Prevention of Index-Poisoning DDoS Attacks in Peer-to-Peer File-Sharing Networks
نویسندگان
چکیده
A major security threat to the normal use and legal sharing of peer-to-peer (P2P) resources is DDoS (distributed denial-of-service) attacks caused by file index poisoning. This type of attacks exploits the design vulnerability of P2P networks. By populating unprotected peers with poisoned file indexes, attacker can cause DDoS flooding attacks on arbitrary hosts, even outside of the P2P network. We solve the index-poisoning problem in P2P file-sharing systems using identity-based cryptography to establish peer accountability. With accountability, all peers remain anonymous but their file indexes can be traced back to the original sending address without contacting the sender. We prove that accountability effectively prevents a peer from launching indexpoisoning attacks. A new reliable index-exchange protocol (RIEP) is proposed to enforce peer accountability. This protocol is applicable to all P2P file-sharing networks, either structured or unstructured. The system is designed to allow gradual transition of peers to become RIEP-enabled. We develop analytical models to characterize the poison propagation patterns with and without RIEP defense. These poisoning models are validated by simulated RIEP experiments on P2P networks over one million nodes. The reported experimental results support the advantages predicted by the theoretical models. These results prove the effectiveness of using RIEP to prevent index-poisoning DDoS attacks. We also discuss the implementation of the RIEP scheme and its limitations in real-life P2P networks.
منابع مشابه
A Distributed Denial-of-Service(DDoS) Attack using BitTorrent Peer-to-Peer(P2P) Network
Recently, many hackers attacks are done with a distributed denial of service (DDoS) strategy. Most famous centralized peer to peer (P2P) networks can be easily used for realize these attacks. File-sharing protocols such BitTorrent or an extension of Gnutella use centralized server for orchestrate 7-level connections between peers. This procedure create a point-of-failure because malicious centr...
متن کاملA Survey of Peer-to-Peer Attacks and Counter Attacks
-Peer-to-Peer (P2P) network is a distributed network architecture that partitions tasks or workloads among peers (nodes). Similar to traditional Internet, P2P networks are open to many attacks. In this research work we survey the defensive measures against general attacks as well as P2P specific attacks. We take BitTorrent (a P2P communications protocol for file sharing) as an example to illust...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملCooperative Defence Against DDoS Attacks
Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) cannot detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this paper, we propose a distributed approach to defe...
متن کاملPreventing DDoS attacks on internet servers exploiting P2P systems
Recently, there has been a spurt of work [1–7] showing that a variety of extensively deployed P2P systems may be exploited to launch DDoS attacks on web and other Internet servers, external to the P2P system. In this paper, we dissect these attacks and categorize them based on the underlying cause for attack amplification. We show that the attacks stem from a violation of three key principles: ...
متن کامل