A Testbed-based Analysis of the Incorrect Lookup Routing Attack on the Pastry DHT
نویسندگان
چکیده
Distributed Hashtables (DHT), with Pastry [2] as a prominent representative, are one of the most recent peer-to-peer (P2P) architectures. DHTs scale well to the network size due to a small routing table and a hierarchical routing scheme. In Pastry, the number of routing entries scales logarithmically with respect to the number of participating nodes, because each node maintains route entries to only a few nodes per hierarchical (sub) domain. Therefore, routing requests have to be be forwarded by intermediate nodes to the final destination. In order to route successfully, each node has to behave benignly according to the protocol specifications. The Incorrect Lookup Routing attack [4] misuses this routing scheme to launch a denial of service attack on the P2P network. While this kind of routing attack was extensively analyzed theoretically and by simulations, to the best of our knowledge, testbed based evaluations have not been performed to date. Such an evaluation may reveal unnoticed influences or (at least) verifies the impact of malicious nodes on a P2P network. Therefore, a testbed evaluation of the Incorrect Lookup Routing attack is presented in this paper.
منابع مشابه
A Testbed-based Visualization of Misbehavior in Peer-to-Peer Systems
The Pastry [2] Distributed Hastable (DHT) provides decentralized peer-to-peer services in a scalable and efficient manor. Peers do not have to provide links to each node in the network, but only to a small subset of nodes. Due to this, lookup requests for services offered in the peer-to-peer system mostly can not be sent to the destination directly, but have to be forwarded to a node that is lo...
متن کاملVulnerabilities and Security Threats in Structured Peer-to-Peer Systems: A Quantitative Analysis
A number of recent structured Peer-to-Peer (P2P) systems are built on top of distributed hash table (DHT) based P2P overlay networks. Almost all DHT-based schemes employ a tight-deterministic data placement and ID mapping schemes. This feature on one hand provides assurance on location of data if it exists, within a bounded number of hops, and on the other hand, opens doors for malicious nodes ...
متن کاملSpeedy : a Sybil-resistant DHT implementation*
Distributed hash tables (DHTs) are common services that leverage peer-to-peer (P2P) communication to provide a distributed key value service across nodes in a network. e tasks of nodes in a distributed hash table include storing key/value pairs and providing values for lookup requests or rerouting requests to other nodes. A public DHT should be able to handle nodes joining and leaving arbitrar...
متن کاملH-Pastry: An Adaptive Multi-level Overlay Inter-Network
Overlay networks are widely used for locating and disseminating information, by means of custom routing and forwarding on top of the underlying network. Distributed Hash Table (DHT) based overlays provide flexibility coupled with good scalability and load balancing properties. However, this comes at the cost of inefficient routing, caused by the lack of adaptation to the underlying network: cur...
متن کاملA Routing Mechanism by Distance - weighted Bloom Filter *
Bloom filters are used for resource routing and distance-weighted Bloom filters (dwBFs) are used as a concise representation of routing information for scattered resources in overlay networks. Today's DHT-based P2P lookups are always influenced by unnecessarily long routers in the underlay network. The reason is that the false positives appearing in DHT lookup can lead to incorrect direction. T...
متن کامل