Exploiting Internet Delay Space Properties for Sybil Attack Mitigation

Recent studies have discovered that the Internet delay spac e has many interesting properties such as triangle inequality vi olations (TIV), clustering structures, and constrained growth. Und erstanding these properties has so far benefited the design of networ k m dels and network-performance-aware systems. In this paper, we consider an interesting, previously unexplored connection be twe n Internet delay space properties and network locations. We sho w that this connection can be exploited to mitigate the Sybil attac k problem in peer-to-peer systems.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Andreas Terzis,et al.  A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.

[3]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[4]  CastroMiguel,et al.  Secure routing for structured peer-to-peer overlay networks , 2002 .

[5]  Zhuoqing Morley Mao,et al.  Accurate Real-time Identification of IP Prefix Hijacking , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[6]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[7]  Farnam Jahanian,et al.  The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.

[8]  Zhi-Li Zhang,et al.  On suitability of Euclidean embedding of internet hosts , 2006, SIGMETRICS '06/Performance '06.

[9]  Peter Druschel,et al.  Measurement-based analysis, modeling, and synthesis of the internet delay space , 2010, TNET.

[10]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[11]  Paul Francis,et al.  A study of prefix hijacking and interception in the internet , 2007, SIGCOMM 2007.

[12]  Dave Levin,et al.  PeerWise Discovery and Negotiation of Faster Paths , 2007, HotNets.

[13]  Eng Keong Lua,et al.  Embeddable Overlay Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.

[14]  Jon Postel,et al.  Internet Control Message Protocol , 1981, RFC.

[15]  Alice Cheng,et al.  Sybilproof reputation mechanisms , 2005, P2PECON '05.

[16]  Marcel Dischinger,et al.  Characterizing residential broadband networks , 2007, IMC '07.

[17]  Dan Pei,et al.  A light-weight distributed scheme for detecting ip prefix hijacks in real-time , 2007, SIGCOMM 2007.

[18]  Robert Tappan Morris,et al.  Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.

[19]  H. Rowaihy,et al.  Limiting Sybil Attacks in Structured Peer-to-Peer Networks , 2005 .

[20]  Bo Zhang,et al.  Measurement-Based Analysis, Modeling, and Synthesis of the Internet Delay Space , 2006, IEEE/ACM Transactions on Networking.

[21]  Bo Zhang,et al.  Towards network triangle inequality violation aware distributed systems , 2007, IMC '07.

[22]  Hui Zhang,et al.  Predicting Internet network distance with coordinates-based approaches , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[23]  Rida A. Bazzi,et al.  On the establishment of distinct identities in overlay networks , 2005, PODC '05.

[24]  Robert Tappan Morris,et al.  Vivaldi: a decentralized network coordinate system , 2004, SIGCOMM '04.