Evaluation of the p2p Structured Systems Resistance against the Starvation Attack

Size: px
Start display at page:

Download "Evaluation of the p2p Structured Systems Resistance against the Starvation Attack"

Transcription

1 Evaluation of the p2p Structured Systems Resistance against the Starvation Attack Rubén Cuevas, Ángel Cuevas, Manuel Urueña, Albert Banchs and Carmen Guerrero Departament of Telematic Engineering, Universidad Carlos III de Madrid, Spain Abstract The Starvation Attack consists on making a resource fully or partially inaccessible. This is a significant and harmful attack on structured p2p networks. This paper provides an analytical tool which permits the evaluation of the resistance offered by the most popular structured p2p systems, the one-dimensional DHT-based p2p systems such as Chord or Kademlia, against this attack. In addition, the Starvation Attack is closely related to the Peer-ID assignment mechanism. This paper demonstrates that the Peer-ID assignment mechanisms defined so far are useless against the Starvation Attack. I. INTRODUCTION The Peer-to-Peer (p2p) technology is currently the one with the highest impact in the Internet mainly supported by content distribution and file-sharing applications. This technology has been intensely investigated in many aspects so far. However, in the case of security there is still much work to do. This paper provides a rigorous analysis of the problem of the Starvation Attack on structured DHT-based p2p networks [] (e.g. Chord [2], Kademlia [3] or Pastry [4]). This work has direct application to networks such as KAD with.5 million simultaneous users [5] or Azureus with hundreds of thousands users (both of them are based on Kademlia). In the DHT-based p2p networks the resources have an associated resource-key. This key is a k-bits identifier and is the result of computing a hash operation (thus, k can be 64, 28, 6,... depending on the hash operation employed). The nodes forming the DHT have an identifier as well. This is named Peer-ID and belongs to the same idspace as the resource-keys. This paper focuses on the onedimensional DHT networks (e.g. Chord, Kademlia, Pastry or Tapestry). In these DHTs the id-space can be mapped into a ring where the Peer-IDs and the resource-keys are located. It must be highlighted that the one-dimensional DHT networks have been thoroughly analyzed and are the most popular among the structured p2p networks. In these overlays a given resource-key is stored by the node with the closest Peer-ID. We name this node Responsible Node. However, the concept of the closest node varies among the different DHT schemes. In Kademlia, Pastry and Tapestry the closest node to a resource-key is the one with the closest Peer-ID. Whereas, in Chord the closest node is the one with the subsequent Peer-ID (the higher and closest) to the resource-key in the ring. In addition, it must be considered that due to the dynamic nature of p2p networks there is not only one but several nodes storing a given resource-key. These are the nodes with the closest Peer-IDs to the resource-key and they are called Replica Nodes. This minimizes the risk of losing the resource-keys stored by a node in case it leaves the p2p network. The Starvation Attack is defined as the attack which makes a resource fully or partially inaccessible. In the case of the structured p2p networks this attack can be performed by obtaining a Peer-ID closer to the resourcekey than the current Responsible Node(s). After that, the attacker does not answer (or provides wrong answers) to the queries related to the affected resource-key. In case of replication the attacker can starve all the R replicas (by obtaining the R closest Peer-IDs to the resource-key) or just a subset of the total R replicas. The former is named Full Starvation Attack (FSA) and the latter Partial Starvation Attack (PSA). The FSA is more harmful than the PSA since the attacker controls all the replicas and makes the resource fully inaccessible. Whereas, in the PSA some users can access the resource because the attack only affects the queries arriving to the subset of Replica Nodes controlled by the attacker. In order to facilitate our study, the concept of Attack Zone is introduced in this paper. The Attack Zone is the interval of identifiers which is valid in order to succeed in the Starvation Attack. The number of identifiers in the Attack Zone is called Attack Zone Size (AZS). The Starvation Attack is closely related to the ID assignment method used in the structured p2p network. Replica Node and Responsible Node will be used indistinguishable during the rest of the paper.

2 2 Two types of assignments have been used so far. The first one allows a node to select its own Peer-ID. Then, the Starvation Attack becomes trivial; the attacker only has to choose the necessary number of Peer-IDs in the Attack Zone and the attack would be successful. The other approach provides IDs of random nature. This prevents that a malicious node can choose its location in the network, thus forcing the attacker to acquire multiple Peer- IDs until one (or more in case of replication) is located inside the Attack Zone, therefore reducing the probability of succeeding in the attack. This paper focuses on the approach of IDs of random nature, since it is the useful one to evaluate. The main goal of this paper is to provide closed formulas for the average number of random required IDs in order to succeed in the Starvation Attack - n-, and the Probability of Success of the Starvation Attack as function of the number of random obtained IDs -P s (n)-. In particular, this is the Cumulative Distribution Function (CDF) as function of the number of random obtained IDs. The key contribution of this paper is the proposed analytical tool for evaluating the Starvation Attack, that will be compared with previously proposed models and shown to produce correct results. In addition, the model will be applied to demonstrate that the Peer-ID assignment mechanisms defined so far are vulnerable to the Starvation Attack. II. THE ANALYTICAL MODEL OF THE STARVATION ATTACK This section presents the analytical model for the Starvation Attack on structured p2p networks. The goal is to find the closed formulas for n and P s (n). These two formulas will be the basic tools used to evaluate the resistance of the different ID assignment mechanisms against the Starvation Attack. The following parameters will be used during the analysis: N, the number of nodes in the network; n, the number of obtained/required Peer- IDs; R, the total number of replicas; I, the number of desired replicas to starve; M, the number of IDs in the the id-space. It must be taken into consideration that the size of the id-space -M- is equal to 2 k >>N (k is equal to 28, 6 or 256 depending on the hash operation). Hence, without loss of generality, our model considers that the obtained Peer-IDs are randomly distributed in the continuous idspace [,]. This is a very accurate approximation to the real scenario on which the Peer-IDs are randomly distributed in the discrete id-space [,M). Since M is large enough the assumption that the id-space is continuous instead of discrete yields also accurate results. The conversion of the space [,M) to [,] introduces only a scalar factor whose solely purpose is to simplify the notation. II-A. Starvation of a Single Resource A single resource has an associated Attack Zone of size X. Then, in order to perform the Starvation Attack, the malicious node should obtain multiple random Peer-IDs until it gets I of them within X. Then, the probability that a single obtained ID belongs to X is X itself whereas -X is the probability that the obtained ID is outside of X. We would like to model P r (n, X) 2. This is the probability of success in the starvation of a single resource with an associated Attack Zone of size X as function of the number of obtained Peer-IDs (n) and the number of replicas to be starved (I). Thus, P r (n, X) can be modeled as the Probability of obtaining at least I Peer-IDs within X. If we suppose that an attacker has obtained n randomly distributed IDs on the id-space, then the probability of obtaining at least I of them belonging to an Attack Zone of size X is equal to minus the probability of obtaining at least I- in this zone. This is presented on Equation. P r (n, X) = CDF (n, X) = P (at least I- nodes in X); P r (n, X) = [P ( IDs in X and n outside) + P ( ID in X and n- outside) P ((I- nodes in X and n-(i-) outside)]; I X n P r(n, X) = X i ( X) n i i i= Moreover, n r (X) is also modeled. This is the average number of required IDs in order to succeed in the Starvation Attack. This is mathematically expressed as the mean associated to the introduced distribution and is shown on Equation 2. II-B. n r(x) = I X Attack Zone Size Distribution The objective of this section is to define the probability density function pdf(x), where x is the random variable modeling the size of an Attack Zone in a one-dimensional DHT. Firstly, we should identify the Attack Zone in these overlays. Indeed, this can be mathematically defined on each system. Equation 3 presents the formal definition of the Attack Zone in Chord, whereas Equation 4 does the same in the case of Kademlia (also valid for Pastry and Tapestry). RK and RN are the abbreviations of resourcekey and Replica Node respectively. Figure includes an example of these Attack Zones. Chord Attack Zone = [RK, (R I + ) th RN ID) (3) 2 This is the Cumulative Distribution Function, CDF(n,X). () (2)

3 3 Probability of Success Geometric (R=) Chord Simualtion (R=).4 Kademlia Simulation (R=) Model (R=).3 Chord Simualtion (R=2) Kademlia Simulation (R=2).2 Model (R=2) Chord Simualtion (R=5). Kademlia Simulation (R=5) Model (R=5) Number of Obtained Peer IDs x 5 Fig. 2. P s model validation for the FSA: M= 32, N= 4 Fig.. Attack Zones in Kademlia and Chord: R=5, I=3. AZS = E[x] = Z x pdf(x)δx = R I + N + (7) Kademlia Attack Zone = (RK RK (R I + ) th RN ID, RK+ RK (R I + ) th RN ID ) The AZS is defined as the number of IDs included in the Attack Zones presented on Equations 3 and 4. Despite the Attack Zones being different in Chord than in the other overlays, the model representing the size of both of them is the same because the Attack Zone is always modeled by the zone where at least R-I+ replicas are placed. Thus, the size will be the same if only the subsequent IDs to the resource-key are considered (as occurs in Chord) than if IDs at both side of the resourcekey are considered (as occurs in Kademlia, Pastry or Tapestry). Therefore, the CDF(x) is defined as the probability of finding a zone where at least R-I+ replicas are placed. This is the same as minus the probability of finding a zone with at least R-I replicas which is mathematically expressed on Equation 5. CDF (x) = P (at least R-I nodes in x); CDF (x) = [P ( node in x and N outside) CDF (x) = + P ( node in x and N- outside) P ((R-I) nodes in x and N-(R-I) outside)]; R I X r= N r x r ( x) N r Now, we can calculate the pdf(x) which is simply the derivative of the CDF(x), as shown on Equation 6. δcdf (x, I, R) pdf(x) = δx R I X N = [(N r)x r ( x) N r rx r ( x) N r ] r r= Finally, Equation 7 shows AZS. (4) (5) (6) AZS. This is the average II-C. Starvation Attack General Model In Section II-A the Probability of Success in the Starvation Attack and the average number of needed IDs in order to succeed in the attack for the case of a single resource were obtained. These are, P r (X, n) and n r (X) respectively. Moreover, in Section II-B the distribution of the size of the Attack Zones was obtained. This is pdf(x). Then, if we weight by an integration process P r (X, n) and n r (X) by pdf(x) the desired results, P s (n) and n are obtained. These are respectively, the global Probability of Success in the Starvation Attack and the average number of required IDs in order to succeed in the attack and are shown on Equation 8 and Equation 9 respectively. Z P s (n) = P r (n, x) pdf(x)δx R I X «N r!(n + n r )! = [n r= r (N + n)! (8) Q IX i 2 (n k) k= (r + (i 2))!(N + n r i)! + (rn (i )N) ] i=2 (i )! (N + n)! Z N n = n r (x) pdf(x)δx = I R I It must be noted that the equations presented in Sections II-A, II-B and II-C define the Partial Starvation Attack. In order to obtain the formulas for the Full Starvation Attack it is necessary to consider I equal to R (the total number of replicas) in the equations. III. MODEL VALIDATION The proposed model was validated by simulation for both types of one-dimensional DHTs (On one side Chord, and on the other side Kademlia, Pastry and Tapestry). Indeed, Chord and Kademlia were simulated. The closed (9)

4 4.9.8 I= I=2 I=3 I=4 I=5 I=6 Chord Simulation Kademlia Simulation Model 9 x n model n model D.Cerri et al. n Chord Simulation n Kademlia Simulation I=7 I=8 Number of obtained ids I= Number of Obtained Peer IDs x Number of Starved Replicas Fig. 3. P s model validation for the PSA: M= 32, N= 4, R= Fig. 4. n model validation: M= 32, N= 4, R=, I= 9 formulas for P s (n) and n were validated. Each experiment was simulated E times. On each experiment a onedimensional DHT system with N randomly generated nodes on an id-space of M identifiers (M>>N as occurs in real p2p systems) was created. Then, S Starvation Attacks were reproduced using randomly generated resourcekeys. On each simulated attack several random Peer-IDs were generated until I of them belonging to the Attack Zone were obtained. The number of the required IDs to perform each attack was then stored in order to compute P s (n) and n from the simulation experiments. The validation process used the following set of parameters: E=2, N= 4, M= 32, S= 4. The validation of P s (n) in the case of the FSA was developed for R=, R=2 and R=5 replicas. The average of each sample from the 2 repetitions was computed and presented along with the analytical curve 3. This is shown on Figure 2. For the validation of P s (n) in the case of the PSA the experiments were developed with R= and I ranging from to 9. The average of each sample from the 2 repetitions was computed and presented along with the analytical curve for each value of I. Figure 3 shows the results. Finally, Figure 4 shows the simulation and the analytical result for n. In all the experiments described above the maximum absolute error was inferior to 3,5 3 and the average error was around 5. Therefore, we can conclude that the model follows closely the simulation results. IV. DISCUSSION OF THE RESULTS In this section the Full and the Partial Starvation Attacks will be separately analyzed using the proposed model 3 The confidence intervals were also calculated, however they are indistinguishable because they are very close to the average value. as basis. P s =,3 P s =,5 P s =,7 P s =,9 R= 429 N N N 9 N R= N N N N R= 7 85 N N N N R=2 6 6 N N N N TABLE I NUMBER OF REQUIRED IDS ON THE FSA In the case of the FSA (I=R), it must be highlighted that the average number of required IDs - n- is infinite. This occurs because there is one case that needs infinite IDs in order to succeed in the attack (i.e. the attack is impossible). This happens if the resource-key and the responsible Peer-ID are exactly the same ID which has a small Probability but higher than. Therefore, in order to analyze the FSA we should focus on P s (n). For this purpose Table I includes the number of required IDs to fully starve a resource -n- as function of different values of P s and the number of replicas -R- in a one-dimensional DHT with N nodes. Both, Figure 2 and Table I demonstrate that the complexity of the FSA increases over the linear with R. Then, in order to avoid the FSA it is recommended to use a high number of Replica Nodes. On the other hand, in the case of the PSA n is not infinite anymore. If we consider I as a percentage of the total replicas, it can be expressed as I=cR where c varies from (no starvation) to (FSA) passing through out different situations of PSA. Then, Equation 2 can be reformulated as Equation. This shows the number of required IDs in order to starve the c percentage of the total replicas. n(c) = cr N R cr = N c c () Equation shows an important result: the complexity of the PSA is independent on the total number of replicas

5 5 pdf(x) Model Simulation Average AZS Average Number of Required Ids (nr) x Average Number of Attempts Average AZS Attack Zone Size (AZS) x Attack Zone Size (AZS) x 8 Fig. 5. Distribution of AZS -pdf(x)-: M= 2, N= 4 Fig. 6. n r to starve a single resource: M= 2, N= 4 -R- by itself, as it only depends on the number of nodes in the network -N- and the percentage of replicas to be starved -c-. For instance, the number of required IDs in order to starve 5 out of replicas is the same than in the case of starve out of 2. However, this is a misleading conclusion if we consider this value as representative result. Table II introduces some values to evaluate the complexity of performing the PSA. These represent the number of required Peer-IDs as function of P s, I, R and c. We can check in the Table that for the same value of c, the number of required IDs varies, then the complexity of the PSA is not independent on R. Hence, n should be carefully interpreted. It is a good tool to make rough estimations. However, in order to provide an accurate analysis the distribution expressed by P s must be also considered. P s =,3 P s =,5 P s =,7 P s =,9 R=5; I=, 74 N 48 N, 272 N 585 N c=.2 R=5; I=3 639 N N, 565 N 3 55 N c=.6 R=5; I=4 37 N 2 87 N N 7 9 N c=.8 R=; I=2 23 N 94 N 294 N 58 N c=.2 R=; I=6 878 N 24 N 684 N 2 74 N c=.6 R=; I=8 2 4 N N 4 92 N N c=.8 R=2; I=4 62 N 22 N 295 N 437 N c=.2 R=2; I=2 66 N 346 N 74 N 2 43 N c=.6 R=2; I= N N N N c=.8 TABLE II NUMBER OF REQUIRED IDS ON THE PSA From Table II and Figures 3 and 4 we can conclude that the difficulty of the PSA depends mainly on the parameter c defined above. If c is low, that is, I is much lower than R, the difficulty of the attack is low. On the other hand if c is high, that is, I is close to R, the difficulty of the attack increases drastically. Therefore, the difficulty of the attack increase exponentially with c. On the other hand, if c is low the damage caused by the attack is reduced since the number of affected replicas is low, thus the number of queries affected would be low as well. Whereas, with high values of c the attack becomes more harmful because a high number of replicas are impersonated. Then, mostly of the queries would reach one of the Replica Nodes controlled by the attacker obtaining a wrong answer. From the analysis on the previous paragraphs, we can conclude that the number of required IDs in order to perform the Starvation Attack is in the same order of magnitude than N (the number of nodes in the p2p network). Then, this is a particular version of the Sybil Attack [6]. However, in the traditional Sybil Attack the nodes are required to be actively participating on the network whereas in the Starvation Attack although the attacker needs O(N) Peer-IDs it could only participate in the network with those I Peer-IDs employed to perform the attack. Therefore, once the IDs have been obtained, the Starvation Attack requires less resources consumption from the attacker than the Sybil Attack. Due to these factors previous proposed solutions to develop Sybil-Proof systems [7]-[4] are mostly useless in the Starvation Attack. V. RELATED WORK Although only a few papers have analyzed the Starvation Attack in detail many others have considered it somehow. The most studied problem has been the simplest case where there is an unique Replica Node. Most papers, e.g. [5] [6], consider that this case can be modeled by a geometric distribution of mean N+. This assumption comes from a wrong simplification of the problem. This simplification assumes that the size of all the Attack Zones is equal to the average size instead of considering the real distribution introduced in this paper (pdf(x)). Figure 5 shows the distribution of the size of the Attack Zones where the vertical line represents the average AZS. Whereas, Figure 6 depicts the average number of required IDs to succeed on the Starvation Attack as function of the AZS focusing on the area around of the average AZS

6 6 represented by the vertical line. If the results shown in these Figures are compared, we can see that the most vulnerable zones (the large ones) are those which appear with less probability and the most probable zones are those which require a higher average number of IDs in order to perform a successful attack. Based on this result, it is easy to understand that the simplification of considering all the AZS equal to the average AZS is not valid. In addition, Figure 2 depicts a curve named geometric. This is the result of applying the Geometric Distribution of mean N+ in the case of only one Replica Node. Clearly, it does not match the curves of the simulation and the proposed model for one Replica Node presented in the same figure. To the best of our knowledge the most complete analysis developed so far is the one by D.Cerri et al. [6]. They analyzed the Id Mapping Attack (which is exactly the same as the Starvation Attack) in both cases the FSA and the PSA. However, as mentioned before, in the simplest case ( Replica Node) of the FSA, they used the erroneous simplification of modeling the problem as a Geometric Distribution of mean N+. Moreover, the authors of [6] also provide the analysis for the case of the FSA with multiples replicas concluding that the use of R replicas instead of only one multiplies the attack difficulty by a factor of R. This is again not valid as it can be checked on Figure 2 and Table I which show that the use of replicas produces an increment on the difficulty of the attack over the linear. Regarding the PSA, these authors developed an analytical model which only presented the average number of required IDs as a result. Additionally, they introduce simplifications which lead to an incorrect result. Figure 4 shows the average number of needed IDs in order to succeed on the PSA. In the graphic we can check that the obtained result on [6] differs from both, the simulation results and our model. In addition, it must be noted that to the best of our knowledge our paper is the first which analyzes the distribution P s (i.e. the CDF) as function of the number of obtained Peer-IDs. VI. ANALYSIS OF PEER-ID ASSIGNMENT MECHANISMS This section analyses the resistance offered by the ID assignment methods used so far against the Starvation Attack. The simplest method allows an user to select its own Peer-ID. This makes the Starvation Attack trivial. The attacker only has to pick R Peer-IDs in the Attack Zone and the Full Starvation Attack would be successful. Then, if we focus on those mechanisms providing an identifier of random nature the Starvation Attack becomes a Sybil Attack (with the peculiarities described in Section IV). In the first of these mechanisms the attacker forms the Peer-ID as the hash(ip address) or the hash(ip address port). Then, she can use a constrained number of IDs limited by the number of available IP addresses. If we consider the residential user as a potential attacker, she has one public IP address and 2 6 available ports. This represents a total number of 2 6 (65536) possible IDs. If we look on Tables I and II, this is not enough to attack the current popular p2p systems with millions of users. Hence, this assignment method is secure against the Starvation Attack only if the attacker has access to a quite limited range of IP addresses. However, if we suppose that the attacker has access to a class C IP prefix (this is 2 8 IP addresses and 2 6 ports available for the attack) the total number of possible combinations (2 24 ) are over 6 million. Then, the FSA is viable on out of the 6 cases on Table I and the PSA is viable on all the cases included in Table II. Therefore, this assignment method becomes vulnerable if the attacker can impersonate a high number of IPv4 addresses. Furthermore, this mechanism becomes meaningless if we consider IPv6 where each user has a potential access to 2 64 IP addresses in a typical LAN subnet. In addition, this mechanism can present problems on the presence of Network Address Translator (NATs). Some NATs would not permit the users to identify its own Peer-ID. This introduces high entry barriers to the system. On the other hand, the random Peer-IDs can be assigned by a central entity. In this case, a peer could obtain as many Peer-IDs as it desires. Therefore, the complexity of the attack should be evaluated in terms of time. If the process can be done automatically, the attack is simpler. As an example, if the process is composed by an exchange of a solicitation and a response messages which takes ms, the total time spent in order to perform a FSA by an unique attacker with P s equal to.7 in a system with 6 nodes and replicas per resource is approx. 2, 75 6 s (32 days). This is much more reduced in the case of the PSA. Furthermore, this time can be drastically reduced by paralleling the attack. However, the use of a Central Entity allows the application of Access Control Policies which can make the system harder to attack. On the other hand, this policies also incurs in high entry barriers for the honest users. In addition, the Central Entity is a single point of failure. In summary, all the mechanism used so far are vulnerable to the Starvation Attack. Additionally, those systems which could offer higher level of protection introduce also high entry barriers.

7 7 VII. SUMMARY AND FUTURE WORK The main contribution of this paper is the development of an analytical tool which allows the evaluation of the resistance of the one-dimensional DHT systems against the Starvation Attack. In addition, it is shown that the modeling of the problem by a Geometric Distribution is an incorrect assumption. Furthermore, the proposed model has been used to evaluate the resistance of the Peer-ID assignment mechanisms proposed so far against the Starvation Attack. The paper demonstrates that none of them is useful. As future work we will extend the analysis of the Starvation Attack considering churn situations and verify if the proposed model is also valid under those conditions. Furthermore, we will analyze the Starvation Attack in real DHTs as KAD or Azureus. [6] D. Cerri et al., ID Mapping Attacks in P2P Networks, in Proc. IEEE GLOBECOM 25. REFERENCES [] E.K. Lua, J. Crowcroft, M. Pias, R. Sharma, S. Lim, A survey and comparison of peer-to-peer overlay network schemes, IEEE Communications Surveys & Tutorials, 25, pp [2] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications, in Proc. ACM SIGCOMM, 2. [3] P. Maymounkov and D. Mazieres, Kademlia: A peer-to-peer information system based on the xor metric, IPTPS 2, 22. [4] A.Rowstron and P.Druschel, Pastry: Scalable, distributed object location and routing for largescale peer-to-peer systems, in Proc. IFIP/ACM Middleware, 2. [5] M. Steiner and E.W. Biersack and T. En-Najjary, Actively monitoring peers in KAD, IPTPS [6] J. R. Douceur, The Sybil Attack, in Proc. of the st International Workshop on Peer-to-Peer Systems (IPTPS 2). 22. [7] D. S. Wallach, A survey of peer-to-peer security issues, in LNCS, 23. [8] J. Dinger and H. Hartenstein, Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self- Registration, in Proc. of ARES 6, 26. [9] M. Castro, P. Drushel, A. Ganesh, A. Rowstron and D. Wallach, Secure routing for structured peer-to-peer overlay networks, In Proc. of OSDI 2, 22. [] Haifeng Yu, M. Kaminsky, P. H. Gibbons, and A. Flaxman, SybilGuard: Defending Against Sybil Attacks via Social Networks, In Proceedings of ACM SIGCOMM Computer Communication Review, ACM Press, 26, pp [] G. Danezis, C. Lesniewski-Laas, et al., Sybilresistant DHT routing, In Proceedings of th European Symposium On Research in Computer Security (ESORICS 25), Milan, Italy, 25, pp [2] C. Hota et al. Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing, in Proc. of International Conference on Networking, Architecture, and Storage, 27 [3] A. Cheng, and E. Friedman, Sybilproof reputation mechanisms, In Proceedings of ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, 25, ACM Press, pp [4] N. Borisov, Computational Puzzles as Sybil Defenses. In Proc. of IEEE International Conference on Peer to Peer Computing (P2P 6), 26. [5] L. Liu, M. Srivatsa, Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. in Proc. ACSAC 4, 24.

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT 1 Avinash Chaudhari, 2 Pradeep Gamit 1 L.D. College of Engineering, Information Technology, Ahmedabad India 1 Chaudhari.avi4u@gmail.com,

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

Availability for DHT-based Overlay Networks with Unidirectional Routing

Availability for DHT-based Overlay Networks with Unidirectional Routing Availability for DHT-based Overlay Networks with Unidirectional Routing Jan Seedorf 1 and Christian Muus 2 1 NEC Laboratories Europe Kurfuerstenanlage 36, 69115 Heidelberg, Germany jan.seedorf@nw.neclab.eu

More information

Detecting and Recovering from Overlay Routing. Distributed Hash Tables. MS Thesis Defense Keith Needels March 20, 2009

Detecting and Recovering from Overlay Routing. Distributed Hash Tables. MS Thesis Defense Keith Needels March 20, 2009 Detecting and Recovering from Overlay Routing Attacks in Peer-to-Peer Distributed Hash Tables MS Thesis Defense Keith Needels March 20, 2009 Thesis Information Committee: Chair: Professor Minseok Kwon

More information

Exploiting KAD: Possible Uses and Misuses

Exploiting KAD: Possible Uses and Misuses Exploiting KAD: Possible Uses and Misuses Moritz Steiner, Ernst W. Biersack, Taoufik En-Najjary Institut Eurecom, Sophia Antipolis, France {steiner, erbi, ennajjar}@eurecom.fr This article is an editorial

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

Evaluation of Sybil Attacks Protection Schemes in KAD

Evaluation of Sybil Attacks Protection Schemes in KAD Evaluation of Sybil Attacks Protection Schemes in KAD Thibault Cholez, Isabelle Chrisment, and Olivier Festor MADYNES - INRIA Nancy-Grand Est, France {thibault.cholez,isabelle.chrisment,olivier.festor}@loria.fr

More information

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility Rubén Cuevas, Carmen Guerrero, Ángel Cuevas, María Calderón, Carlos J. Bernardos Departamento de Ingeniería Telemática, Universidad

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

Towards Scalable and Robust Overlay Networks

Towards Scalable and Robust Overlay Networks Towards Scalable and Robust Overlay Networks Baruch Awerbuch Department of Computer Science Johns Hopkins University Baltimore, MD 21218, USA baruch@cs.jhu.edu Christian Scheideler Institute for Computer

More information

Faster Content Access in KAD

Faster Content Access in KAD Faster Content Access in KAD Moritz Steiner, Damiano Carra, and Ernst W. Biersack Eurécom, Sophia Antipolis, France {steiner carra erbi}@eurecom.fr Abstract Many different Distributed Hash Tables (DHTs)

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

Performance Modelling of Peer-to-Peer Routing

Performance Modelling of Peer-to-Peer Routing Performance Modelling of Peer-to-Peer Routing Idris A. Rai, Andrew Brampton, Andrew MacQuire and Laurent Mathy Computing Department, Lancaster University {rai,brampton,macquire,laurent}@comp.lancs.ac.uk

More information

Sybil defenses via social networks

Sybil defenses via social networks Sybil defenses via social networks Abhishek University of Oslo, Norway 19/04/2012 1 / 24 Sybil identities Single user pretends many fake/sybil identities i.e., creating multiple accounts observed in real-world

More information

Large-Scale Monitoring of DHT Traffic

Large-Scale Monitoring of DHT Traffic Large-Scale Monitoring of DHT Traffic Ghulam Memon, Reza Rejaie University of Oregon {gmemon, reza}@cs.uoregon.edu Yang Guo Corporate Research, Thomson Yang.Guo@thomson.net Daniel Stutzbach Stutzbach Enterprises

More information

DHT Routing Using Social Links

DHT Routing Using Social Links DHT Routing Using Social Links Sergio Marti, Prasanna Ganesan and Hector Garcia-Molina Stanford University {smarti, prasanna, hector}@cs.stanford.edu Abstract The equality and anonymity of peer-to-peer

More information

R/Kademlia: Recursive and Topology-aware Overlay Routing

R/Kademlia: Recursive and Topology-aware Overlay Routing R/Kademlia: Recursive and Topology-aware Overlay Routing Bernhard Heep ATNAC 2010, Auckland, New Zealand, 11/02/2010, KIT University of the State of Baden-Wuerttemberg and National Research Center of the

More information

Secure Routing in Peer-to-Peer Distributed Hash Tables

Secure Routing in Peer-to-Peer Distributed Hash Tables Secure Routing in Peer-to-Peer Distributed Hash Tables Keith Needels Department of Computer Science Rochester Institute of Technology Rochester, NY 14623 keithn@csh.rit.edu Minseok Kwon Department of Computer

More information

Athens University of Economics and Business. Dept. of Informatics

Athens University of Economics and Business. Dept. of Informatics Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service

More information

Survey of DHT Evaluation Methods

Survey of DHT Evaluation Methods Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the

More information

Evaluation of Sybil Attacks Protection Schemes in KAD

Evaluation of Sybil Attacks Protection Schemes in KAD Author manuscript, published in "AIMS 2009: 3rd International Conference on Autonomous Infrastructure, Management and Security 5637 (2009) 70-82" DOI : 10.1007/978-3-642-02627-0_6 Evaluation of Sybil Attacks

More information

Effects of Churn on Structured P2P Overlay Networks

Effects of Churn on Structured P2P Overlay Networks International Conference on Automation, Control, Engineering and Computer Science (ACECS'14) Proceedings - Copyright IPCO-214, pp.164-17 ISSN 2356-568 Effects of Churn on Structured P2P Overlay Networks

More information

A P2P File Sharing Technique by Indexed-Priority Metric

A P2P File Sharing Technique by Indexed-Priority Metric A P2P File Sharing Technique by Indexed-Priority Metric Toshinori Takabatake and Yoshikazu Komano Abstract Recently, the improvements in processing performance of a computer and in high speed communication

More information

S/Kademlia: A Practicable Approach Towards Secure Key Based Routing

S/Kademlia: A Practicable Approach Towards Secure Key Based Routing S/Kademlia: A Practicable Approach Towards Secure Key Based Routing Ingmar Baumgart, Sebastian Mies P2P NVE 2007, Hsinchu, Taiwan, Institute of Telematics Prof. Dr. M. Zitterbart Motivation Kademlia is

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

A Search Theoretical Approach to P2P Networks: Analysis of Learning

A Search Theoretical Approach to P2P Networks: Analysis of Learning A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.

More information

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.5, September 27 PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS Farida Chowdhury

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

Purpose and security analysis of RASTER

Purpose and security analysis of RASTER Purpose and security analysis of RASTER Oliver Gasser Advisor: Christian Grothoff Seminar Future Internet SS2010 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität

More information

An Empirical Study of Data Redundancy for High Availability in Large Overlay Networks

An Empirical Study of Data Redundancy for High Availability in Large Overlay Networks An Empirical Study of Data Redundancy for High Availability in Large Overlay Networks Giovanni Chiola Dipartimento di Informatica e Scienze dell Informazione (DISI) Università di Genova, 35 via Dodecaneso,

More information

SPROUT: P2P Routing with Social Networks

SPROUT: P2P Routing with Social Networks SPROUT: P2P Routing with Social Networks Sergio Marti, Prasanna Ganesan and Hector Garcia-Molina Stanford University {smarti, prasannag, hector}@cs.stanford.edu March 1, 24 Abstract In this paper, we investigate

More information

The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables

The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables Cyrus Harvesf and Douglas M. Blough Georgia Institute of Technology School of Electrical and Computer Engineering Atlanta,

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Secure Distributed Storage in Peer-to-peer networks

Secure Distributed Storage in Peer-to-peer networks Secure Distributed Storage in Peer-to-peer networks Øyvind Hanssen 07.02.2007 Motivation Mobile and ubiquitous computing Persistent information in untrusted networks Sharing of storage and information

More information

HyCube: A distributed hash table based on a hierarchical hypercube geometry

HyCube: A distributed hash table based on a hierarchical hypercube geometry HyCube: A distributed hash table based on a hierarchical hypercube geometry Artur Olszak Institute of Computer Science, Warsaw University of Technology A.Olszak@ii.pw.edu.pl Abstract. This paper presents

More information

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK 116 MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK Herry Imanta Sitepu, Carmadi Machbub, Armein Z. R. Langi, Suhono Harso Supangkat School of Electrical Engineering and Informatics, Institut Teknologi

More information

Real-World Sybil Attacks in BitTorrent Mainline DHT

Real-World Sybil Attacks in BitTorrent Mainline DHT Real-World Attacks in BitTorrent Mainline DHT Liang Wang Dept. of Computer Science University of Helsinki Helsinki, Finland Jussi Kangasharju Helsinki Institute for Information Technology University of

More information

Poisoning the Kad Network

Poisoning the Kad Network Poisoning the Kad Network Thomas Locher 1,DavidMysicka 1,StefanSchmid 2, and Roger Wattenhofer 1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz.ch,

More information

Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays

Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Alan Mislove Peter Druschel Rice University, Houston, TX, USA Abstract Structured peer-to-peer (p2p) overlay networks provide

More information

ReDS: A Framework for Reputation-Enhanced DHTs

ReDS: A Framework for Reputation-Enhanced DHTs ReDS: A Framework for Reputation-Enhanced DHTs Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew Wright Abstract Distributed Hash Tables (DHTs), such as Chord and Kademlia,

More information

fp2p-hn: A P2P-based Route Optimization Solution for Mobile IP and NEMO clients.

fp2p-hn: A P2P-based Route Optimization Solution for Mobile IP and NEMO clients. 1 fp2p-hn: A P2P-based Route Optimization Solution for Mobile IP and NEMO clients. Albert Cabellos-Aparicio 1, Rubén Cuevas 2, Jordi Domingo-Pascual 1, Ángel Cuevas 2, Carmen Guerrero 2 Abstract Wireless

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Defending against Eclipse attacks on overlay networks

Defending against Eclipse attacks on overlay networks Defending against Eclipse attacks on overlay networks Atul Singh 1 Miguel Castro 2 Peter Druschel 1 Antony Rowstron 2 1 Rice University, Houston, TX, USA. 2 Microsoft Research, Cambridge, UK. Abstract

More information

Simulation of the Impact of Packet Errors on the Kademlia Peer-to-Peer Routing

Simulation of the Impact of Packet Errors on the Kademlia Peer-to-Peer Routing T. Ginzler M. Amanowicz tobias.ginzler@fkie.fraunhofer.de, marek.amanowicz@wat.edu.pl ABSTRACT Tactical radio communication is crucial for command and control. The progress in C2 software demands higher

More information

Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables

Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables Nuno Lopes and Carlos Baquero CCTC-Department of Informatics University of Minho Braga, Portugal Abstract. Range

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -

More information

08 Distributed Hash Tables

08 Distributed Hash Tables 08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per

More information

Security Considerations for Peer-to-Peer Distributed Hash Tables

Security Considerations for Peer-to-Peer Distributed Hash Tables Security Considerations for Peer-to-Peer Distributed Hash Tables Emil Sit and Robert Morris Laboratory for Computer Science, MIT 200 Technology Square, Cambridge, MA 02139, USA {sit,rtm}@lcs.mit.edu Abstract.

More information

P2P: Distributed Hash Tables

P2P: Distributed Hash Tables P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)

More information

Structured Overlays:

Structured Overlays: Structured Overlays: Attacks, Defenses, and all things Proximity April 27th, 2006 Wyman Park 4 th Floor Conference Room Presentation by: Jay Zarfoss Our roadmap General overview of Overlays / DHTs Chord

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

Detecting and Recovering from Overlay Routing Attacks in Peer-to-Peer Distributed Hash Tables

Detecting and Recovering from Overlay Routing Attacks in Peer-to-Peer Distributed Hash Tables Detecting and Recovering from Overlay Routing Attacks in Peer-to-Peer Distributed Hash Tables A thesis for the degree of Master of Science in Computer Science Keith Needels keithn@csh.rit.edu Department

More information

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity 546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

An Efficient and Secure Peer-to-Peer Overlay Network

An Efficient and Secure Peer-to-Peer Overlay Network An Efficient and Secure Peer-to-Peer Overlay Network Honghao Wang, Yingwu Zhu and Yiming Hu Department of Electrical & Computer Engineering and Computer Science University of Cincinnati {wanghong, zhuy,

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

Routing Table Construction Method Solely Based on Query Flows for Structured Overlays

Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Yasuhiro Ando, Hiroya Nagao, Takehiro Miyao and Kazuyuki Shudo Tokyo Institute of Technology Abstract In structured

More information

Detecting and Excluding Misbehaving Nodes in a P2P Network

Detecting and Excluding Misbehaving Nodes in a P2P Network Detecting and Excluding Misbehaving Nodes in a P2P Network François Lesueur Ludovic Mé Valérie Viet Triem Tong SUPELEC, SSIR Group (EA 4039) Avenue de la Boulaie - CS 47601-35576 Cesson-Sévigné cedex -

More information

DRing: A Layered Scheme for Range Queries over DHTs

DRing: A Layered Scheme for Range Queries over DHTs DRing: A Layered Scheme for Range Queries over DHTs Nicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens and Xavier Bonnaire Université Pierre et Marie Curie, CNRS INRIA - REGAL, Paris,

More information

Distributed hash table - Wikipedia, the free encyclopedia

Distributed hash table - Wikipedia, the free encyclopedia Page 1 sur 6 Distributed hash table From Wikipedia, the free encyclopedia Distributed hash tables (DHTs) are a class of decentralized distributed systems that provide a lookup service similar to a hash

More information

An Agenda for Robust Peer-to-Peer Storage

An Agenda for Robust Peer-to-Peer Storage An Agenda for Robust Peer-to-Peer Storage Rodrigo Rodrigues Massachusetts Institute of Technology rodrigo@lcs.mit.edu Abstract Robust, large-scale storage is one of the main applications of DHTs and a

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

Routing Protocols of Distributed Hash Table Based Peer to Peer Networks

Routing Protocols of Distributed Hash Table Based Peer to Peer Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. II (Jan. 2014), PP 70-74 Routing Protocols of Distributed Hash Table Based Peer to Peer Networks

More information

Efficient DHT attack mitigation through peers ID distribution

Efficient DHT attack mitigation through peers ID distribution Efficient DHT attack mitigation through peers ID distribution Thibault Cholez, Isabelle Chrisment and Olivier Festor {thibault.cholez, isabelle.chrisment, olivier.festor}@loria.fr LORIA - Campus Scientifique

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

Implications of Neighbor Selection on DHT Overlays

Implications of Neighbor Selection on DHT Overlays Implications of Neighbor Selection on DHT Overlays Yingwu Zhu Department of CSSE, Seattle University zhuy@seattleu.edu Xiaoyu Yang Department of ECECS, University of Cincinnati yangxu@ececs.uc.edu Abstract

More information

Layer Optimization for DHT-based Peer-to-Peer Network

Layer Optimization for DHT-based Peer-to-Peer Network Layer Optimization for DHT-based Peer-to-Peer Network Jun Li *, Cuilian Li, Zhaoxi Fang Department of Telecommunication Zhejiang Wanli University Ningbo, China xxllj, licl@zwu.edu.cn, zhaoxifang@gmail.com

More information

Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System

Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li Tsinghua National Laboratory for Information Science and

More information

Enabling Dynamic Querying over Distributed Hash Tables

Enabling Dynamic Querying over Distributed Hash Tables Enabling Dynamic Querying over Distributed Hash Tables Domenico Talia a,b, Paolo Trunfio,a a DEIS, University of Calabria, Via P. Bucci C, 736 Rende (CS), Italy b ICAR-CNR, Via P. Bucci C, 736 Rende (CS),

More information

Avoiding Eclipse attacks on Kad/Kademlia: an identity based approach

Avoiding Eclipse attacks on Kad/Kademlia: an identity based approach Avoiding Eclipse attacks on Kad/Kademlia: an identity based approach Leonardo Maccari, Matteo Rosi, Romano Fantacci, Luigi Chisci Luca Maria Aiello, Marco Milanesio Department of Electronics and Telecommunications

More information

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Zhiyu Liu, Ruifeng Yuan, Zhenhua Li, Hongxing Li, and Guihai Chen State Key Laboratory of Novel Software Technology, Nanjing

More information

UC Berkeley UC Berkeley Previously Published Works

UC Berkeley UC Berkeley Previously Published Works UC Berkeley UC Berkeley Previously Published Works Title Impact of neighbor selection on performance and resilience of structured P2P networks Permalink https://escholarship.org/uc/item/9tq2wn2 Authors

More information

Kademlia: A P2P Informa2on System Based on the XOR Metric

Kademlia: A P2P Informa2on System Based on the XOR Metric Kademlia: A P2P Informa2on System Based on the XOR Metric Today! By Petar Mayamounkov and David Mazières, presented at IPTPS 22 Next! Paper presentation and discussion Image from http://www.vs.inf.ethz.ch/about/zeit.jpg

More information

ipersea : The Improved Persea with Sybil Detection Mechanism

ipersea : The Improved Persea with Sybil Detection Mechanism ipersea : The Improved Persea with Sybil Detection Mechanism Mahdi Nasrullah Al-Ameen and Matthew Wright Dartment of Computer Science and Engineering The University of Texas at Arlington Arlington, TX,

More information

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs

More information

Proactive Caching for Better than Single-Hop Lookup Performance

Proactive Caching for Better than Single-Hop Lookup Performance Proactive Caching for Better than Single-Hop Lookup Performance Venugopalan Ramasubramanian and Emin Gün Sirer Cornell University, Ithaca NY 4853 ramasv, egs @cs.cornell.edu Abstract High lookup latencies

More information

Data Indexing and Querying in DHT Peer-to-Peer Networks

Data Indexing and Querying in DHT Peer-to-Peer Networks Institut EURECOM Research Report N o 73 RR-03-073 Data Indexing and Querying in DHT Peer-to-Peer Networks P.A. Felber, E.W. Biersack, L. Garcés-Erice, K.W. Ross, G. Urvoy-Keller January 15, 2003 2 Data

More information

Understanding Chord Performance

Understanding Chord Performance CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system

More information

Monitoring and Controlling Content Access in KAD

Monitoring and Controlling Content Access in KAD Monitoring and Controlling Content Access in KAD Thibault Cholez, Isabelle Chrisment, Olivier Festor To cite this version: Thibault Cholez, Isabelle Chrisment, Olivier Festor. Monitoring and Controlling

More information

12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics

12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics // Topics Peer to Peer Systems Introduction Client-server vs peer to peer Peer-to-peer networks Routing Overlays Structured vs unstructured Example PP Systems Skype login server Peer-to-peer - definitions

More information

TinyTorrent: Implementing a Kademlia Based DHT for File Sharing

TinyTorrent: Implementing a Kademlia Based DHT for File Sharing 1 TinyTorrent: Implementing a Kademlia Based DHT for File Sharing A CS244B Project Report By Sierra Kaplan-Nelson, Jestin Ma, Jake Rachleff {sierrakn, jestinm, jakerach}@cs.stanford.edu Abstract We implemented

More information

Chapter 10: Peer-to-Peer Systems

Chapter 10: Peer-to-Peer Systems Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Introduction To enable the sharing of data and resources

More information

Motivation. The Impact of DHT Routing Geometry on Resilience and Proximity. Different components of analysis. Approach:Component-based analysis

Motivation. The Impact of DHT Routing Geometry on Resilience and Proximity. Different components of analysis. Approach:Component-based analysis The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Karthik Lakshminarayanan at P2P Systems class (Slides liberally borrowed from Krishna s SIGCOMM talk) Krishna Gummadi, Ramakrishna

More information

The Impact of DHT Routing Geometry on Resilience and Proximity. Acknowledgement. Motivation

The Impact of DHT Routing Geometry on Resilience and Proximity. Acknowledgement. Motivation The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Noorullah Moghul Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion Stoica Acknowledgement

More information

Veracity: Practical Secure Network Coordinates via Vote-Based Agreements

Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania USENIX Technical June 18th, 2009 1 Network Coordinate Systems

More information

Aggregation of a Term Vocabulary for Peer-to-Peer Information Retrieval: a DHT Stress Test

Aggregation of a Term Vocabulary for Peer-to-Peer Information Retrieval: a DHT Stress Test Aggregation of a Term Vocabulary for Peer-to-Peer Information Retrieval: a DHT Stress Test Fabius Klemm and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Improving Lookup Performance over a Widely-Deployed DHT

Improving Lookup Performance over a Widely-Deployed DHT Improving Lookup Performance over a Widely-Deployed DHT Daniel Stutzbach, Reza Rejaie Department of Computer & Information Science University of Oregon {agthorr,reza}@cs.uoregon.edu Abstract During recent

More information

Peer Clustering and Firework Query Model

Peer Clustering and Firework Query Model Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk

More information

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

Distributed Hash Tables

Distributed Hash Tables Distributed Hash Tables Chord Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Chord 1/29 Outline Overview 1 Overview 2 3 Smruti R. Sarangi

More information

Sybil-resistant DHT routing

Sybil-resistant DHT routing Sybil-resistant DHT routing George Danezis 1, Chris Lesniewski-Laas 2, M. Frans Kaashoek 2, and Ross Anderson 1 1 University of Cambridge, Computer Laboratory, 15 J J Thomson Avenue, Cambridge CB3 0FD,

More information