Detecting and recovering from overlay routing attacks in peer-to-peer distributed hash tables

Show full item record

Title: Detecting and recovering from overlay routing attacks in peer-to-peer distributed hash tables
Author: Needels, Keith
Abstract: Distributed hash tables (DHTs) provide efficient and scalable lookup mechanisms for locating data in peer-to-peer (P2P) networks. A number of issues, however, prevent DHT based P2P networks from being widely deployed. One of these issues is security. DHT protocols rely on the users of the system to cooperate for lookup requests to successfully reach the correct destination. Users who fail to run the protocol correctly can severely limit the functionality of these systems. The fully distributed nature of DHTs compounds these security issues, as any security mechanism must be implemented in a noncentralized fashion for the system to remain truly P2P. This thesis examines the security issues facing DHT protocols, and we propose an extension to one such protocol (called Chord) to mitigate the effects of attacks on the underlying lookup message routing mechanism when a minority of nodes in the system are malicious. Our modifications require no trust to exist between nodes in the network except during the joining process. Instead, each node makes use of locally known information about the network to evaluate hops encountered during the lookup routing process for validity. Hops that are determined to be invalid are avoided. These modifications to the Chord protocol have been implemented in a simulator and then evaluated in the presence of malicious nodes. We present the results of this evaluation and compare them to the results obtained when running the unmodified Chord protocol.
Record URI: http://hdl.handle.net/1850/8800
Date: 2008

Files in this item

Files Size Format View Description
BigSquareRoot.java 5.554Kb Unknown View/Open Java file
ChordController.java 19.11Kb Unknown View/Open Java file
ChordGUIUtil.java 20.41Kb Unknown View/Open Java file
ChordHop.java 1.566Kb Unknown View/Open Java file
ChordNode.java 18.11Kb Unknown View/Open Java file
ChordPanel.java 9.787Kb Unknown View/Open Java file
ChordRing.java 9.176Kb Unknown View/Open Java file
ChordUtils.java 4.385Kb Unknown View/Open Java file
ExperimentRunner.java 8.528Kb Unknown View/Open Java file
GlobalRandom.java 610bytes Unknown View/Open Java file
KNeedelsPowerPoint03-2009.pdf 1.346Mb PDF View/Open PowerPoint presentation
KNeedelsThesis02-22-2008.pdf 1.917Mb PDF View/Open Thesis
LookupRecord.java 4.345Kb Unknown View/Open Java file
MColludingChordNode.java 5.549Kb Unknown View/Open Java file
MDropperChordNode.java 1.627Kb Unknown View/Open Java file
MRandomChordNode.java 2.929Kb Unknown View/Open Java file
MSColludingChordNode.java 6.609Kb Unknown View/Open Java file
MSDropperChordNode.java 1.975Kb Unknown View/Open Java file
MSRandomChordNode.java 5.464Kb Unknown View/Open Java file
NodeEventListener.java 2.566Kb Unknown View/Open Java file
OOBLookupSource.java 830bytes Unknown View/Open Java file
SecureChordNode.java 23.96Kb Unknown View/Open Java file
StatKeeper.java 12.50Kb Unknown View/Open Java file
Test3D.java 3.157Kb Unknown View/Open java file
Tests.java 29.57Kb Unknown View/Open Java file

The following license files are associated with this item:

This item appears in the following Collection(s)

Show full item record

Search RIT DML


Advanced Search

Browse