Towards Sybil-resilient P2P Networks
نویسندگان
چکیده
Recently, Sybil attack has become one of the most visible security problems in the peer to peer networks where it is not possible to depend on trusted authorities for admission control or maintenance. In such networks or in any open distributed systems, an adversary creates many fake identities in order to increase its influence and deny service to honest participants. Defending against this attack is challenging because creating many fake identities is cheap. In this project, our contributions are two-fold. Our main contribution is a sybil-resistant Distributed Hash Table, where sybil nodes can join, but the routing algorithm for an honest node can effectively bypass the sybil identities. Our method assumes that each node have direct knowledge about their neighbors and have established social trust relationships with them. With this knowledge in hand, our methods uses gossip algorithms to assign IDs to the nodes in a distributed manner. The IDs are linear binary codes (for instance, extended Golay codes) which constitutes the XOR based routing mechanism for the distributed hash table “Plexus.” Existing sybil-proof DHTs either depend on explicit ID generation, or routings take grossly suboptimal paths, or the finger table size becomes larger. However, our scheme successfully manages all of these parameters and as a added benefit of Plexus, offers disjoint diversified optimal routes and mirroring capability for fault tolerance. Based on these findings, we have also presented a layered architecture of a distributed admission control and maintenance scheme for a peer to peer network, which is our second contribution.
منابع مشابه
Survey of Sybil Attacks in Social Networks
This paper reviews the Sybil attack in social networks, which has the ability to compromise the whole distributed network. In the Sybil attack, the malicious user claims multiple identities to compromise the whole network. Sybil attacks can be used to change the overall ranking in voting applications, bad-mouth an opinion, access resources or to break the trust mechanism behind a P2P network. I...
متن کاملiPersea : The Improved Persea with Sybil Detection Mechanism
P2P systems are highly susceptible to Sybil attacks, in which an attacker creates a large number of identities and uses them to control a substantial fraction of the system. Persea is the most recent approach towards designing a social network based Sybil-resistant DHT. Unlike prior Sybil-resistant P2P systems based on social networks, Persea does not rely on two key assumptions: (i) that the s...
متن کاملAnalysis of Peer-to-Peer Botnet Attacks and Defenses
A “botnet” is a network of computers that are compromised and controlled by an attacker (botmaster). Botnets are one of the most serious threats to today’s Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Due to the distributive nature of P2P networks, ...
متن کاملA Survey of Peer-to-Peer Attacks and Counter Attacks
-Peer-to-Peer (P2P) network is a distributed network architecture that partitions tasks or workloads among peers (nodes). Similar to traditional Internet, P2P networks are open to many attacks. In this research work we survey the defensive measures against general attacks as well as P2P specific attacks. We take BitTorrent (a P2P communications protocol for file sharing) as an example to illust...
متن کاملSyMon: A practical approach to defend large structured P2P systems against Sybil Attack
Sybil attack is one of the most challenging problems that plague current decentralized Peer-toPeer(P2P) systems. In Sybil attack, a single malicious user creates multiple peer identities known as sybils. These sybils are employed to target honest peers and hence subvert the system. In this paper, we describe a novel solution that enables all honest peers to protect themselves from sybils with h...
متن کامل