Novel Sybil Defense Scheme for Peer-to-peer Applications

被引:0
|
作者
Shamieh, Fuad [1 ]
Alharbi, Roa [1 ]
机构
[1] Univ Western Ontario, Dept Elect & Comp Engn, London, ON, Canada
来源
2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC) | 2018年
关键词
component; peer-to-peer; proactive; sybil attack; OVERLAY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The importance of peer-to-peer (P2P) network overlays produced enormous interest in the research community due to their robustness, scalability, and increase of data availability. P2P networks are overlays of logically connected hosts and other nodes including servers. P2P networks allow users to share their files without the need for any centralized servers. Since P2P networks are largely constructed of end-hosts, they are susceptible to abuse and malicious activity, such as sybil attacks. Impostors perform sybil attacks by assigning nodes multiple addresses, as opposed to a single address, with the goal of degrading network quality. Sybil nodes will spread malicious data and provide bogus responses to requests. To prevent sybil attacks from occurring, a novel defense mechanism is proposed. In the proposed scheme, the DHT key-space is divided and treated in a similar manner to radio frequency allocation incensing. An overlay of trusted nodes is used to detect and handle sybil nodes with the aid of source-destination pairs reporting on each other. The simulation results show that the proposed scheme detects sybil nodes in large sized networks with thousands of interactions.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Mitigating Peer-to-Peer Botnets by Sybil attacks
    Zhou Hangxia
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 241 - 243
  • [2] Defending Against sybil-attacks in Peer-to-Peer Networks
    Xu Xiang
    Lu Huijuan
    Chen Lianna
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 329 - 340
  • [3] Defeating against sybil-attacks in peer-to-peer networks
    Xiang, Xu
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1218 - 1222
  • [4] A Sybil-Resilient Peer-to-Peer Network Protocol
    Xu Xiang
    Zhou Hangxia
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 682 - 685
  • [5] Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets
    Wang, Tian-Zuo
    Wang, Huai-Min
    Liu, Bo
    Ding, Bo
    Zhang, Jing
    Shi, Pei-Chang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2731 - 2749
  • [6] A NOVEL SCHEME TO REDUCE AMONG-PEER-DELAY FOR PEER-TO-PEER LIVE STREAMING
    Gu Qiang
    Xia Yehan
    Zou Hua
    Yang Fangchun
    PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2009, : 675 - 680
  • [7] Containing Sybil Attacks on Trust Management Schemes for Peer-to-Peer Networks
    Cai, Lin
    Rojas-Cessa, Roberto
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 841 - 846
  • [8] Security applications of peer-to-peer networks
    Vlachos, V
    Androutsellis-Theotokis, S
    Spinellis, D
    COMPUTER NETWORKS, 2004, 45 (02) : 195 - 205
  • [9] A novel peer-to-peer payment protocol
    Daras, P
    Palaka, D
    Giagourta, V
    Bechtsis, D
    Petridis, K
    Strintzis, MG
    IEEE REGION 8 EUROCON 2003, VOL A, PROCEEDINGS: COMPUTER AS A TOOL, 2003, : 2 - 6
  • [10] Peer-to-peer video delivery scheme for large scale video-on-demand applications
    Huang, SY
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (12) : 3621 - 3626