• DocumentCode
    11507
  • Title

    A Model to Quantify the Success of a Sybil Attack Targeting RELOAD/Chord Resources

  • Author

    Uruena, Manuel ; Cuevas, Ruben ; Cuevas, Andres ; Banchs, Albert

  • Author_Institution
    Dept. of Telematic Eng., Univ. Carlos III de Madrid, Leganes, Spain
  • Volume
    17
  • Issue
    2
  • fYear
    2013
  • fDate
    Feb-13
  • Firstpage
    428
  • Lastpage
    431
  • Abstract
    The Sybil attack is one of the most harmful security threats for distributed hash tables (DHTs). This attack is not only a theoretical one, but it has been spotted "in the wild", and even performed by researchers themselves to demonstrate its feasibility. In this letter we analyse the Sybil attack whose objective is that the targeted resource cannot be accessed by any user of a Chord DHT, by replacing all the replica nodes that store it with sybils. In particular, we propose a simple, yet complete model that provides the number of random node-IDs that an attacker would need to generate in order to succeed with certain probability. Therefore, our model enables to quantify the cost of performing a Sybil resource attack on RELOAD/Chord DHTs more accurately than previous works, and thus establishes the basis to measure the effectiveness of different solutions proposed in the literature to prevent or mitigate Sybil attacks.
  • Keywords
    computer network security; peer-to-peer computing; RELOAD-Chord DHT; RELOAD-Chord resources; Sybil resource attack mitigation; distributed hash tables; harmful security threats; random node-ID; replica nodes; Computational modeling; IP networks; Measurement; Peer to peer computing; Ports (Computers); Routing; Security; Chord; Distributed Hash Table (DHT); Kademlia; P2PSIP; REsource LOcation And Discovery (RELOAD); Sybil resource attack;
  • fLanguage
    English
  • Journal_Title
    Communications Letters, IEEE
  • Publisher
    ieee
  • ISSN
    1089-7798
  • Type

    jour

  • DOI
    10.1109/LCOMM.2013.011113.122220
  • Filename
    6412682