Towards Scalable and Robust Overlay Networks
نویسندگان
چکیده
Every peer-to-peer system is based on some overlay network connecting its peers. Many of the overlay network concepts proposed in the scientific community are based on the concept of virtual space. These designs are usually highly scalable, but they do not guarantee robustness against adversarial attacks, especially when considering open peer-to-peer systems. In these systems, determined adversaries may start both insider and outsider attacks in order to harm the overlay network as much as this is possible. We will focus on insider attacks in which the adversarial peers in the network perform join-leave attacks, and we will consider outsider attacks in which an adversary can perform a denial-of-service attack against any of the honest peers in the network. Strategies have been proposed that can defend an overlay network against even massive join-leave attacks, and strategies are also known that can defend an overlay network against limited denial-of-service attacks. However, none of these can protect an overlay network against combinations of these attacks. We illustrate in this paper why it is not easy to design strategies against these attacks and propose join and leave protocols for overlay networks based on the concept of virtual space that can make them provably robust against these attacks without creating
منابع مشابه
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...
متن کاملERAS: Efficient, Robust, Adaptive, and Scalable Service Composition in Overlay Networks
The importance of the component service model has been widely recognized in the Internet community due to its high flexibility in creating customized applications from primitive services in a plug-and-play manner. Deployment of such a service model in the wide area networks spawns a new type of routing problem QoS service-added routing, that is far more complex than the traditional QoS routing ...
متن کاملSecuring the Scalable Source Routing Protocol
The Scalable Source Routing (SSR) protocol combines overlay-like routing in a virtual network structure with source routing in the physical network to a single cross-layer architecture. Thereby, it can provide indirect routing in networks that lack a well-crafted structure. SSR is well suited for mobile ad hoc networks, sensor-actuator networks, and especially for mesh networks. Moreover, SSR d...
متن کاملTowards Data Mining in Large and Fully Distributed Peer-to-Peer Overlay Networks
The Internet, which is becoming a more and more dynamic, extremely heterogeneous network has recently became a platform for huge fully distributed peer-to-peer overlay networks containing millions of nodes typically for the purpose of information dissemination and file sharing. This paper targets the problem of analyzing data which are scattered over a such huge and dynamic set of nodes, where ...
متن کاملTowards Distributed Context Management in Ambient Networks
Context information makes applications and networks aware of their situation. A scalable and distributed architecture consisting of context sources, context processors, and context sinks as basic components is proposed, together with an outline of a client-server protocol between these components. Two important functions of this architecture are context coordination and context management, whic...
متن کامل