2012 IEEE 31st Symposium on Reliable Distributed Systems 2012
DOI: 10.1109/srds.2012.70
|View full text |Cite
|
Sign up to set email alerts
|

Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks

Abstract: Abstract-Peer-to-Peer (P2P) protocols are susceptible to Localized Eclipse Attacks (LEA), i.e., attacks where a victim peer's environment is masked by malicious peers which are then able to instigate progressively insidious security attacks. To obtain effective placement of malicious peers, LEAs significantly benefit from overlay topology-awareness. Hence, we propose heuristics for Chord, Pastry and Kademlia to assess the protocols' LEA susceptibility based on their topology characteristics and overlay routing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…In [15], the authors discuss the systematic LEA susceptibility from an application independent view and refer to accountable design choices of many structured P2P protocols. The authors conducted an analyical and experimental study to underline the potentially high impact of the attack for the Chord [1], Pastry [2] and Kademlia [3] protocols.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In [15], the authors discuss the systematic LEA susceptibility from an application independent view and refer to accountable design choices of many structured P2P protocols. The authors conducted an analyical and experimental study to underline the potentially high impact of the attack for the Chord [1], Pastry [2] and Kademlia [3] protocols.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast to their convergent counterpart, divergent lookups do not converge towards the destination peer's proximity. This is a key requirement for our mitigation, as the majority of convergent lookups query peers in the destination's proximity (see Section V and [15]) and we assume that the taLEA attacker populates the proximity.…”
Section: A Objectivesmentioning
confidence: 99%
See 3 more Smart Citations