Exploiting Trust in Peer-to-Peer Systems
نویسندگان
چکیده
Second generation peer-to-peer systems [5, 6] have shown a lot of promise with many desirable properties such as scalability, self-configuration, automatic load balancing etc. However the open nature of these systems also makes them vulnerable to Byzantine attacks. These systems are designed to be fault tolerant in the presence of a few malicious nodes. We however believe that even a handful of evil nodes could disrupt the system by exploiting certain weaknesses that we have identified. In these systems, a single maclicious node, can present multiple identities to the system. This allows them to emulate multiple nodes simultaneously and also allows them limited control of their placement in overlay networks[4, 7] that are integral to the system. We devised attacks based on these weaknesses to disrupt lookup and storage operations in the peer-to-peer storage systems, CFS[5] and PAST[6]. We show that it is possible to exploit these weaknesses to attack these systems and have evaluated the feasibility of these attacks.
منابع مشابه
A Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملTrust-aware Decentralized Recommender Systems: PhD research proposal
This PhD thesis addresses the following problem: exploiting of trust information in order to enhance the accuracy and the user acceptance of current Recommender Systems (RS). RSs suggest to users items they will probably like. Up to now, current RSs mainly generate recommendations based on users’ opinions on items. Nowadays, with the growth of online communities, emarketplaces, weblogs and peer...
متن کامل