Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks
|
|
- Melina Maxwell
- 6 years ago
- Views:
Transcription
1 Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Geert Deconinck Katholieke Universiteit Leuven Electrical Engineering Kasteelpark Arenberg 0, Leuven, Belgium Abstract Overlay networks enable applications to communicate with users without disclosing their IP addresses; hence overlay networks are used to protect applications against DoS attacks by hiding an application s location. This paper analyzes three popular overlay networks (Chord, CAN, and Pastry) by simulation to answer to this question: which topology is more favorable for location-hiding and resisting against DoS attacks? Simulation results show that a CAN overlay network has a better topology structure for location-hiding and resistance against DoS attacks than Chord and Pastry. Simulation results also show the topologies with low average vertex degree are favorable for location-hiding techniques. Introduction Denial-of-Service (DoS) attack is a major security threat against availability in the Internet [4, 6]. In a DoS attack, attackers consume resources, on which either the applications or accesses to the applications depend, making the applications unavailable to users [6]. Location-hiding is an active area to resist DoS attacks [3, 2, 5, 4]. By this technique, application sites can hide their locations (IP addresses) and thereby prevent DoS attacks. Overlay networks enable applications to communicate with users without disclosing their IP addresses; hence overlay networks are used to protect applications against DoS attacks by hiding an application s location. An overlay network is used to mediate all communications between application sites and users. As long as the mediation can be enforced, the overlay Acknowledgements: This project is partially supported by the K.U.Leuven Research Council (project GOA/2007/09) and by the European Commission (projects IST CRUTIAL and IST GRID). network is the only public interface for reaching an application site, and the application site cannot be directly attacked. Many works [5, 9, 4] have employed overlay networks for hide location as a technique for resisting DoS attack. For example Secure Overlay Services (SOS) [5] protects applications against flooding DoS attacks by installing filters around applications and only allowing traffic from secret servlets. SOS uses Chord to mediate communication between users and application sites. Mayday [] and Internet Indirection Infrastructure (i3) [0] are other examples that use overlay networks for location-hiding. A question that may be posed is that which overlay network topology is better for location-hiding? However, the effectiveness of location-hiding scheme surely relies on overlay network topology. Paper [4] based on an analytical model shows that overlay networks with low average degrees and balanced distribution of connectivity are in general good candidates for location-hiding; because they are reasonably easy to become robust and they do not have vulnerable regions to harbor attacker s impact. Furthermore [4] compares Chord [] and CAN [7] by a analytical model and show CAN is better than Chord for locationhiding. The contribution of this paper: it evaluates the performance of topologies of Chord, CAN, and Pastry [8] for location-hiding scheme by simulation. It confirms results of [4] by simulation (simulation and analytical model have same result) and shows the topologies with low average vertex degree are favorable for location-hiding technique. This paper shows by both simulation and analytical model that CAN, Chord and Pastry are better respectively. This paper also by simulation shows overlay networks have impressive role for location-hiding against DoS attacks. The rest of this paper is structured as follows. Section 2 studies location-hiding technique by overlay networks. Section 3 compares Chord, CAN, and Pastry by the analytical model. Section 4 compares Chord, CAN, and Pastry by
2 simulation model. Finally, section 5 summarize our paper. 2 Location-Hiding Technique via Overlay Networks Location-hiding technique is an important component of a complete solution to DoS attacks. It gives application sites the capability to hide their locations and thereby preventing DoS attacks, which depend on the knowledge of their victim s IP addresses. Overlay networks have been proposed as a means for location-hiding [5, 9, 4]. Figure shows generic overlay scheme to hide application location from DoS attack. We assume that an application is reachable only via the overlay network. As you can see an overlay network is used to mediate all communications among application sites. As long as the mediation can be enforced, the overlay network is the only public interface for reaching an application site, and the application site cannot be directly attacked. In this scheme, application sites do not publish their IP addresses and hide themselves behind an overlay network. The overlay network is run on a resource pool of Internet hosts. The overlay network also hides the IP addresses of their internal nodes and only edge nodes of the overlay publish their IPs to the public. Overlay nodes communicate via routing algorithm of the overlay protocol that based on a hash function of IP addresses; hence the IP addresses of internal nodes are kept secret. Users can only access the application by contacting these edge proxies. No one can easily disclose IP addresses of applications and overlay internal nodes, thereby preventing DoS attacks. If the overlay nodes are attacked, the overlay can reconfigure itself thereby removing the impact of attackers. By reconfiguration we mean that the overlay can dynamically change the location of edge and internal nodes or change its structure because the overlay has enough resource pool of Internet hosts. In this paper we use this generic model of overlay networks to compare Chord, CAN, and Pastry and try to understand which topology is the better candidate for location-hiding. 3 Comparing Chord, CAN, and Pastry by an Analytical Model An analytical model [4]: suppose that G is the graph of overlay network. The model is represented by M(G,α,β, γ). At any time t every vertex in G is in one of three states- intact, exposed, and compromised. The vertices in graph G may simultaneously change their abilities: α is the probability that an exposed vertex will be changed to the compromised state, i.e., a node successfully attacked during the item step. β is the probability a compromised Internet Overlay Network Application : Overlay node : Edge node : Internet Host :user Resource Pool (IP Network) : Attacker : Malicious traffic Figure. Location-Hiding Technique by Overlay Networks vertex will be changed into the intact state, i.e., a successful overlay network reconfiguration during a time step. γ is the probability an exposed vertex will be changed into the intact state. It represents the level of coordination among the attackers and the amount ability of the attackers. Graph G is robust if all nodes in G can be changed into the intact state after a long run. Graph G is vulnerable if there always exists a significant number of compromised nodes in G at any time. By a mathematically analysis: given parameters α, β, and γ characterize the class of graphs G that are robust and the class that are vulnerable. Two approved theorems in [4] are used to solve above mathematically analysis. Theorem : for the model M(G,α,β, γ), let σ be the largest eigenvalue of the adjacency matrix of G, then the graph G is robust if β(α + γ)/α σ () Theorem 2: for the model M(G, α, β, γ), let λ = max i 0 λ i, where λ i is the Laplacian spectrum of
3 N Diameter σ /λ Table. Topological Properties of Chord [4] N Diameter σ /λ Table 3. Topological Properties of Pastry N Diameter σ /λ Table 2. Topological Properties of CAN [4] G, then the graph G is vulnerable if β/α < /λ 2 (2) The σ is an important property of a graph, characterizing graph connectivity. Informally, σ is the average vertex degree of the graph [2]. The Laplacian spectrum λ is another important property to characterize graph connectivity [2]. In summary [4] based on these two mathematically theorems exploits two important design principles for comparing overlay networks in hide location point of view:. Topologies with low average vertex degrees (small σ) are favorable. 2. Topologies with balance distribution of connectivity (small /λ 2 ) are favorable Chord topology is a regular graph with degree 2log 2 N, where N is the number of vertices in the graph. CAN topology is a regular d-dimensional Cartesian graph with degree of 2d. Pastry topology is a regular graph with degree (2 b )log 2 bn, where N is the number of vertices in the graph and b is the configuration parameter with typically value 4. Tables, 2 and 3 show topological properties based on these two theorems for Chord, CAN, and Pastry. Mathematically theorems show CAN, Chord, and Pastry have better performance respectively. 4 Comparing Chord, CAN, and Pastry by Simulation In this section we compare Chord, CAN, and Pastry by simulation to understand which topology is the better can- didate for location-hiding. We implement a simulator that is composed of two main procedures: the overlay network and the attack toolkit. Implementation of the overlay network is the basic framework for simulation. To do this we implement Chord, CAN, and Pastry in C++ based on [], [7], and [8] respectively. To implement an attack toolkit, we program the basic structure of Trinoo [3] to generate both DoS and DDoS attacks by C++. In fact we implement two basic sub-procedures for attack toolkit procedure: daemon and master sub-procedures. We have several daemon sub-procedures that are controlled by master sub-procedure. Daemon procedures simply send malicious traffic to the targets at the given start time that determined by master procedure. However, there are some assumptions: Attackers only know the IP addresses of edge nodes of overlay network. If an edge overlay node was attacked, the neighbor nodes of that edge node are compromised and can be attacked by attackers. In DDoS attack, attackers have bound and fixed amount of bandwidth to attack the architecture. For instance, attackers can attack maximum X edge nodes (X < N, N is the total number of edge nodes) simultaneously. We suppose in any experiment we have enough resource pool Internet hosts. For accessing an application, users connect to edge nodes and then can access the application via the overlay routing protocol. In our simulation model any user has a uniform random deadline (expected response time) to access an application. If an edge node is attacked, the overlay reconfigures itself and switches the users of that edge node to another random edge node. However, it is possible that several edge nodes are attacked in DDoS scenario simultaneously or several edge nodes may be attacked successively in short period. Also in case of attack against any edge node, however it is possible some other internal nodes (the neighbor nodes of that edge node) are attacked randomly.
4 In this case if request deadline of a user passed, the simulator registers successful attack. So our simulation determines the probability of successful attack during attacks on system. Our mean of successful attack is that the overlay cannot connect a user to the requested application before the user s deadline. Experiments are done in two cases: overlay without repair and overlay with repair. In the former one, if a node (edge or internal) is attacked, the overlay just simply exist the node and switches the users of the attacked edge node to another random edge node. In fact the overlay have no action toward repairing the attacked node and the attacked node never comes back the overlay. However in the latter one the attacked node (edge or internal) can come back to the overlay after termination the attack. The scenario of overlay with repair is that when the overlay identifies an attacked node, that node is removed from the overlay. When an attacker identifies that a node it is attacking no longer resides in the overlay, it redirects its attack towards a node that does still reside in the overlay. When the attacked node was removed, the attack against that node terminates and the node comes back to the overlay after D r delay. D r is a repair delay for reconfiguration. Also, there is an attack delay, D a, that equals the difference in time between when an attacked node is removed from the overlay to the time when the attacker (realizing the node it is attacking has been removed) redirects the attack toward a new node in the overlay. We assume both D a and D r are exponentially distributed random variables with respective rates λ and µ. The first experiment compares Chord, CAN, and Pastry in the first case, the overlay without repair. The experiment is done for N=200 (N is the total number of overlay nodes), n g = 32 and n g = 64 (n g is the total number of edge nodes). Figure 2 shows the probability of successful attack when the number of attacked edge nodes varies along the x-axis. By the first observation of this figure you can see CAN is better than Chord, while Chord is better than Pastry. For the overlay with 32 edge nodes the likelihood of an attack successfully terminating communication between a user and an application is negligible when the number of attacked edge nodes is less than half in all case studies: Chord, CAN, and Pastry. However, when about 85% edge nodes are attacked, the probability of successful attack for CAN is about 0.3 while for Chord and Pastry are about 0.45 and 0.70 respectively. As the average vertex degree of CAN is less than Chord and Pastry, the nodes that can be attacked in CAN is less than both others because edge nodes of CAN have less neighbor nodes related to both others (same analysis for Chord and Pastry). For the overlay with 64 edge nodes we have same story. However in this case (overlay without repair), when all edge nodes are attacked there is no public nodes for users to connect the overlay, thereby the probability of successful attack is one. We did simulation for DDoS attack in this case (overlay without repair), but there is no more chance for successful search in DDoS attack against overlay without repair, hence we ignore it here. The second and third experiments compare Chord, CAN, and Pastry in the second case, the overlay with repair, for both DoS and DDoS scenarios respectively. Figure 3 shows the probability of successful attack when ρ = λ/µ varies along x-axis. probability of successful attack Chord CAN Pastry probability of successful search number of attacked edge nodes ng=32, Chord ng=32, CAN ng=32, Pastry ng=64, Chord ng=64, CAN ng=64, Pastry Figure 2. Probability of successful attack in DoS scenario for overlay without repair Figure 3. Probability of successful attack in DoS scenario for overlay with repair In the second experiment (figure 3), as the overlay takes repair action the chance of attackers to successfully deny the user access to an application is quite negligible, especially when repair speed is more than attack speed (ρ ). In fact when ρ the probability of successful attack is around zero. However, again we can see CAN is better than Chord and Pastry. Figure 4 shows the probability of successful attack when ρ = λ/µ varies along x-axis for DDoS scenario. In this experiment N = 200 (N is the total number of overlay nodes) and n g = 00 (n g the total number of edge nodes) are con-
5 probability of successful attack na=50, Chord na=50, CAN na=50, Pastry na=90, Chord na=90, CAN na=90, Pastry Figure 4. Probability of successful attack in DDoS scenario for overlay with repair stant, while n a (the maximum ability of attackers that can attack edge nodes simultaneously) is variable. By the first observation of this figure, it is clear that CAN is better than Chord against DDoS attack, and Chord is better than Pastry (main contribution of this paper). This figure also shows when an attack is distributed (DDoS), the fraction of time for which the attack is successful can be significant when a large fraction of edge nodes in the overlay is attacked, even when ρ. From this figure we can understand although DDoS attack is harder for tolerating than DoS attack, for n a n g /2 it can be tolerated. For instance, when n a 50 and ρ 0 the probability of successful attack is less than 20%. In summary these experiments confirm both theorems of the analytical model of [4] and also confirm topologies with low average vertex degree (CAN related to Chord and Pastry) are favorable for location-hiding technique. 5 Conclusion This paper compares Chord, CAN, and Pastry overlay networks against DoS attacks for location-hiding technique via simulation approach. Simulation results show CAN, Chord, and Pastry have better structure topologies against DoS attacks respectively. Simulation results also confirm the analytical model of [4] and show the topologies with low average vertex degree (CAN related to Chord and Pastry) are favorable for location-hiding technique. Simulation results show overlay networks have impressive role as a location-hiding against DoS attacks. References [] D.G. Andersen. Mayday:distributed filtering for internet services. In Proceedings of 4th Usenix Symposium on Internet Technologies and Systems, [2] F. Chung. Spectral Graph Theory. ACM publications, 997. [3] D. Dittrich. The DoS project s trinoo distributed denial of service attack toll. University of Washington, 999. [4] L. Gordon and et al. CSI/FBI Computer Crime and Security Survey. Computer Security Inst., area/pdfs/fbi/fbi2004.pdf, [5] A.D. Keromytis, V. Misra, and D. Rubenstein. Sos: Secure overlay services. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIG- COMM 02), August [6] D. Moore, G.M. Voelker, and S. Savage. Inferring internet denial-of-service activity. In Proceedings of the USENIX Security Symposium. USENIX Association, 200. [7] S. Ratnasamy, P. Francis, M. Haudley, R. Karp, and S. Shenker. A scalable content addressable network. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 0), pages 27 3, 200. [8] A. Rowstron and P. Druschel. Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In Proceedings of the 8th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware 0), November 200. [9] A. Stavrou and et al. Websos: An overlay-based system for protecting web servers from denial of service attacks. the International Journal of Computer and Telecommunications Networking, 48(5):78 807, August [0] I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet indirection infrastructure. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 02), [] I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer communications (SIGCOMM 0), pages 49 60, 200. [2] J. Wang and A.A. Chien. Using overlay networks to resist denial-of-service attacks. Technical report, CSE department, university of california, San Diego, 2003.
6 [3] J. Wang and A.A. Chien. Understanding when location-hiding using overlay networks is feasible. Elsevier Journal of Computer Networks, special issue on overlay distribution structures and their applications, [4] J. Wang, L. Lu, and A. Chien. Tolerating denialof-service attacks using overlay networks-impact of topology. In Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, 2003.
Analyzing the Chord Peer-to-Peer Network for Power Grid Applications
Analyzing the Chord Peer-to-Peer Network for Power Grid Applications Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit Leuven Electrical
More informationUnderstanding When Location-Hiding Using Overlay Networks is Feasible
Understanding When Location-Hiding Using Overlay Networks is Feasible Ju Wang and Andrew A. Chien Department of Computer Science and Engineering, UC San Diego Abstract Overlay networks (proxy networks)
More informationDistributed Hash Table
Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ
More informationEarly Measurements of a Cluster-based Architecture for P2P Systems
Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella
More informationBuilding a low-latency, proximity-aware DHT-based P2P network
Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan
More informationTolerating Denial-of-Service Attacks Using Overlay Networks - Impact of Overlay Network Topology
Tolerating Denial-of-Service Attacks Using Overlay Networks - Impact of Overlay Network Topology Ju Wang Department of Computer Science and Engineering University of California, San Diego Email: jwang@cs.ucsd.edu
More informationA Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol
A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,
More informationA Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery
A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca
More informationStructured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup
Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Alper Mizrak (Presenter) Yuchung Cheng Vineet Kumar Stefan Savage Department of Computer Science & Engineering University
More informationA Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables
A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,
More informationShaking Service Requests in Peer-to-Peer Video Systems
Service in Peer-to-Peer Video Systems Ying Cai Ashwin Natarajan Johnny Wong Department of Computer Science Iowa State University Ames, IA 500, U. S. A. E-mail: {yingcai, ashwin, wong@cs.iastate.edu Abstract
More informationA Directed-multicast Routing Approach with Path Replication in Content Addressable Network
2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,
More informationShould we build Gnutella on a structured overlay? We believe
Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured
More informationDistriubted Hash Tables and Scalable Content Adressable Network (CAN)
Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................
More informationPeer Clustering and Firework Query Model
Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk
More informationBuilding Dependable Peer-to-Peer systems
Building Dependable Peer-to-Peer systems Koen Vanthournout Geert Deconinck Ronnie Belmans K.U.Leuven, Dept. Elektrotechniek, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium Tel: +32/16/32.18.12
More informationDesign of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem
Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois
More informationAthens University of Economics and Business. Dept. of Informatics
Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service
More informationPeer-to-Peer Networks Applied to Power Grid *
Peer-to-Peer Networks Applied to Power Grid * Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Abstract In order to improve and deploy distributed control systems for the power grid a robust ICT infrastructure
More informationA DHT-Based Grid Resource Indexing and Discovery Scheme
SINGAPORE-MIT ALLIANCE SYMPOSIUM 2005 1 A DHT-Based Grid Resource Indexing and Discovery Scheme Yong Meng TEO 1,2, Verdi March 2 and Xianbing Wang 1 1 Singapore-MIT Alliance, 2 Department of Computer Science,
More informationA Framework for Peer-To-Peer Lookup Services based on k-ary search
A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology
More informationSecurity Considerations for Peer-to-Peer Distributed Hash Tables
Security Considerations for Peer-to-Peer Distributed Hash Tables Emil Sit and Robert Morris Laboratory for Computer Science, MIT 200 Technology Square, Cambridge, MA 02139, USA {sit,rtm}@lcs.mit.edu Abstract.
More informationArchitectures for Distributed Systems
Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced
More informationReCord: A Distributed Hash Table with Recursive Structure
ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-
More informationRelaxing Routing Table to Alleviate Dynamism in P2P Systems
Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,
More informationA Search Theoretical Approach to P2P Networks: Analysis of Learning
A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.
More informationUsing Overlay Networks to Resist Denial-of-Service Attacks
Submitted for publication to CCS3 Using Overlay Networks to Resist Denial-of-Service Attacks Abstract Proxy-network based overlays have been proposed to protect Internet applications against Denial-of-Service
More informationAnalysis of Denial of Service Attack
International Journal of Scientific & Engineering Research Volume 2, Issue 10, Oct-2011 1 Analysis of Denial of Service Attack Rakesh Rathi, Udai Nag Abstract-- Proxy network-based defense has recently
More informationPERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.5, September 27 PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS Farida Chowdhury
More informationMulti-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed, Shervin Shirmohammadi Distributed & Collaborative Virtual Environments Research Laboratory School of Information
More informationA Super-Peer Based Lookup in Structured Peer-to-Peer Systems
A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University
More informationPerformance Modelling of Peer-to-Peer Routing
Performance Modelling of Peer-to-Peer Routing Idris A. Rai, Andrew Brampton, Andrew MacQuire and Laurent Mathy Computing Department, Lancaster University {rai,brampton,macquire,laurent}@comp.lancs.ac.uk
More informationUpdate Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems
Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)
More informationTime-related replication for p2p storage system
Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,
More informationUC Berkeley UC Berkeley Previously Published Works
UC Berkeley UC Berkeley Previously Published Works Title Impact of neighbor selection on performance and resilience of structured P2P networks Permalink https://escholarship.org/uc/item/9tq2wn2 Authors
More informationLessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems
LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,
More informationAggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test
Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test Fabius Klemm and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland
More informationSplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks
SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks Pericles Lopes Ronaldo A. Ferreira pericles@facom.ufms.br raf@facom.ufms.br College of Computing, Federal University of Mato Grosso
More informationSubway : Peer-To-Peer Clustering of Clients for Web Proxy
Subway : Peer-To-Peer Clustering of Clients for Web Proxy Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute
More informationTolerating Denial-of-Service Attacks Using Overlay Networks - Impact of Topology
Tolerating Denial-of-Service Attacks Using Overlay Networks - Impact of Topology Ju Wang Department of Computer Science and Engineering University of California, San Diego jwang@cs.ucsd.edu Linyuan Lu
More informationLoad Balancing in Structured P2P Systems
1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica fananthar, karthik, sonesh, karp, istoicag@cs.berkeley.edu Abstract Most P2P systems
More informationA Scalable Content- Addressable Network
A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics
More informationQoS Enabled Multicast for Structured P2P Networks
QoS Enabled Multicast for Structured P2P Networks Marc Brogle, Dragan Milic and Torsten Braun Computer Networks and Distributed Systems Institute of Computer Science and Applied Mathematics University
More informationA Square Root Topologys to Find Unstructured Peer-To-Peer Networks
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 2 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationEffect of Links on DHT Routing Algorithms 1
Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn
More informationDynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others
Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel
More informationProblems in Reputation based Methods in P2P Networks
WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics
More informationPushback for Overlay Networks: Protecting against Malicious Insiders
Pushback for Overlay Networks: Protecting against Malicious Insiders Angelos Stavrou 1, Michael E. Locasto 2, and Angelos D. Keromytis 3 1 Computer Science Department, George Mason University 2 Institute
More informationA New Perspective in Defending against DDoS
A New Perspective in Defending against DDoS Shigang Chen Randy Chow Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 326, USA {sgchen, chow}@cise.ufl.edu
More informationMill: Scalable Area Management for P2P Network based on Geographical Location
Mill: Scalable Area Management for PP Network based on Geographical Location MATSUURA Satoshi sato-mat@is.naist.jp FUJIKAWA Kazutoshi fujikawa@itc.naist.jp SUNAHARA Hideki suna@wide.ad.jp Graduate School
More informationA P2P File Sharing Technique by Indexed-Priority Metric
A P2P File Sharing Technique by Indexed-Priority Metric Toshinori Takabatake and Yoshikazu Komano Abstract Recently, the improvements in processing performance of a computer and in high speed communication
More informationOMNIX: A topology-independent P2P middleware
OMNIX: A topology-independent P2P middleware Roman Kurmanowytsch, Engin Kirda, Clemens Kerer and Schahram Dustdar Technical University of Vienna, Distributed Systems Group Argentinierstr. 8/184-1, A-1040
More informationThe Lonely NATed Node
The Lonely NATed Node Chad Yoshikawa University of Cincinnati yoshikco@ececs.uc.edu Brent Chun Intel Research Berkeley bnc@intel-research.net Amin Vahdat U.C. San Diego vahdat@cs.ucsd.edu Abstract In this
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationDistributed Hash Tables in P2P Network: Detection and. Prevention of Threats and Vulnerability
Distributed Hash Tables in P2P Network: Detection and Prevention of Threats and Vulnerability Mohammad Naderuzzman (Corresponding Author) Department of Computer Science & Engineering Dhaka University of
More informationEvolution of Peer-to-peer algorithms: Past, present and future.
Evolution of Peer-to-peer algorithms: Past, present and future. Alexei Semenov Helsinki University of Technology alexei.semenov@hut.fi Abstract Today peer-to-peer applications are widely used for different
More informationAn Empirical Study of Data Redundancy for High Availability in Large Overlay Networks
An Empirical Study of Data Redundancy for High Availability in Large Overlay Networks Giovanni Chiola Dipartimento di Informatica e Scienze dell Informazione (DISI) Università di Genova, 35 via Dodecaneso,
More informationQuery Processing Over Peer-To-Peer Data Sharing Systems
Query Processing Over Peer-To-Peer Data Sharing Systems O. D. Şahin A. Gupta D. Agrawal A. El Abbadi Department of Computer Science University of California at Santa Barbara odsahin, abhishek, agrawal,
More informationRouting Protocols of Distributed Hash Table Based Peer to Peer Networks
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. II (Jan. 2014), PP 70-74 Routing Protocols of Distributed Hash Table Based Peer to Peer Networks
More informationDATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems
LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable
More informationContent Overlays. Nick Feamster CS 7260 March 12, 2007
Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not
More informationA Four-Step Technique for Tackling DDoS Attacks
Available online at www.sciencedirect.com Procedia Computer Science 10 (2012 ) 507 516 The 3 rd International Conference on Ambient Systems, Networks and Technologies (ANT-2012) A Four-Step Technique for
More informationUnderstanding Chord Performance
CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system
More informationDefending against Eclipse attacks on overlay networks
Defending against Eclipse attacks on overlay networks Atul Singh 1 Miguel Castro 2 Peter Druschel 1 Antony Rowstron 2 1 Rice University, Houston, TX, USA. 2 Microsoft Research, Cambridge, UK. Abstract
More informationScalable and Self-configurable Eduroam by using Distributed Hash Table
Scalable and Self-configurable Eduroam by using Distributed Hash Table Hiep T. Nguyen Tri, Rajashree S. Sokasane, Kyungbaek Kim Dept. Electronics and Computer Engineering Chonnam National University Gwangju,
More informationTowards Efficient Load Balancing in Structured P2P Systems
Towards Efficient Load Balancing in Structured P2P Systems Yingwu Zhu Department of ECECS University of Cincinnati zhuy@ececs.uc.edu Yiming Hu Department of ECECS University of Cincinnati yhu@ececs.uc.edu
More informationEAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems
EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville,
More informationThe Effect of Replica Placement on Routing Robustness in Distributed Hash Tables
The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables Cyrus Harvesf and Douglas M. Blough Georgia Institute of Technology School of Electrical and Computer Engineering Atlanta,
More informationFPN: A Distributed Hash Table for Commercial Applications
FPN: A Distributed Hash Table for Commercial Applications Cezary Dubnicki, Cristian Ungureanu, Wojciech Kilian NEC Laboratories Princeton, NJ, USA {dubnicki, cristian, wkilian}@nec-labs.com Abstract Distributed
More informationScalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou
Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization
More informationFlexible Information Discovery in Decentralized Distributed Systems
Flexible Information Discovery in Decentralized Distributed Systems Cristina Schmidt and Manish Parashar The Applied Software Systems Laboratory Department of Electrical and Computer Engineering, Rutgers
More informationBAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks
: A Balanced Kautz Tree Structure for Peer-to-Peer Networks Deke Guo, Honghui Chen, Yunhao Liu, and Xiangyang Li College of Information Systems and Management, National University of Defense Technology,
More informationSCAR - Scattering, Concealing and Recovering data within a DHT
41st Annual Simulation Symposium SCAR - Scattering, Concealing and Recovering data within a DHT Bryan N. Mills and Taieb F. Znati, Department of Computer Science, Telecommunications Program University
More informationAn Agenda for Robust Peer-to-Peer Storage
An Agenda for Robust Peer-to-Peer Storage Rodrigo Rodrigues Massachusetts Institute of Technology rodrigo@lcs.mit.edu Abstract Robust, large-scale storage is one of the main applications of DHTs and a
More informationDISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS
DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless
More informationProactive Caching for Better than Single-Hop Lookup Performance
Proactive Caching for Better than Single-Hop Lookup Performance Venugopalan Ramasubramanian and Emin Gün Sirer Cornell University, Ithaca NY 4853 ramasv, egs @cs.cornell.edu Abstract High lookup latencies
More informationPurpose and security analysis of RASTER
Purpose and security analysis of RASTER Oliver Gasser Advisor: Christian Grothoff Seminar Future Internet SS2010 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität
More informationImplications of Neighbor Selection on DHT Overlays
Implications of Neighbor Selection on DHT Overlays Yingwu Zhu Department of CSSE, Seattle University zhuy@seattleu.edu Xiaoyu Yang Department of ECECS, University of Cincinnati yangxu@ececs.uc.edu Abstract
More informationRAQ: A Range-Queriable Distributed Data Structure
RAQ: A Range-Queriable Distributed Data Structure Hamid Nazerzadeh Mohammad Ghodsi Abstract Different structures are used in peer-to-peer networks to represent their inherently distributed, self-organized
More informationAn Efficient and Secure Peer-to-Peer Overlay Network
An Efficient and Secure Peer-to-Peer Overlay Network Honghao Wang, Yingwu Zhu and Yiming Hu Department of Electrical & Computer Engineering and Computer Science University of Cincinnati {wanghong, zhuy,
More informationSearching for Shared Resources: DHT in General
1 ELT-53206 Peer-to-Peer Networks Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original
More informationA Taxonomy of Criteria for Evaluating Defence Mechanisms against Flooding DoS Attacks
A Taxonomy of Criteria for Evaluating Defence Mechanisms against Flooding DoS Attacks Jarmo V. E. Mölsä Communications Laboratory, Helsinki University of Technology, P.O. Box 3000, FI-02015 TKK, Finland
More informationNodeId Verification Method against Routing Table Poisoning Attack in Chord DHT
NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT 1 Avinash Chaudhari, 2 Pradeep Gamit 1 L.D. College of Engineering, Information Technology, Ahmedabad India 1 Chaudhari.avi4u@gmail.com,
More informationData Indexing and Querying in DHT Peer-to-Peer Networks
Institut EURECOM Research Report N o 73 RR-03-073 Data Indexing and Querying in DHT Peer-to-Peer Networks P.A. Felber, E.W. Biersack, L. Garcés-Erice, K.W. Ross, G. Urvoy-Keller January 15, 2003 2 Data
More informationChapter 10: Peer-to-Peer Systems
Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Introduction To enable the sharing of data and resources
More informationA Simple Fault Tolerant Distributed Hash Table
A Simple ault Tolerant Distributed Hash Table Moni Naor Udi Wieder Abstract We introduce a distributed hash table (DHT) with logarithmic degree and logarithmic dilation We show two lookup algorithms The
More informationEvaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays
Journal of Computer Science (): xx-xx, ISS 49-66 Science Publications Evaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays Surya Bahadur Kathayat,
More informationP2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility
P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility Rubén Cuevas, Carmen Guerrero, Ángel Cuevas, María Calderón, Carlos J. Bernardos Departamento de Ingeniería Telemática, Universidad
More informationSelf-Organizing Subsets: From Each According to His Abilities, To Each According to His Needs
Self-Organizing Subsets: From Each According to His Abilities, To Each According to His Needs Amin Vahdat, Jeff Chase, Rebecca Braynard, Dejan Kostić, Patrick Reynolds, and Adolfo Rodriguez Λ Department
More informationDYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS
DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,
More informationMultivariate Correlation Analysis based detection of DOS with Tracebacking
1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor
More informationAggregation of a Term Vocabulary for Peer-to-Peer Information Retrieval: a DHT Stress Test
Aggregation of a Term Vocabulary for Peer-to-Peer Information Retrieval: a DHT Stress Test Fabius Klemm and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne
More informationDetecting and Recovering from Overlay Routing. Distributed Hash Tables. MS Thesis Defense Keith Needels March 20, 2009
Detecting and Recovering from Overlay Routing Attacks in Peer-to-Peer Distributed Hash Tables MS Thesis Defense Keith Needels March 20, 2009 Thesis Information Committee: Chair: Professor Minseok Kwon
More informationThe Lonely NATed Node
The Lonely NATed Node Chad Yoshikawa *, Brent Chun, Amin Vahdat, Fred Annexstein *, and Ken Berman * * University of Cincinnati {yoshikco,annexste,berman}@ececs.uc.edu Intel Research Berkeley bnc@intel-research.net
More informationExploiting Semantic Clustering in the edonkey P2P Network
Exploiting Semantic Clustering in the edonkey P2P Network S. Handurukande, A.-M. Kermarrec, F. Le Fessant & L. Massoulié Distributed Programming Laboratory, EPFL, Switzerland INRIA, Rennes, France INRIA-Futurs
More informationDynamic Characteristics of k-ary n-cube Networks for Real-time Communication
Dynamic Characteristics of k-ary n-cube Networks for Real-time Communication Gerald Fry and Richard West Computer Science Department Boston University Boston, MA 02215 {gfry,richwest@cs.bu.edu Abstract
More informationAn Intelligent Home Environment based on Service Planning over Peer-to-Peer Overlay Network
JOURNAL OF SOFTWARE, VOL. 3, NO. 8, NOVEMBER 2008 3 An Intelligent Home Environment based on Planning over Peer-to-Peer Overlay Network Chuan-Feng Chiu, Steen J. Hsu, Sen-Ren Jan Department of Information
More informationSimple Determination of Stabilization Bounds for Overlay Networks. are now smaller, faster, and near-omnipresent. Computer ownership has gone from one
Simple Determination of Stabilization Bounds for Overlay Networks A. Introduction The landscape of computing has changed dramatically in the past half-century. Computers are now smaller, faster, and near-omnipresent.
More informationHyCube: A distributed hash table based on a hierarchical hypercube geometry
HyCube: A distributed hash table based on a hierarchical hypercube geometry Artur Olszak Institute of Computer Science, Warsaw University of Technology A.Olszak@ii.pw.edu.pl Abstract. This paper presents
More informationBOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS
BOOTSTRAPPING LOCALITY-AWARE PP NETWORKS Curt Cramer, Kendy Kutzner, and Thomas Fuhrmann Institut für Telematik, Universität Karlsruhe (TH), Germany {curt.cramer kendy.kutzner thomas.fuhrmann}@ira.uka.de
More information