Detecting and recovering from overlay routing attacks in peer-to-peer distributed hash tables | | Posted on:2010-02-18 | Degree:M.S | Type:Thesis | | University:Rochester Institute of Technology | Candidate:Needels, Keith | Full Text:PDF | | GTID:2448390002488923 | Subject:Computer Science | | Abstract/Summary: | PDF Full Text Request | | Distributed hash tables (DHTs) provide efficient and scalable lookup mechanisms for locating data in peer-to-peer (P2P) networks. A number of issues, however, prevent DHT based P2P networks from being widely deployed. One of these issues is security. DHT protocols rely on the users of the system to cooperate for lookup requests to successfully reach the correct destination. Users who fail to run the protocol correctly can severely limit the functionality of these systems. The fully distributed nature of DHTs compounds these security issues, as any security mechanism must be implemented in a non-centralized fashion for the system to remain truly P2P.;This thesis examines the security issues facing DHT protocols, and we propose an extension to one such protocol (called Chord) to mitigate the effects of attacks on the underlying lookup message routing mechanism when a minority of nodes in the system are malicious. Our modifications require no trust to exist between nodes in the network except during the joining process. Instead, each node makes use of locally known information about the network to evaluate hops encountered during the lookup routing process for validity. Hops that are determined to be invalid are avoided. These modifications to the Chord protocol have been implemented in a simulator and then evaluated in the presence of malicious nodes. We present the results of this evaluation and compare them to the results obtained when running the unmodified Chord protocol. | | Keywords/Search Tags: | P2P, DHT, Routing, Lookup, Protocol | PDF Full Text Request | Related items |
| |
|