2011
DOI: 10.1007/978-3-642-20798-3_3
|View full text |Cite
|
Sign up to set email alerts
|

Defending against Sybil Nodes in BitTorrent

Abstract: Abstract. BitTorrent and its derivatives contribute a major portion of Internet traffic due to their simple and scalable operation. However, the lack of security mechanisms makes them vulnerable to attacks such as file piece pollution, connection slot consumption, and bandwidth exhaustion. These effects are made worse by the ability of attackers to manufacture new identities, or Sybil nodes, at will. The net effect of Sybil nodes and weak security leads to inefficient BitTorrent operation, or collapse. In this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…In traditional P2P systems, the Sybil attack imposes various threats and subverts the reputation of a P2P network. For example, the attacker uses Sybil identities to pollute the BitTorrent distributed hash table (DHT) routing to trigger delays, connection slot consumption, invalid file contents downloads, and bandwidth exhaustion [19]. Similarly, the attacker can use the clone node attack to target static wireless sensor networks (WSNs) [124] by taking control of node n and replicating it throughout the network.…”
Section: ) Sybil Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…In traditional P2P systems, the Sybil attack imposes various threats and subverts the reputation of a P2P network. For example, the attacker uses Sybil identities to pollute the BitTorrent distributed hash table (DHT) routing to trigger delays, connection slot consumption, invalid file contents downloads, and bandwidth exhaustion [19]. Similarly, the attacker can use the clone node attack to target static wireless sensor networks (WSNs) [124] by taking control of node n and replicating it throughout the network.…”
Section: ) Sybil Attackmentioning
confidence: 99%
“…Sybil attacks are hard to prevent [7], however, there exist preventive measures to increase protection against Sybil attack. The authors [19] present a reputation-based scheme 'GOLF' to identify Sybil nodes on BitTorrent DHT based on patterns in IP addresses. Numan et al [124] perform a litera-This work is licensed under a Creative Commons Attribution 4.0 License.…”
Section: ) Sybil Attackmentioning
confidence: 99%
“…The aforementioned "rotation" algorithm may also be applied to tackle Eclipse attacks (LEHMANN et al, 2012). So and Reeves (SO;REEVES, 2011) propose a solution using locality filters to restrict the neighborhood of a user and mitigate the effect of massive attacks. In another work, Singh et al (SINGH et al, 2006) design a solution to detect colluding users by monitoring their list of neighbors.…”
Section: General Massive Attacksmentioning
confidence: 99%
“…This attack consists on malicious users connecting to a victim and uploading junk data (DHUNGEL et al, 2008;YANG et al, 2008). Solutions based on hash functions were proposed to verify the integrity of pieces (HARIDASAN; RENESSE, 2006;MEIER;WATTENHOFER, 2008;SO;REEVES, 2011). In another work, Lehmann et al (LEHMANN et al, 2012) propose an additional reputation mechanism to isolate users who send corrupt pieces.…”
Section: General Massive Attacksmentioning
confidence: 99%