Malicious behaviour in content-addressable peer-to-peer networks

Distributed hash tables (DHTs) promise to manage huge sets of key-value pairs in a peer-to-peer manner. The content-addressable network (CAN) is a prominent variant of DHT. A critical challenge when designing a CAN, or indeed any DHT, is ensuring that all data items are accessible despite the presence of malicious and faulty peers. Such peers may hinder other peers in accessing the keys in various ways. In this paper we identify various types of attacks and propose, where possible, some countermeasures. To counter man-in-the-middle attacks we have developed a dynamically-adjustable multi-path routing algorithm. We evaluate the efficacy of our method both analytically and by simulation. For networks with less than 1% malicious peers we were able to reduce the effect of such attacks by 80%.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Pankaj Jalote,et al.  Fault tolerance in distributed systems , 1994 .

[3]  Douglas S. Reeves,et al.  Preventing denial of service attacks on quality of service , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[4]  Rajmohan Rajaraman,et al.  Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1999, Theory of Computing Systems.

[5]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[6]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[7]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[8]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[9]  Klemens Böhm,et al.  FairNet - How to Counter Free Riding in Peer-to-Peer Data Structures , 2004, CoopIS/DOA/ODBASE.

[10]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[11]  Robert Tappan Morris,et al.  Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.

[12]  Liuba Shrira,et al.  Providing high availability using lazy replication , 1992, TOCS.

[13]  Karl Aberer,et al.  Beyond "Web of trust": enabling P2P e-commerce , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[14]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[15]  Edith Cohen,et al.  Balanced-Replication Algorithms for Distribution Trees , 2004, SIAM J. Comput..

[16]  Partha Dasgupta,et al.  Pride: peer-to-peer reputation infrastructure for decentralized environments , 2004, WWW Alt. '04.