Evaluation of the p2p Structured Systems Resistance against the Starvation Attack
|
|
- Geraldine Walters
- 5 years ago
- Views:
Transcription
1 Evaluation of the p2p Structured Systems Resistance against the Starvation Attack Rubén Cuevas, Ángel Cuevas, Manuel Urueña, Albert Banchs and Carmen Guerrero Departament of Telematic Engineering, Universidad Carlos III de Madrid, Spain Abstract The Starvation Attack consists on making a resource fully or partially inaccessible. This is a significant and harmful attack on structured p2p networks. This paper provides an analytical tool which permits the evaluation of the resistance offered by the most popular structured p2p systems, the one-dimensional DHT-based p2p systems such as Chord or Kademlia, against this attack. In addition, the Starvation Attack is closely related to the Peer-ID assignment mechanism. This paper demonstrates that the Peer-ID assignment mechanisms defined so far are useless against the Starvation Attack. I. INTRODUCTION The Peer-to-Peer (p2p) technology is currently the one with the highest impact in the Internet mainly supported by content distribution and file-sharing applications. This technology has been intensely investigated in many aspects so far. However, in the case of security there is still much work to do. This paper provides a rigorous analysis of the problem of the Starvation Attack on structured DHT-based p2p networks [] (e.g. Chord [2], Kademlia [3] or Pastry [4]). This work has direct application to networks such as KAD with.5 million simultaneous users [5] or Azureus with hundreds of thousands users (both of them are based on Kademlia). In the DHT-based p2p networks the resources have an associated resource-key. This key is a k-bits identifier and is the result of computing a hash operation (thus, k can be 64, 28, 6,... depending on the hash operation employed). The nodes forming the DHT have an identifier as well. This is named Peer-ID and belongs to the same idspace as the resource-keys. This paper focuses on the onedimensional DHT networks (e.g. Chord, Kademlia, Pastry or Tapestry). In these DHTs the id-space can be mapped into a ring where the Peer-IDs and the resource-keys are located. It must be highlighted that the one-dimensional DHT networks have been thoroughly analyzed and are the most popular among the structured p2p networks. In these overlays a given resource-key is stored by the node with the closest Peer-ID. We name this node Responsible Node. However, the concept of the closest node varies among the different DHT schemes. In Kademlia, Pastry and Tapestry the closest node to a resource-key is the one with the closest Peer-ID. Whereas, in Chord the closest node is the one with the subsequent Peer-ID (the higher and closest) to the resource-key in the ring. In addition, it must be considered that due to the dynamic nature of p2p networks there is not only one but several nodes storing a given resource-key. These are the nodes with the closest Peer-IDs to the resource-key and they are called Replica Nodes. This minimizes the risk of losing the resource-keys stored by a node in case it leaves the p2p network. The Starvation Attack is defined as the attack which makes a resource fully or partially inaccessible. In the case of the structured p2p networks this attack can be performed by obtaining a Peer-ID closer to the resourcekey than the current Responsible Node(s). After that, the attacker does not answer (or provides wrong answers) to the queries related to the affected resource-key. In case of replication the attacker can starve all the R replicas (by obtaining the R closest Peer-IDs to the resource-key) or just a subset of the total R replicas. The former is named Full Starvation Attack (FSA) and the latter Partial Starvation Attack (PSA). The FSA is more harmful than the PSA since the attacker controls all the replicas and makes the resource fully inaccessible. Whereas, in the PSA some users can access the resource because the attack only affects the queries arriving to the subset of Replica Nodes controlled by the attacker. In order to facilitate our study, the concept of Attack Zone is introduced in this paper. The Attack Zone is the interval of identifiers which is valid in order to succeed in the Starvation Attack. The number of identifiers in the Attack Zone is called Attack Zone Size (AZS). The Starvation Attack is closely related to the ID assignment method used in the structured p2p network. Replica Node and Responsible Node will be used indistinguishable during the rest of the paper.
2 2 Two types of assignments have been used so far. The first one allows a node to select its own Peer-ID. Then, the Starvation Attack becomes trivial; the attacker only has to choose the necessary number of Peer-IDs in the Attack Zone and the attack would be successful. The other approach provides IDs of random nature. This prevents that a malicious node can choose its location in the network, thus forcing the attacker to acquire multiple Peer- IDs until one (or more in case of replication) is located inside the Attack Zone, therefore reducing the probability of succeeding in the attack. This paper focuses on the approach of IDs of random nature, since it is the useful one to evaluate. The main goal of this paper is to provide closed formulas for the average number of random required IDs in order to succeed in the Starvation Attack - n-, and the Probability of Success of the Starvation Attack as function of the number of random obtained IDs -P s (n)-. In particular, this is the Cumulative Distribution Function (CDF) as function of the number of random obtained IDs. The key contribution of this paper is the proposed analytical tool for evaluating the Starvation Attack, that will be compared with previously proposed models and shown to produce correct results. In addition, the model will be applied to demonstrate that the Peer-ID assignment mechanisms defined so far are vulnerable to the Starvation Attack. II. THE ANALYTICAL MODEL OF THE STARVATION ATTACK This section presents the analytical model for the Starvation Attack on structured p2p networks. The goal is to find the closed formulas for n and P s (n). These two formulas will be the basic tools used to evaluate the resistance of the different ID assignment mechanisms against the Starvation Attack. The following parameters will be used during the analysis: N, the number of nodes in the network; n, the number of obtained/required Peer- IDs; R, the total number of replicas; I, the number of desired replicas to starve; M, the number of IDs in the the id-space. It must be taken into consideration that the size of the id-space -M- is equal to 2 k >>N (k is equal to 28, 6 or 256 depending on the hash operation). Hence, without loss of generality, our model considers that the obtained Peer-IDs are randomly distributed in the continuous idspace [,]. This is a very accurate approximation to the real scenario on which the Peer-IDs are randomly distributed in the discrete id-space [,M). Since M is large enough the assumption that the id-space is continuous instead of discrete yields also accurate results. The conversion of the space [,M) to [,] introduces only a scalar factor whose solely purpose is to simplify the notation. II-A. Starvation of a Single Resource A single resource has an associated Attack Zone of size X. Then, in order to perform the Starvation Attack, the malicious node should obtain multiple random Peer-IDs until it gets I of them within X. Then, the probability that a single obtained ID belongs to X is X itself whereas -X is the probability that the obtained ID is outside of X. We would like to model P r (n, X) 2. This is the probability of success in the starvation of a single resource with an associated Attack Zone of size X as function of the number of obtained Peer-IDs (n) and the number of replicas to be starved (I). Thus, P r (n, X) can be modeled as the Probability of obtaining at least I Peer-IDs within X. If we suppose that an attacker has obtained n randomly distributed IDs on the id-space, then the probability of obtaining at least I of them belonging to an Attack Zone of size X is equal to minus the probability of obtaining at least I- in this zone. This is presented on Equation. P r (n, X) = CDF (n, X) = P (at least I- nodes in X); P r (n, X) = [P ( IDs in X and n outside) + P ( ID in X and n- outside) P ((I- nodes in X and n-(i-) outside)]; I X n P r(n, X) = X i ( X) n i i i= Moreover, n r (X) is also modeled. This is the average number of required IDs in order to succeed in the Starvation Attack. This is mathematically expressed as the mean associated to the introduced distribution and is shown on Equation 2. II-B. n r(x) = I X Attack Zone Size Distribution The objective of this section is to define the probability density function pdf(x), where x is the random variable modeling the size of an Attack Zone in a one-dimensional DHT. Firstly, we should identify the Attack Zone in these overlays. Indeed, this can be mathematically defined on each system. Equation 3 presents the formal definition of the Attack Zone in Chord, whereas Equation 4 does the same in the case of Kademlia (also valid for Pastry and Tapestry). RK and RN are the abbreviations of resourcekey and Replica Node respectively. Figure includes an example of these Attack Zones. Chord Attack Zone = [RK, (R I + ) th RN ID) (3) 2 This is the Cumulative Distribution Function, CDF(n,X). () (2)
3 3 Probability of Success Geometric (R=) Chord Simualtion (R=).4 Kademlia Simulation (R=) Model (R=).3 Chord Simualtion (R=2) Kademlia Simulation (R=2).2 Model (R=2) Chord Simualtion (R=5). Kademlia Simulation (R=5) Model (R=5) Number of Obtained Peer IDs x 5 Fig. 2. P s model validation for the FSA: M= 32, N= 4 Fig.. Attack Zones in Kademlia and Chord: R=5, I=3. AZS = E[x] = Z x pdf(x)δx = R I + N + (7) Kademlia Attack Zone = (RK RK (R I + ) th RN ID, RK+ RK (R I + ) th RN ID ) The AZS is defined as the number of IDs included in the Attack Zones presented on Equations 3 and 4. Despite the Attack Zones being different in Chord than in the other overlays, the model representing the size of both of them is the same because the Attack Zone is always modeled by the zone where at least R-I+ replicas are placed. Thus, the size will be the same if only the subsequent IDs to the resource-key are considered (as occurs in Chord) than if IDs at both side of the resourcekey are considered (as occurs in Kademlia, Pastry or Tapestry). Therefore, the CDF(x) is defined as the probability of finding a zone where at least R-I+ replicas are placed. This is the same as minus the probability of finding a zone with at least R-I replicas which is mathematically expressed on Equation 5. CDF (x) = P (at least R-I nodes in x); CDF (x) = [P ( node in x and N outside) CDF (x) = + P ( node in x and N- outside) P ((R-I) nodes in x and N-(R-I) outside)]; R I X r= N r x r ( x) N r Now, we can calculate the pdf(x) which is simply the derivative of the CDF(x), as shown on Equation 6. δcdf (x, I, R) pdf(x) = δx R I X N = [(N r)x r ( x) N r rx r ( x) N r ] r r= Finally, Equation 7 shows AZS. (4) (5) (6) AZS. This is the average II-C. Starvation Attack General Model In Section II-A the Probability of Success in the Starvation Attack and the average number of needed IDs in order to succeed in the attack for the case of a single resource were obtained. These are, P r (X, n) and n r (X) respectively. Moreover, in Section II-B the distribution of the size of the Attack Zones was obtained. This is pdf(x). Then, if we weight by an integration process P r (X, n) and n r (X) by pdf(x) the desired results, P s (n) and n are obtained. These are respectively, the global Probability of Success in the Starvation Attack and the average number of required IDs in order to succeed in the attack and are shown on Equation 8 and Equation 9 respectively. Z P s (n) = P r (n, x) pdf(x)δx R I X «N r!(n + n r )! = [n r= r (N + n)! (8) Q IX i 2 (n k) k= (r + (i 2))!(N + n r i)! + (rn (i )N) ] i=2 (i )! (N + n)! Z N n = n r (x) pdf(x)δx = I R I It must be noted that the equations presented in Sections II-A, II-B and II-C define the Partial Starvation Attack. In order to obtain the formulas for the Full Starvation Attack it is necessary to consider I equal to R (the total number of replicas) in the equations. III. MODEL VALIDATION The proposed model was validated by simulation for both types of one-dimensional DHTs (On one side Chord, and on the other side Kademlia, Pastry and Tapestry). Indeed, Chord and Kademlia were simulated. The closed (9)
4 4.9.8 I= I=2 I=3 I=4 I=5 I=6 Chord Simulation Kademlia Simulation Model 9 x n model n model D.Cerri et al. n Chord Simulation n Kademlia Simulation I=7 I=8 Number of obtained ids I= Number of Obtained Peer IDs x Number of Starved Replicas Fig. 3. P s model validation for the PSA: M= 32, N= 4, R= Fig. 4. n model validation: M= 32, N= 4, R=, I= 9 formulas for P s (n) and n were validated. Each experiment was simulated E times. On each experiment a onedimensional DHT system with N randomly generated nodes on an id-space of M identifiers (M>>N as occurs in real p2p systems) was created. Then, S Starvation Attacks were reproduced using randomly generated resourcekeys. On each simulated attack several random Peer-IDs were generated until I of them belonging to the Attack Zone were obtained. The number of the required IDs to perform each attack was then stored in order to compute P s (n) and n from the simulation experiments. The validation process used the following set of parameters: E=2, N= 4, M= 32, S= 4. The validation of P s (n) in the case of the FSA was developed for R=, R=2 and R=5 replicas. The average of each sample from the 2 repetitions was computed and presented along with the analytical curve 3. This is shown on Figure 2. For the validation of P s (n) in the case of the PSA the experiments were developed with R= and I ranging from to 9. The average of each sample from the 2 repetitions was computed and presented along with the analytical curve for each value of I. Figure 3 shows the results. Finally, Figure 4 shows the simulation and the analytical result for n. In all the experiments described above the maximum absolute error was inferior to 3,5 3 and the average error was around 5. Therefore, we can conclude that the model follows closely the simulation results. IV. DISCUSSION OF THE RESULTS In this section the Full and the Partial Starvation Attacks will be separately analyzed using the proposed model 3 The confidence intervals were also calculated, however they are indistinguishable because they are very close to the average value. as basis. P s =,3 P s =,5 P s =,7 P s =,9 R= 429 N N N 9 N R= N N N N R= 7 85 N N N N R=2 6 6 N N N N TABLE I NUMBER OF REQUIRED IDS ON THE FSA In the case of the FSA (I=R), it must be highlighted that the average number of required IDs - n- is infinite. This occurs because there is one case that needs infinite IDs in order to succeed in the attack (i.e. the attack is impossible). This happens if the resource-key and the responsible Peer-ID are exactly the same ID which has a small Probability but higher than. Therefore, in order to analyze the FSA we should focus on P s (n). For this purpose Table I includes the number of required IDs to fully starve a resource -n- as function of different values of P s and the number of replicas -R- in a one-dimensional DHT with N nodes. Both, Figure 2 and Table I demonstrate that the complexity of the FSA increases over the linear with R. Then, in order to avoid the FSA it is recommended to use a high number of Replica Nodes. On the other hand, in the case of the PSA n is not infinite anymore. If we consider I as a percentage of the total replicas, it can be expressed as I=cR where c varies from (no starvation) to (FSA) passing through out different situations of PSA. Then, Equation 2 can be reformulated as Equation. This shows the number of required IDs in order to starve the c percentage of the total replicas. n(c) = cr N R cr = N c c () Equation shows an important result: the complexity of the PSA is independent on the total number of replicas
5 5 pdf(x) Model Simulation Average AZS Average Number of Required Ids (nr) x Average Number of Attempts Average AZS Attack Zone Size (AZS) x Attack Zone Size (AZS) x 8 Fig. 5. Distribution of AZS -pdf(x)-: M= 2, N= 4 Fig. 6. n r to starve a single resource: M= 2, N= 4 -R- by itself, as it only depends on the number of nodes in the network -N- and the percentage of replicas to be starved -c-. For instance, the number of required IDs in order to starve 5 out of replicas is the same than in the case of starve out of 2. However, this is a misleading conclusion if we consider this value as representative result. Table II introduces some values to evaluate the complexity of performing the PSA. These represent the number of required Peer-IDs as function of P s, I, R and c. We can check in the Table that for the same value of c, the number of required IDs varies, then the complexity of the PSA is not independent on R. Hence, n should be carefully interpreted. It is a good tool to make rough estimations. However, in order to provide an accurate analysis the distribution expressed by P s must be also considered. P s =,3 P s =,5 P s =,7 P s =,9 R=5; I=, 74 N 48 N, 272 N 585 N c=.2 R=5; I=3 639 N N, 565 N 3 55 N c=.6 R=5; I=4 37 N 2 87 N N 7 9 N c=.8 R=; I=2 23 N 94 N 294 N 58 N c=.2 R=; I=6 878 N 24 N 684 N 2 74 N c=.6 R=; I=8 2 4 N N 4 92 N N c=.8 R=2; I=4 62 N 22 N 295 N 437 N c=.2 R=2; I=2 66 N 346 N 74 N 2 43 N c=.6 R=2; I= N N N N c=.8 TABLE II NUMBER OF REQUIRED IDS ON THE PSA From Table II and Figures 3 and 4 we can conclude that the difficulty of the PSA depends mainly on the parameter c defined above. If c is low, that is, I is much lower than R, the difficulty of the attack is low. On the other hand if c is high, that is, I is close to R, the difficulty of the attack increases drastically. Therefore, the difficulty of the attack increase exponentially with c. On the other hand, if c is low the damage caused by the attack is reduced since the number of affected replicas is low, thus the number of queries affected would be low as well. Whereas, with high values of c the attack becomes more harmful because a high number of replicas are impersonated. Then, mostly of the queries would reach one of the Replica Nodes controlled by the attacker obtaining a wrong answer. From the analysis on the previous paragraphs, we can conclude that the number of required IDs in order to perform the Starvation Attack is in the same order of magnitude than N (the number of nodes in the p2p network). Then, this is a particular version of the Sybil Attack [6]. However, in the traditional Sybil Attack the nodes are required to be actively participating on the network whereas in the Starvation Attack although the attacker needs O(N) Peer-IDs it could only participate in the network with those I Peer-IDs employed to perform the attack. Therefore, once the IDs have been obtained, the Starvation Attack requires less resources consumption from the attacker than the Sybil Attack. Due to these factors previous proposed solutions to develop Sybil-Proof systems [7]-[4] are mostly useless in the Starvation Attack. V. RELATED WORK Although only a few papers have analyzed the Starvation Attack in detail many others have considered it somehow. The most studied problem has been the simplest case where there is an unique Replica Node. Most papers, e.g. [5] [6], consider that this case can be modeled by a geometric distribution of mean N+. This assumption comes from a wrong simplification of the problem. This simplification assumes that the size of all the Attack Zones is equal to the average size instead of considering the real distribution introduced in this paper (pdf(x)). Figure 5 shows the distribution of the size of the Attack Zones where the vertical line represents the average AZS. Whereas, Figure 6 depicts the average number of required IDs to succeed on the Starvation Attack as function of the AZS focusing on the area around of the average AZS
6 6 represented by the vertical line. If the results shown in these Figures are compared, we can see that the most vulnerable zones (the large ones) are those which appear with less probability and the most probable zones are those which require a higher average number of IDs in order to perform a successful attack. Based on this result, it is easy to understand that the simplification of considering all the AZS equal to the average AZS is not valid. In addition, Figure 2 depicts a curve named geometric. This is the result of applying the Geometric Distribution of mean N+ in the case of only one Replica Node. Clearly, it does not match the curves of the simulation and the proposed model for one Replica Node presented in the same figure. To the best of our knowledge the most complete analysis developed so far is the one by D.Cerri et al. [6]. They analyzed the Id Mapping Attack (which is exactly the same as the Starvation Attack) in both cases the FSA and the PSA. However, as mentioned before, in the simplest case ( Replica Node) of the FSA, they used the erroneous simplification of modeling the problem as a Geometric Distribution of mean N+. Moreover, the authors of [6] also provide the analysis for the case of the FSA with multiples replicas concluding that the use of R replicas instead of only one multiplies the attack difficulty by a factor of R. This is again not valid as it can be checked on Figure 2 and Table I which show that the use of replicas produces an increment on the difficulty of the attack over the linear. Regarding the PSA, these authors developed an analytical model which only presented the average number of required IDs as a result. Additionally, they introduce simplifications which lead to an incorrect result. Figure 4 shows the average number of needed IDs in order to succeed on the PSA. In the graphic we can check that the obtained result on [6] differs from both, the simulation results and our model. In addition, it must be noted that to the best of our knowledge our paper is the first which analyzes the distribution P s (i.e. the CDF) as function of the number of obtained Peer-IDs. VI. ANALYSIS OF PEER-ID ASSIGNMENT MECHANISMS This section analyses the resistance offered by the ID assignment methods used so far against the Starvation Attack. The simplest method allows an user to select its own Peer-ID. This makes the Starvation Attack trivial. The attacker only has to pick R Peer-IDs in the Attack Zone and the Full Starvation Attack would be successful. Then, if we focus on those mechanisms providing an identifier of random nature the Starvation Attack becomes a Sybil Attack (with the peculiarities described in Section IV). In the first of these mechanisms the attacker forms the Peer-ID as the hash(ip address) or the hash(ip address port). Then, she can use a constrained number of IDs limited by the number of available IP addresses. If we consider the residential user as a potential attacker, she has one public IP address and 2 6 available ports. This represents a total number of 2 6 (65536) possible IDs. If we look on Tables I and II, this is not enough to attack the current popular p2p systems with millions of users. Hence, this assignment method is secure against the Starvation Attack only if the attacker has access to a quite limited range of IP addresses. However, if we suppose that the attacker has access to a class C IP prefix (this is 2 8 IP addresses and 2 6 ports available for the attack) the total number of possible combinations (2 24 ) are over 6 million. Then, the FSA is viable on out of the 6 cases on Table I and the PSA is viable on all the cases included in Table II. Therefore, this assignment method becomes vulnerable if the attacker can impersonate a high number of IPv4 addresses. Furthermore, this mechanism becomes meaningless if we consider IPv6 where each user has a potential access to 2 64 IP addresses in a typical LAN subnet. In addition, this mechanism can present problems on the presence of Network Address Translator (NATs). Some NATs would not permit the users to identify its own Peer-ID. This introduces high entry barriers to the system. On the other hand, the random Peer-IDs can be assigned by a central entity. In this case, a peer could obtain as many Peer-IDs as it desires. Therefore, the complexity of the attack should be evaluated in terms of time. If the process can be done automatically, the attack is simpler. As an example, if the process is composed by an exchange of a solicitation and a response messages which takes ms, the total time spent in order to perform a FSA by an unique attacker with P s equal to.7 in a system with 6 nodes and replicas per resource is approx. 2, 75 6 s (32 days). This is much more reduced in the case of the PSA. Furthermore, this time can be drastically reduced by paralleling the attack. However, the use of a Central Entity allows the application of Access Control Policies which can make the system harder to attack. On the other hand, this policies also incurs in high entry barriers for the honest users. In addition, the Central Entity is a single point of failure. In summary, all the mechanism used so far are vulnerable to the Starvation Attack. Additionally, those systems which could offer higher level of protection introduce also high entry barriers.
7 7 VII. SUMMARY AND FUTURE WORK The main contribution of this paper is the development of an analytical tool which allows the evaluation of the resistance of the one-dimensional DHT systems against the Starvation Attack. In addition, it is shown that the modeling of the problem by a Geometric Distribution is an incorrect assumption. Furthermore, the proposed model has been used to evaluate the resistance of the Peer-ID assignment mechanisms proposed so far against the Starvation Attack. The paper demonstrates that none of them is useful. As future work we will extend the analysis of the Starvation Attack considering churn situations and verify if the proposed model is also valid under those conditions. Furthermore, we will analyze the Starvation Attack in real DHTs as KAD or Azureus. [6] D. Cerri et al., ID Mapping Attacks in P2P Networks, in Proc. IEEE GLOBECOM 25. REFERENCES [] E.K. Lua, J. Crowcroft, M. Pias, R. Sharma, S. Lim, A survey and comparison of peer-to-peer overlay network schemes, IEEE Communications Surveys & Tutorials, 25, pp [2] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications, in Proc. ACM SIGCOMM, 2. [3] P. Maymounkov and D. Mazieres, Kademlia: A peer-to-peer information system based on the xor metric, IPTPS 2, 22. [4] A.Rowstron and P.Druschel, Pastry: Scalable, distributed object location and routing for largescale peer-to-peer systems, in Proc. IFIP/ACM Middleware, 2. [5] M. Steiner and E.W. Biersack and T. En-Najjary, Actively monitoring peers in KAD, IPTPS [6] J. R. Douceur, The Sybil Attack, in Proc. of the st International Workshop on Peer-to-Peer Systems (IPTPS 2). 22. [7] D. S. Wallach, A survey of peer-to-peer security issues, in LNCS, 23. [8] J. Dinger and H. Hartenstein, Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self- Registration, in Proc. of ARES 6, 26. [9] M. Castro, P. Drushel, A. Ganesh, A. Rowstron and D. Wallach, Secure routing for structured peer-to-peer overlay networks, In Proc. of OSDI 2, 22. [] Haifeng Yu, M. Kaminsky, P. H. Gibbons, and A. Flaxman, SybilGuard: Defending Against Sybil Attacks via Social Networks, In Proceedings of ACM SIGCOMM Computer Communication Review, ACM Press, 26, pp [] G. Danezis, C. Lesniewski-Laas, et al., Sybilresistant DHT routing, In Proceedings of th European Symposium On Research in Computer Security (ESORICS 25), Milan, Italy, 25, pp [2] C. Hota et al. Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing, in Proc. of International Conference on Networking, Architecture, and Storage, 27 [3] A. Cheng, and E. Friedman, Sybilproof reputation mechanisms, In Proceedings of ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, 25, ACM Press, pp [4] N. Borisov, Computational Puzzles as Sybil Defenses. In Proc. of IEEE International Conference on Peer to Peer Computing (P2P 6), 26. [5] L. Liu, M. Srivatsa, Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. in Proc. ACSAC 4, 24.
NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT
NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT 1 Avinash Chaudhari, 2 Pradeep Gamit 1 L.D. College of Engineering, Information Technology, Ahmedabad India 1 Chaudhari.avi4u@gmail.com,
More informationProblems in Reputation based Methods in P2P Networks
WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics
More informationAvailability for DHT-based Overlay Networks with Unidirectional Routing
Availability for DHT-based Overlay Networks with Unidirectional Routing Jan Seedorf 1 and Christian Muus 2 1 NEC Laboratories Europe Kurfuerstenanlage 36, 69115 Heidelberg, Germany jan.seedorf@nw.neclab.eu
More informationDetecting and Recovering from Overlay Routing. Distributed Hash Tables. MS Thesis Defense Keith Needels March 20, 2009
Detecting and Recovering from Overlay Routing Attacks in Peer-to-Peer Distributed Hash Tables MS Thesis Defense Keith Needels March 20, 2009 Thesis Information Committee: Chair: Professor Minseok Kwon
More informationExploiting KAD: Possible Uses and Misuses
Exploiting KAD: Possible Uses and Misuses Moritz Steiner, Ernst W. Biersack, Taoufik En-Najjary Institut Eurecom, Sophia Antipolis, France {steiner, erbi, ennajjar}@eurecom.fr This article is an editorial
More informationA Directed-multicast Routing Approach with Path Replication in Content Addressable Network
2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,
More informationEvaluation of Sybil Attacks Protection Schemes in KAD
Evaluation of Sybil Attacks Protection Schemes in KAD Thibault Cholez, Isabelle Chrisment, and Olivier Festor MADYNES - INRIA Nancy-Grand Est, France {thibault.cholez,isabelle.chrisment,olivier.festor}@loria.fr
More informationP2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility
P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility Rubén Cuevas, Carmen Guerrero, Ángel Cuevas, María Calderón, Carlos J. Bernardos Departamento de Ingeniería Telemática, Universidad
More informationApplication Layer Multicast For Efficient Peer-to-Peer Applications
Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology
More informationTowards Scalable and Robust Overlay Networks
Towards Scalable and Robust Overlay Networks Baruch Awerbuch Department of Computer Science Johns Hopkins University Baltimore, MD 21218, USA baruch@cs.jhu.edu Christian Scheideler Institute for Computer
More informationFaster Content Access in KAD
Faster Content Access in KAD Moritz Steiner, Damiano Carra, and Ernst W. Biersack Eurécom, Sophia Antipolis, France {steiner carra erbi}@eurecom.fr Abstract Many different Distributed Hash Tables (DHTs)
More informationComparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks
Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit
More informationShould we build Gnutella on a structured overlay? We believe
Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured
More informationPerformance Modelling of Peer-to-Peer Routing
Performance Modelling of Peer-to-Peer Routing Idris A. Rai, Andrew Brampton, Andrew MacQuire and Laurent Mathy Computing Department, Lancaster University {rai,brampton,macquire,laurent}@comp.lancs.ac.uk
More informationSybil defenses via social networks
Sybil defenses via social networks Abhishek University of Oslo, Norway 19/04/2012 1 / 24 Sybil identities Single user pretends many fake/sybil identities i.e., creating multiple accounts observed in real-world
More informationLarge-Scale Monitoring of DHT Traffic
Large-Scale Monitoring of DHT Traffic Ghulam Memon, Reza Rejaie University of Oregon {gmemon, reza}@cs.uoregon.edu Yang Guo Corporate Research, Thomson Yang.Guo@thomson.net Daniel Stutzbach Stutzbach Enterprises
More informationDHT Routing Using Social Links
DHT Routing Using Social Links Sergio Marti, Prasanna Ganesan and Hector Garcia-Molina Stanford University {smarti, prasanna, hector}@cs.stanford.edu Abstract The equality and anonymity of peer-to-peer
More informationR/Kademlia: Recursive and Topology-aware Overlay Routing
R/Kademlia: Recursive and Topology-aware Overlay Routing Bernhard Heep ATNAC 2010, Auckland, New Zealand, 11/02/2010, KIT University of the State of Baden-Wuerttemberg and National Research Center of the
More informationSecure Routing in Peer-to-Peer Distributed Hash Tables
Secure Routing in Peer-to-Peer Distributed Hash Tables Keith Needels Department of Computer Science Rochester Institute of Technology Rochester, NY 14623 keithn@csh.rit.edu Minseok Kwon Department of Computer
More informationAthens University of Economics and Business. Dept. of Informatics
Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service
More informationSurvey of DHT Evaluation Methods
Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the
More informationEvaluation of Sybil Attacks Protection Schemes in KAD
Author manuscript, published in "AIMS 2009: 3rd International Conference on Autonomous Infrastructure, Management and Security 5637 (2009) 70-82" DOI : 10.1007/978-3-642-02627-0_6 Evaluation of Sybil Attacks
More informationEffects of Churn on Structured P2P Overlay Networks
International Conference on Automation, Control, Engineering and Computer Science (ACECS'14) Proceedings - Copyright IPCO-214, pp.164-17 ISSN 2356-568 Effects of Churn on Structured P2P Overlay Networks
More informationA P2P File Sharing Technique by Indexed-Priority Metric
A P2P File Sharing Technique by Indexed-Priority Metric Toshinori Takabatake and Yoshikazu Komano Abstract Recently, the improvements in processing performance of a computer and in high speed communication
More informationS/Kademlia: A Practicable Approach Towards Secure Key Based Routing
S/Kademlia: A Practicable Approach Towards Secure Key Based Routing Ingmar Baumgart, Sebastian Mies P2P NVE 2007, Hsinchu, Taiwan, Institute of Telematics Prof. Dr. M. Zitterbart Motivation Kademlia is
More informationDISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS
DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationA Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol
A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,
More informationA Search Theoretical Approach to P2P Networks: Analysis of Learning
A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.
More informationPERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.5, September 27 PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS Farida Chowdhury
More informationTime-related replication for p2p storage system
Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,
More informationA Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables
A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,
More informationPurpose and security analysis of RASTER
Purpose and security analysis of RASTER Oliver Gasser Advisor: Christian Grothoff Seminar Future Internet SS2010 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität
More informationAn Empirical Study of Data Redundancy for High Availability in Large Overlay Networks
An Empirical Study of Data Redundancy for High Availability in Large Overlay Networks Giovanni Chiola Dipartimento di Informatica e Scienze dell Informazione (DISI) Università di Genova, 35 via Dodecaneso,
More informationSPROUT: P2P Routing with Social Networks
SPROUT: P2P Routing with Social Networks Sergio Marti, Prasanna Ganesan and Hector Garcia-Molina Stanford University {smarti, prasannag, hector}@cs.stanford.edu March 1, 24 Abstract In this paper, we investigate
More informationThe Effect of Replica Placement on Routing Robustness in Distributed Hash Tables
The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables Cyrus Harvesf and Douglas M. Blough Georgia Institute of Technology School of Electrical and Computer Engineering Atlanta,
More informationEarly Measurements of a Cluster-based Architecture for P2P Systems
Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella
More informationDistriubted Hash Tables and Scalable Content Adressable Network (CAN)
Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................
More informationSecure Distributed Storage in Peer-to-peer networks
Secure Distributed Storage in Peer-to-peer networks Øyvind Hanssen 07.02.2007 Motivation Mobile and ubiquitous computing Persistent information in untrusted networks Sharing of storage and information
More informationHyCube: A distributed hash table based on a hierarchical hypercube geometry
HyCube: A distributed hash table based on a hierarchical hypercube geometry Artur Olszak Institute of Computer Science, Warsaw University of Technology A.Olszak@ii.pw.edu.pl Abstract. This paper presents
More informationMULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK
116 MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK Herry Imanta Sitepu, Carmadi Machbub, Armein Z. R. Langi, Suhono Harso Supangkat School of Electrical Engineering and Informatics, Institut Teknologi
More informationReal-World Sybil Attacks in BitTorrent Mainline DHT
Real-World Attacks in BitTorrent Mainline DHT Liang Wang Dept. of Computer Science University of Helsinki Helsinki, Finland Jussi Kangasharju Helsinki Institute for Information Technology University of
More informationPoisoning the Kad Network
Poisoning the Kad Network Thomas Locher 1,DavidMysicka 1,StefanSchmid 2, and Roger Wattenhofer 1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz.ch,
More informationProviding Administrative Control and Autonomy in Structured Peer-to-Peer Overlays
Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Alan Mislove Peter Druschel Rice University, Houston, TX, USA Abstract Structured peer-to-peer (p2p) overlay networks provide
More informationReDS: A Framework for Reputation-Enhanced DHTs
ReDS: A Framework for Reputation-Enhanced DHTs Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew Wright Abstract Distributed Hash Tables (DHTs), such as Chord and Kademlia,
More informationfp2p-hn: A P2P-based Route Optimization Solution for Mobile IP and NEMO clients.
1 fp2p-hn: A P2P-based Route Optimization Solution for Mobile IP and NEMO clients. Albert Cabellos-Aparicio 1, Rubén Cuevas 2, Jordi Domingo-Pascual 1, Ángel Cuevas 2, Carmen Guerrero 2 Abstract Wireless
More informationDistributed Hash Table
Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ
More informationDefending against Eclipse attacks on overlay networks
Defending against Eclipse attacks on overlay networks Atul Singh 1 Miguel Castro 2 Peter Druschel 1 Antony Rowstron 2 1 Rice University, Houston, TX, USA. 2 Microsoft Research, Cambridge, UK. Abstract
More informationSimulation of the Impact of Packet Errors on the Kademlia Peer-to-Peer Routing
T. Ginzler M. Amanowicz tobias.ginzler@fkie.fraunhofer.de, marek.amanowicz@wat.edu.pl ABSTRACT Tactical radio communication is crucial for command and control. The progress in C2 software demands higher
More informationImplementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables
Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables Nuno Lopes and Carlos Baquero CCTC-Department of Informatics University of Minho Braga, Portugal Abstract. Range
More informationBuilding a low-latency, proximity-aware DHT-based P2P network
Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan
More informationThe Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla
The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -
More information08 Distributed Hash Tables
08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per
More informationSecurity Considerations for Peer-to-Peer Distributed Hash Tables
Security Considerations for Peer-to-Peer Distributed Hash Tables Emil Sit and Robert Morris Laboratory for Computer Science, MIT 200 Technology Square, Cambridge, MA 02139, USA {sit,rtm}@lcs.mit.edu Abstract.
More informationP2P: Distributed Hash Tables
P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)
More informationStructured Overlays:
Structured Overlays: Attacks, Defenses, and all things Proximity April 27th, 2006 Wyman Park 4 th Floor Conference Room Presentation by: Jay Zarfoss Our roadmap General overview of Overlays / DHTs Chord
More informationA Framework for Peer-To-Peer Lookup Services based on k-ary search
A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology
More informationDetecting and Recovering from Overlay Routing Attacks in Peer-to-Peer Distributed Hash Tables
Detecting and Recovering from Overlay Routing Attacks in Peer-to-Peer Distributed Hash Tables A thesis for the degree of Master of Science in Computer Science Keith Needels keithn@csh.rit.edu Department
More informationPChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity
546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and
More informationFault Resilience of Structured P2P Systems
Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2
More informationDesign of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem
Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois
More informationAn Efficient and Secure Peer-to-Peer Overlay Network
An Efficient and Secure Peer-to-Peer Overlay Network Honghao Wang, Yingwu Zhu and Yiming Hu Department of Electrical & Computer Engineering and Computer Science University of Cincinnati {wanghong, zhuy,
More informationEffect of Links on DHT Routing Algorithms 1
Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn
More informationRouting Table Construction Method Solely Based on Query Flows for Structured Overlays
Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Yasuhiro Ando, Hiroya Nagao, Takehiro Miyao and Kazuyuki Shudo Tokyo Institute of Technology Abstract In structured
More informationDetecting and Excluding Misbehaving Nodes in a P2P Network
Detecting and Excluding Misbehaving Nodes in a P2P Network François Lesueur Ludovic Mé Valérie Viet Triem Tong SUPELEC, SSIR Group (EA 4039) Avenue de la Boulaie - CS 47601-35576 Cesson-Sévigné cedex -
More informationDRing: A Layered Scheme for Range Queries over DHTs
DRing: A Layered Scheme for Range Queries over DHTs Nicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens and Xavier Bonnaire Université Pierre et Marie Curie, CNRS INRIA - REGAL, Paris,
More informationDistributed hash table - Wikipedia, the free encyclopedia
Page 1 sur 6 Distributed hash table From Wikipedia, the free encyclopedia Distributed hash tables (DHTs) are a class of decentralized distributed systems that provide a lookup service similar to a hash
More informationAn Agenda for Robust Peer-to-Peer Storage
An Agenda for Robust Peer-to-Peer Storage Rodrigo Rodrigues Massachusetts Institute of Technology rodrigo@lcs.mit.edu Abstract Robust, large-scale storage is one of the main applications of DHTs and a
More informationArchitectures for Distributed Systems
Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced
More informationRouting Protocols of Distributed Hash Table Based Peer to Peer Networks
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. II (Jan. 2014), PP 70-74 Routing Protocols of Distributed Hash Table Based Peer to Peer Networks
More informationEfficient DHT attack mitigation through peers ID distribution
Efficient DHT attack mitigation through peers ID distribution Thibault Cholez, Isabelle Chrisment and Olivier Festor {thibault.cholez, isabelle.chrisment, olivier.festor}@loria.fr LORIA - Campus Scientifique
More informationA Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery
A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca
More informationImplications of Neighbor Selection on DHT Overlays
Implications of Neighbor Selection on DHT Overlays Yingwu Zhu Department of CSSE, Seattle University zhuy@seattleu.edu Xiaoyu Yang Department of ECECS, University of Cincinnati yangxu@ececs.uc.edu Abstract
More informationLayer Optimization for DHT-based Peer-to-Peer Network
Layer Optimization for DHT-based Peer-to-Peer Network Jun Li *, Cuilian Li, Zhaoxi Fang Department of Telecommunication Zhejiang Wanli University Ningbo, China xxllj, licl@zwu.edu.cn, zhaoxifang@gmail.com
More informationExperimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System
Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li Tsinghua National Laboratory for Information Science and
More informationEnabling Dynamic Querying over Distributed Hash Tables
Enabling Dynamic Querying over Distributed Hash Tables Domenico Talia a,b, Paolo Trunfio,a a DEIS, University of Calabria, Via P. Bucci C, 736 Rende (CS), Italy b ICAR-CNR, Via P. Bucci C, 736 Rende (CS),
More informationAvoiding Eclipse attacks on Kad/Kademlia: an identity based approach
Avoiding Eclipse attacks on Kad/Kademlia: an identity based approach Leonardo Maccari, Matteo Rosi, Romano Fantacci, Luigi Chisci Luca Maria Aiello, Marco Milanesio Department of Electronics and Telecommunications
More informationSurvive Under High Churn in Structured P2P Systems: Evaluation and Strategy
Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Zhiyu Liu, Ruifeng Yuan, Zhenhua Li, Hongxing Li, and Guihai Chen State Key Laboratory of Novel Software Technology, Nanjing
More informationUC Berkeley UC Berkeley Previously Published Works
UC Berkeley UC Berkeley Previously Published Works Title Impact of neighbor selection on performance and resilience of structured P2P networks Permalink https://escholarship.org/uc/item/9tq2wn2 Authors
More informationKademlia: A P2P Informa2on System Based on the XOR Metric
Kademlia: A P2P Informa2on System Based on the XOR Metric Today! By Petar Mayamounkov and David Mazières, presented at IPTPS 22 Next! Paper presentation and discussion Image from http://www.vs.inf.ethz.ch/about/zeit.jpg
More informationipersea : The Improved Persea with Sybil Detection Mechanism
ipersea : The Improved Persea with Sybil Detection Mechanism Mahdi Nasrullah Al-Ameen and Matthew Wright Dartment of Computer Science and Engineering The University of Texas at Arlington Arlington, TX,
More informationOverlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q
Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs
More informationProactive Caching for Better than Single-Hop Lookup Performance
Proactive Caching for Better than Single-Hop Lookup Performance Venugopalan Ramasubramanian and Emin Gün Sirer Cornell University, Ithaca NY 4853 ramasv, egs @cs.cornell.edu Abstract High lookup latencies
More informationData Indexing and Querying in DHT Peer-to-Peer Networks
Institut EURECOM Research Report N o 73 RR-03-073 Data Indexing and Querying in DHT Peer-to-Peer Networks P.A. Felber, E.W. Biersack, L. Garcés-Erice, K.W. Ross, G. Urvoy-Keller January 15, 2003 2 Data
More informationUnderstanding Chord Performance
CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system
More informationMonitoring and Controlling Content Access in KAD
Monitoring and Controlling Content Access in KAD Thibault Cholez, Isabelle Chrisment, Olivier Festor To cite this version: Thibault Cholez, Isabelle Chrisment, Olivier Festor. Monitoring and Controlling
More information12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics
// Topics Peer to Peer Systems Introduction Client-server vs peer to peer Peer-to-peer networks Routing Overlays Structured vs unstructured Example PP Systems Skype login server Peer-to-peer - definitions
More informationTinyTorrent: Implementing a Kademlia Based DHT for File Sharing
1 TinyTorrent: Implementing a Kademlia Based DHT for File Sharing A CS244B Project Report By Sierra Kaplan-Nelson, Jestin Ma, Jake Rachleff {sierrakn, jestinm, jakerach}@cs.stanford.edu Abstract We implemented
More informationChapter 10: Peer-to-Peer Systems
Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Introduction To enable the sharing of data and resources
More informationMotivation. The Impact of DHT Routing Geometry on Resilience and Proximity. Different components of analysis. Approach:Component-based analysis
The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Karthik Lakshminarayanan at P2P Systems class (Slides liberally borrowed from Krishna s SIGCOMM talk) Krishna Gummadi, Ramakrishna
More informationThe Impact of DHT Routing Geometry on Resilience and Proximity. Acknowledgement. Motivation
The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Noorullah Moghul Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion Stoica Acknowledgement
More informationVeracity: Practical Secure Network Coordinates via Vote-Based Agreements
Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania USENIX Technical June 18th, 2009 1 Network Coordinate Systems
More informationAggregation of a Term Vocabulary for Peer-to-Peer Information Retrieval: a DHT Stress Test
Aggregation of a Term Vocabulary for Peer-to-Peer Information Retrieval: a DHT Stress Test Fabius Klemm and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne
More informationScalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou
Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization
More informationImproving Lookup Performance over a Widely-Deployed DHT
Improving Lookup Performance over a Widely-Deployed DHT Daniel Stutzbach, Reza Rejaie Department of Computer & Information Science University of Oregon {agthorr,reza}@cs.uoregon.edu Abstract During recent
More informationPeer Clustering and Firework Query Model
Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk
More informationDATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems
LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable
More informationA Super-Peer Based Lookup in Structured Peer-to-Peer Systems
A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University
More informationDistributed Hash Tables
Distributed Hash Tables Chord Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Chord 1/29 Outline Overview 1 Overview 2 3 Smruti R. Sarangi
More informationSybil-resistant DHT routing
Sybil-resistant DHT routing George Danezis 1, Chris Lesniewski-Laas 2, M. Frans Kaashoek 2, and Ross Anderson 1 1 University of Cambridge, Computer Laboratory, 15 J J Thomson Avenue, Cambridge CB3 0FD,
More information