A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks

被引:0
作者
Trifa, Zied [1 ]
Khemakhem, Maher [2 ]
机构
[1] Univ Sfax, Dept Comp Sci, Sfax, Tunisia
[2] Univ King Abdulaziz, Coll Comp & Informat Technol, Jedda, Saudi Arabia
来源
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) | 2017年
关键词
structured p2p overlay networks; malicious nodes; monitoring; mitigation;
D O I
10.1109/AICCSA.2017.224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Structured p2p overlay networks are vulnerable to malicious nodes which can control more than one identities. In such situation, they can mediate and monitor most overlay traffic. The decentralized and dynamic nature of such systems makes the detection of these nodes a very difficult task. In this paper we present a framework for monitoring and mitigating malicious attacks. We argued that monitoring traffic allows us to identify suspicious behavior. Our key idea is to divide the overlay into zones to reduce the number of monitors and capture traffic without disruption the routing protocol. Our solution generates measurements on the whole network and provides a Preset profile, finding a set of peers with malicious behavior that do not follow this profile. Evaluation shows that our framework has a good performance and can detect malicious nodes that are intended to malign the overlay.
引用
收藏
页码:128 / 134
页数:7
相关论文
共 12 条
[11]  
Visan A., 2011, Proceedings 2011 10th International Symposium on Parallel and Distributed Computing (ISPDC 2011), P232, DOI 10.1109/ISPDC.2011.41
[12]   Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce [J].
Wang, Guojun ;
Musau, Felix ;
Guo, Song ;
Abdullahi, Muhammad Bashir .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (03) :824-833