Detection and Removal of Malicious Peers in Gossip-Based Protocols∗
نویسندگان
چکیده
In addition to the popular structured peer-to-peer (P2P) overlays [2], a class of P2P protocols rely purely on gossip-based communication in an unstructured communication topology [6]. Examples of problems that can be solved through these protocols include membership management, information dissemination (as in lpbcast [5] and newscast [7]), and computation of aggregate functions (such as average and maximum) over distributed collections of numeric values [8, 10]. Since they do not rely on specific topologies such as trees, rings, butterflies, etc., gossip-based protocols over unstructured topologies are potentially more robust to massive benign failures. They are also extremely responsive and can adapt rapidly to changes in the underlying communication structure. And finally, they can be used as robust components to build other protocols. For example, [12] describes a technique for repairing or jump-starting a structured overlay using newscast. Properties that make unstructured gossip-based protocols attractive (in particular responsiveness and adaptivity) when all peers cooperate correctly become a detriment when even a small number of peers may be malicious and compromise the integrity of the system. In our opinion, a broader and more significant exploitation of the gossip paradigm will be possible only if we can develop a better understanding of the issues related to security in such protocols. This short paper is aimed at raising the problem and suggesting some initial ideas towards solutions. We first give a brief overview of the gossip paradigm. Then, we introduce a general framework for solving the security problem in such systems. Finally, we illustrate some preliminary results for the case of an aggregation protocol.
منابع مشابه
DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملGGRA: a grouped gossip-based reputation aggregation algorithm
An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملHeal Gossip: A Secure Overlay for Unstructured P2P Networks
Gossip-based protocols are an e cient mechanism for man-aging pure unstructured peer-to-peer (P2P) networks. Such protocols are Newscast, Cyclone, Lbpcast, etc. They have overcome from several di culties of such P2P random overlay connection. Such difficulties are randomness, high churn rate, very large unstructured distributed net-work, etc. But the performance of all gossip-based protocols ha...
متن کاملTowards Secure Epidemics: Detection and Removal of Malicious Peers in Epidemic-Style Protocols
In this paper we address the problem of maintaining integrity in the presence of malicious peers in a large class of epidemic-style protocols. This class includes membership management, information dissemination and proactive aggregation. We present solutions to the problems of identifying non-cooperating (malicious) nodes and removing them from the system. Our solutions are fully decentralized...
متن کامل