Title :
Analytical Study of Adversarial Strategies in Cluster-based Overlays
Author :
Anceaume, E. ; Brasileiro, Francisco ; Ludinard, Romaric ; Sericola, Bruno ; Tronel, Frederic
Author_Institution :
CNRS IRISA, France
Abstract :
Awerbuch and Scheideler have shown that peer-to-peer overlays networks can survive Byzantine attacks only if malicious nodes are not able to predict what will be the topology of the network for a given sequence of join and leave operations. In this paper we investigate adversarial strategies by following specific protocols. Our analysis demonstrates first that an adversary can very quickly subvert DHT-based overlays by simply never triggering leave operations. We then show that when all nodes (honest and malicious ones) are imposed on a limited lifetime, the system eventually reaches a stationary regime where the ratio of polluted clusters is bounded, independently from the initial amount of corruption in the system.
Keywords :
computer network security; peer-to-peer computing; protocols; telecommunication network topology; workstation clusters; Byzantine attacks; DHT-based overlays; adversarial strategy; cluster-based overlays; malicious nodes; network topology; peer-to-peer overlays networks; polluted clusters; protocols; Computer crashes; Distributed computing; IP networks; Intrusion detection; Network topology; Open systems; Peer to peer computing; Pollution; Protocols; Upper bound; Adversary; Churn; Clusterized P2P Overlays; Collusion; Markov chain;
Conference_Titel :
Parallel and Distributed Computing, Applications and Technologies, 2009 International Conference on
Conference_Location :
Higashi Hiroshima
Print_ISBN :
978-0-7695-3914-0
DOI :
10.1109/PDCAT.2009.62