Vulnerabilities and Security Threats in Structured Peer-to-Peer Systems: A Quantitative Analysis
نویسندگان
چکیده
A number of recent structured Peer-to-Peer (P2P) systems are built on top of distributed hash table (DHT) based P2P overlay networks. Almost all DHT-based schemes employ a tight-deterministic data placement and ID mapping schemes. This feature on one hand provides assurance on location of data if it exists, within a bounded number of hops, and on the other hand, opens doors for malicious nodes to lodge attacks that can potentially thwart the functionality of the P2P system. This paper studies several serious security threats in DHT-based P2P systems through three targeted attacks at the P2P protocol layer. The first attack explores the routing anomalies that can be caused by malicious nodes returning incorrect lookup routes. The second attack targets the tight data placement scheme. We show that replication of data items, by itself, is insufficient to secure the data items. The third attack targets the ID mapping scheme. We disclose that the malicious nodes can target any specific data item in the system; and corrupt/modify the data item to its favor. For each of these attacks, we provide quantitative analysis to estimate the extent of damage that can be caused by the attack; followed by an experimental validation and defenses to guard the DHT-based P2P systems and counteract such attacks.
منابع مشابه
Taxonomy of Structured P2P Overlay Networks Security Attacks
The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this paper, we attempt to provide a taxonomy of structured P2P overlay networks security attacks. We have specially focused on the way these attacks can arise at each level of the network. Moreove...
متن کاملReviewing Security and Privacy Aspects in Combined Mobile Information System (CMIS) for health care systems
Medical area has been benefited by the use of ICT (Information and Communication Technology) in recent days. CMIS (Combined Mobile Information System), our proposed model system, is such a system targeted for health care system. IMIS (Integrated Mobile Information System), a system for diabetic healthcare, which is being developed in Blekinge Institute of Technology will be taken as a case stud...
متن کاملTAC: A Topology-Aware Chord-based Peer-to-Peer Network
Among structured Peer-to-Peer systems, Chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. However, Chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing late...
متن کاملExplaining the characteristics of peer-to-peer learning: A qualitative study
Explaining the characteristics of peer-to-peer learning: A qualitative study Introduction: Learning through peers is an educational method. Explaining the characteristics of learning with the help of peers has not been done in a study, so the purpose of this study was to explain the characteristics of learning with the help of peers. Materials and Methods: This qualitative study was perfo...
متن کاملClassification of BitTorrent Attacks from the Protocol’s Operational Viewpoints
As the BitTorrent has become one of the most popular peer-to-peer file sharing systems, various security threats appear based on its operation. In this paper, we analyzed the vulnerabilities of the BitTorrent protocol, and surveyed existing attacks on the protocol. Then, we classified the attacks from the protocol’s operational viewpoints. Basically, the protocols are categorized into two parts...
متن کامل