DocumentCode :
3276424
Title :
Adaptive membership maintenance under the sybil attack coupled with churn in P2P networks
Author :
Haowen Liu ; Fei Wang
Author_Institution :
Int. Sch. of Software, Wuhan Univ., Wuhan, China
fYear :
2013
fDate :
23-25 May 2013
Firstpage :
545
Lastpage :
549
Abstract :
Churn refers the continuous process of node arrival and departure in distributed peer-to-peer network. Enormous nodes joining the system concurrently will results in a flash crowd scenario for special nodes in the system, and enormous nodes crashing in a moment might come out a broken network. Sybil attack refers to the attack against identify in which a malicious user obtains multiple fake identities and pretends to be distinct nodes around honest nodes in the system simultaneous. By controlling a large fraction of the system, or a large fraction of the local scope, the malicious user can take further boring actions like DDoS attacks, False Voting, Invalid DHT routing, identifying worm spam and so on. It is so difficult to predict or defense the sybil attacks with the nature of the open and anonymous in P2P networks. Even though we can identify some sybil nodes or edges, the malicious nodes can leave the network at the same time, result in stronger churn attack and is not forbidden, that case should be seriously noticed. In this paper, we present a novel protocol with positive communication policy among peers and adaptive neighbor maintenance scheme under sybil coupled with the churn, to try to keep the normal nodes around, to keep desirable properties such as a low network diameter and clustering. The protocol is resilient against the sybil and churn, and fit for information dissemination and file sharing in unstructured P2P systems especially.
Keywords :
computer network security; invasive software; peer-to-peer computing; telecommunication network routing; DDoS attacks; P2P networks; Sybil attack; adaptive neighbor maintenance scheme; churn; churn attack; continuous node arrival process; continuous node departure process; distributed peer-to-peer network; false voting; information dissemination; invalid DHT routing; low network clustering; low network diameter; malicious nodes; multiple fake identities; worm spam identification; Artificial neural networks; Computer crashes; Niobium; Peer-to-peer computing; Protocols; Routing; Churn; P2P; Sybil;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on
Conference_Location :
Beijing
ISSN :
2327-0586
Print_ISBN :
978-1-4673-4997-0
Type :
conf
DOI :
10.1109/ICSESS.2013.6615368
Filename :
6615368
Link To Document :
بازگشت