DocumentCode :
2205060
Title :
Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer Networks
Author :
Hou, Lei ; Duan, Haixin ; Wu, Jianping
Author_Institution :
Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China
fYear :
2010
fDate :
June 29 2010-July 1 2010
Firstpage :
1002
Lastpage :
1008
Abstract :
In Peer-to-Peer (P2P) networks a malicious peer can control the direction of the traffic after it controls lots of bots. This paper focus on defending Distributed Denial of Service (DDoS) attack in P2P networks by selecting the most active peer with its credit values which is recorded in a period of Credit Construction time. The Credit values can be updated in the lest period. We propose Scheduler to compute local credit values and maintain the global trust relationships. In order to assess the effectiveness of the above techniques, we extend Sybil attack and DDoS attack in simulator tool named p2psim-0.3 and implement distinguishing master and updating credit algorithms. Although we adopt tapestry protocol and Euclidean topology to implement the algorithms, the same methodology can be applied to other DHT (Distributed Hash Table)_based lookup protocols in P2P networks and topologies as well.
Keywords :
peer-to-peer computing; protocols; telecommunication network topology; telecommunication traffic; DDoS attack; Euclidean topology; P2P networks; Sybil attack; credit construction time; distributed denial of service attack; distributed hash table; lookup protocols; malicious peer; p2psim-0.3; peer-to-peer networks; tapestry protocol; Computer crime; IP networks; Network topology; Peer to peer computing; Protocols; Servers; Topology; Credit; DDoS; Peer; Select; Update;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on
Conference_Location :
Bradford
Print_ISBN :
978-1-4244-7547-6
Type :
conf
DOI :
10.1109/CIT.2010.184
Filename :
5578493
Link To Document :
بازگشت