A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks

被引:0
作者
Trifa, Zied [1 ]
Khemakhem, Maher [2 ]
机构
[1] Univ Sfax, Dept Comp Sci, Sfax, Tunisia
[2] Univ King Abdulaziz, Coll Comp & Informat Technol, Jedda, Saudi Arabia
来源
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) | 2017年
关键词
structured p2p overlay networks; malicious nodes; monitoring; mitigation;
D O I
10.1109/AICCSA.2017.224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Structured p2p overlay networks are vulnerable to malicious nodes which can control more than one identities. In such situation, they can mediate and monitor most overlay traffic. The decentralized and dynamic nature of such systems makes the detection of these nodes a very difficult task. In this paper we present a framework for monitoring and mitigating malicious attacks. We argued that monitoring traffic allows us to identify suspicious behavior. Our key idea is to divide the overlay into zones to reduce the number of monitors and capture traffic without disruption the routing protocol. Our solution generates measurements on the whole network and provides a Preset profile, finding a set of peers with malicious behavior that do not follow this profile. Evaluation shows that our framework has a good performance and can detect malicious nodes that are intended to malign the overlay.
引用
收藏
页码:128 / 134
页数:7
相关论文
共 12 条
[1]  
Benter M., 2013, P NETW SYST ANN TECH
[2]  
Graffi K., PROCC IEEE INT C PEE
[3]   Monitoring and Management of Structured Peer-to-Peer Systems [J].
Graffi, Kalman ;
Stingl, Dominik ;
Rueckert, Julius ;
Kovacevic, Aleksandra ;
Steinmetz, Ralf .
2009 IEEE NINTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P 2009), 2009, :311-320
[4]   Detecting Malicious Nodes in Peer-to-Peer Streaming by Peer-Based Monitoring [J].
Jin, Xing ;
Chan, S. -H. Gary .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2010, 6 (02)
[5]  
Maurya Rajesh Kumar, 2016, P INT J ADV RES COMP, V5
[6]   Montra: A large-scale DHT traffic monitor [J].
Memon, Ghulam ;
Rejaie, Reza ;
Guo, Yang ;
Stutzbach, Daniel .
COMPUTER NETWORKS, 2012, 56 (03) :1080-1091
[7]  
STEINER M, 2007, P 5 INT WORKSH DAT I
[8]   Long Term Study of Peer Behavior in the DHT [J].
Steiner, Moritz ;
En-Najjary, Taoufik ;
Biersack, Ernst W. .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (05) :1371-1384
[9]   Fighting pollution attacks in P2P streaming [J].
Tauhiduzzaman, Md. ;
Wang, Mea .
COMPUTER NETWORKS, 2015, 79 :39-52
[10]  
Vestola M., 2010, TECHNICAL REPORTS CO