Blockchain based Security Framework for P2P Filesharing system

Peer to Peer (P2P) is a dynamic and self-organized technology, popularly used in File sharing applications to achieve better performance and avoids single point of failure. The popularity of this network has attracted many attackers framing different attacks including Sybil attack, Routing Table Insertion attack (RTI) and Free Riding. Many mitigation methods are also proposed to defend or reduce the impact of such attacks. However, most of those approaches are protocol specific. In this work, we propose a Blockchain based security framework for P2P network to address such security issues. which can be tailored to any P2P file-sharing system.

[1]  Alex Borges Vieira,et al.  Pollution and whitewashing attacks in a P2P live streaming system: Analysis and counter-attack , 2013, 2013 IEEE International Conference on Communications (ICC).

[2]  Haiman Lin,et al.  Conducting routing table poisoning attack in DHT networks , 2010, 2010 International Conference on Communications, Circuits and Systems (ICCCAS).

[3]  Dongxu Liu,et al.  GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[4]  Quan Z. Sheng,et al.  P2P Object Tracking in the Internet of Things , 2011, 2011 International Conference on Parallel Processing.

[5]  Atul Singh,et al.  Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[6]  Zhenhai Duan,et al.  A Routing Table Insertion (RTI) Attack on Freenet , 2012, 2012 International Conference on Cyber Security.

[7]  Zhenhai Duan,et al.  Using randomized routing to counter routing table insertion attack on Freenet , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[8]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[9]  Salil S. Kanhere,et al.  BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.

[10]  Giacomo Verticale,et al.  Mitigation of the Eclipse Attack in Chord Overlays , 2014, ANT/SEIT.

[11]  Neeraj Suri,et al.  Mitigating Eclipse attacks in Peer-To-Peer networks , 2014, 2014 IEEE Conference on Communications and Network Security.

[12]  Somanath Tripathy,et al.  CAP: collaborative attack on pastry , 2017, SIN.

[13]  Bogdan V. Ghita,et al.  P2p-based community concept for M2M applications , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).

[14]  H. Rowaihy,et al.  Limiting Sybil Attacks in Structured Peer-to-Peer Networks , 2005 .

[15]  Mebratu Tsehayu Simulating Secure Routing on Chord DHT , 2015 .

[16]  Olivier Festor,et al.  Detection and mitigation of localized attacks in a widely deployed P2P network , 2013, Peer Peer Netw. Appl..

[17]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[18]  Hong Wang,et al.  Securing network coding against pollution attacks in P2P converged ubiquitous networks , 2015, Peer Peer Netw. Appl..

[19]  Wei Wang,et al.  Model the P2P Attack in Computer Networks , 2015 .

[20]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[21]  Zhoujun Li,et al.  Misusing Kademlia Protocol to Perform DDoS Attacks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[22]  Maha Abdelhaq,et al.  Intrusion Detection System to Detect DDoS Attack in Gnutella Hybrid P2P Network , 2013 .