1% malicious peers we were able to reduce the effect of such attacks by 80%.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信