Distributed Hash Table-based overlays are widely used to support efficient information routing and storage in structured peer-to-peer networks, but they are also subject to numerous attacks aimed at disrupting their correct functioning. In this paper we analyze the impact of the Eclipse attack on a Chord-based overlay in terms of number of key lookups intercepted by a collusion of malicious nodes. Moreover, we propose some modifications to the Chord routing protocol in order to mitigate its effects. Such countermeasures can operate in a distributed fashion or assume the presence of a centralized trusted entity and introduce a limited traffic overhead. The effectiveness of the proposed mitigation techniques has been shown through numerical results.
Mitigation of the eclipse attack in chord overlays / Rottondi, C.; Panzeri, A.; Yagne, C.; Verticale, G.. - In: PROCEDIA COMPUTER SCIENCE. - ISSN 1877-0509. - ELETTRONICO. - 32(2014), pp. 1115-1120. ((Intervento presentato al convegno 5th International Conference on Ambient Systems, Networks and Technologies, ANT 2014 and 4th International Conference on Sustainable Energy Information Technology, SEIT 2014; tenutosi a Hasselt (Belgium) nel 2 June 2014 through 5 June 2014.
Titolo: | Mitigation of the eclipse attack in chord overlays |
Autori: | |
Data di pubblicazione: | 2014 |
Rivista: | |
Abstract: | Distributed Hash Table-based overlays are widely used to support efficient information routing an...d storage in structured peer-to-peer networks, but they are also subject to numerous attacks aimed at disrupting their correct functioning. In this paper we analyze the impact of the Eclipse attack on a Chord-based overlay in terms of number of key lookups intercepted by a collusion of malicious nodes. Moreover, we propose some modifications to the Chord routing protocol in order to mitigate its effects. Such countermeasures can operate in a distributed fashion or assume the presence of a centralized trusted entity and introduce a limited traffic overhead. The effectiveness of the proposed mitigation techniques has been shown through numerical results. |
Appare nelle tipologie: | 4.1 Contributo in Atti di convegno |
File in questo prodotto:
File | Descrizione | Tipologia | Licenza | |
---|---|---|---|---|
chord mitigation.pdf | articolo principale | 2a Post-print versione editoriale / Version of Record | Non Pubblico - Accesso privato/ristretto | Administrator Richiedi una copia |
http://hdl.handle.net/11583/2722755