• DocumentCode
    3316433
  • Title

    Securing Overlay Activities of Peers in Unstructured P2P Networks

  • Author

    Park, Jun-Cheol ; Yu, Geonu

  • Author_Institution
    Dept. of Comput. Eng., Hongik Univ., Seoul
  • Volume
    2
  • fYear
    2006
  • fDate
    3-6 Nov. 2006
  • Firstpage
    1105
  • Lastpage
    1108
  • Abstract
    This paper discusses how to secure overlay activities of peers on overlay level messages exchanged in unstructured P2P networks. We identify some attacks that can be effectively handled by appropriate cryptographic means. We then give a detection method against those attacks including message modification, replay attack, and message generation with wrong information. The method presumes the existence of a set of CAs, which are consulted when peers are newly joining the network and otherwise uninvolved in the peer activities. We also address the attack of a peer´s illegal dropping of relaying messages, which is hard to be traced to its doer even with the assist of cryptographic means. We propose an audit and topology adaptation technique to confine and weaken the ill effect of such an attack on other peers in the network. We demonstrate the effectiveness of the technique using a modified GnutellaSim (Q. He et al., 2003) simulator with respect to various metrics. Being based upon a generic overlay model, the proposed techniques can be applied to any unstructured P2P network either separately or all together
  • Keywords
    cryptography; peer-to-peer computing; attack detection; audit technique; cryptography; message generation; message modification; modified GnutellaSim; overlay level messages exchange; peer overlay activity security; relaying message illegal dropping; replay attack; topology adaptation; unstructured P2P networks; wrong information; Computer networks; Content addressable storage; Context-aware services; Network topology; Peer to peer computing; Protection; Public key cryptography; Relays; Robustness; Routing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Security, 2006 International Conference on
  • Conference_Location
    Guangzhou
  • Print_ISBN
    1-4244-0605-6
  • Electronic_ISBN
    1-4244-0605-6
  • Type

    conf

  • DOI
    10.1109/ICCIAS.2006.295433
  • Filename
    4076129