Maelstrom: Churn as Shelter
نویسندگان
چکیده
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving millions of user-managed machines on the Internet. In this paper we address routing-table poisoning attacks against structured overlays, in which adversaries attempt to intercept traffic and control the system by convincing other nodes to use compromised nodes as their overlay network neighbors. In keeping with the fully-decentralized goals of structured overlay design, we propose a defense mechanism that makes minimal use of centralized infrastructure. Our approach, induced churn, utilizes periodic routing-table resets, unpredictable identifier changes, and a rate limit on routing-table updates. Induced churn leaves adversaries at the mercy of chance: they have little opportunity to strategize their positions in the overlay, and cannot entrench themselves in any position that they do acquire. We implement induced churn in Maelstrom, an extension to the broadly used Bamboo distributed hash table. Our Maelstrom experiments over a simulated network demonstrate robust routing with very modest costs in bandwidth and latency, at levels of adversarial activity where unprotected overlays are rendered almost completely useless.
منابع مشابه
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving millions of user-managed machines on the Internet. In this paper we address routing-table poisoning attacks against structured overlays, in which adversaries attempt to intercept traffic and control the system by convinci...
متن کاملHierarchical Alpha-cut Fuzzy C-means, Fuzzy ARTMAP and Cox Regression Model for Customer Churn Prediction
As customers are the main asset of any organization, customer churn management is becoming a major task for organizations to retain their valuable customers. In the previous studies, the applicability and efficiency of hierarchical data mining techniques for churn prediction by combining two or more techniques have been proved to provide better performances than many single techniques over a nu...
متن کاملProject Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser
In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website;s sour...
متن کاملTranscriptional Silencing of Transposons by Piwi and Maelstrom and Its Impact on Chromatin State and Gene Expression
Eukaryotic genomes are colonized by transposons whose uncontrolled activity causes genomic instability. The piRNA pathway silences transposons in animal gonads, yet how this is achieved molecularly remains controversial. Here, we show that the HMG protein Maelstrom is essential for Piwi-mediated silencing in Drosophila. Genome-wide assays revealed highly correlated changes in RNA polymerase II ...
متن کاملmaelstrom is required for an early step in the establishment of Drosophila oocyte polarity: posterior localization of grk mRNA.
We describe a mutant, maelstrom, that disrupts a previously unobserved step in mRNA localization within the early oocyte, distinct from nurse-cell-to-oocyte RNA transport. Mutations in maelstrom disturb the localization of mRNAs for Gurken (a ligand for the Drosophila Egf receptor), Oskar and Bicoid at the posterior of the developing (stage 3-6) oocyte. maelstrom mutants display phenotypes dete...
متن کامل