Collaborative Anomaly Detection For Structured P2P Networks

被引:0
作者
Wang, Wei [1 ]
Man, Hong [1 ]
He, Fangming [1 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
来源
GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8 | 2009年
关键词
Anomaly Detection; Peer-to-Peer Networks; Network Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Anomaly detection in Peer-to-Peer (P2P) networks is generally difficult due to the large number of users in the network. Exhaustive probing on each user is extremely unrealistic. Besides, unlike hierarchical systems, the infrastructure of a P2P network is flat, which makes multi-casting based probing schemes impossible. Most P2P security research focus on proactive prevention schemes to secure the system. In this paper, we aim to apply passive anomaly detection to estimate the proportion of malicious nodes in the network, without any network parameter information. Two deployment schemes are proposed for different network attacks. We deploy monitoring nodes which maintain both in- and out-of-band P2P communications. Monitoring nodes collaboratively probe one another periodically, and observations at each monitoring node are aggregated by a token message. Simulation results show that after applying our anomaly detection system, we can estimate the status of malicious nodes in a P2P network with high accuracy, and the delivery rate of the network is noticeably increased after successfully blocking suspicious nodes.
引用
收藏
页码:3116 / 3121
页数:6
相关论文
共 9 条
[1]  
[Anonymous], ANN REPORT
[2]   OverSim: A flexible overlay network simulation framework [J].
Baumgart, Ingmar ;
Heep, Bernhard ;
Krause, Stephan .
2007 IEEE GLOBAL INTERNET SYMPOSIUM, 2007, :79-84
[3]  
Castro M., 2002, OSDI
[4]   Defending the Sybil attack in P2P networks: Taxonomy, challenges, and a proposal for self-registration [J].
Dinger, Jochen ;
Hartenstein, Hannes .
FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, :756-+
[5]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[6]   Limiting sybil attacks in structured P2P networks [J].
Rowaihy, Hosam ;
Enck, William ;
McDaniel, Patrick ;
La Porta, Thomas .
INFOCOM 2007, VOLS 1-5, 2007, :2596-+
[7]  
Shitrit S, 2008, IEEE ACM INT SYMP, P33, DOI 10.1109/CCGRID.2008.54
[8]  
Stoica I., 2001, P 2001 ACM SIGCOMM C, P149
[9]   Message dropping attacks in overlay networks: Attack detection and attacker identification [J].
Xie, Liang ;
Zhu, Sencun .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (03)