[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1030083.1030099acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Pong-cache poisoning in GUESS

Published: 25 October 2004 Publication History

Abstract

This paper studies the problem of resource discovery in unstructured peer-to-peer (P2P) systems. We propose simple policies that make the discovery of resources resilient to coordinated attacks by malicious nodes. We focus on a novel P2P protocol called GUESS [8] that uses a pong cache, a set of currently known nodes, to discover new ones. We define a simple, abstract model of a GUESS network,and We describe how to limit pong cache poisoning, a condition in which the ids of malicious nodes appear in the pong caches of good nodes. We run simulations based on our model, and evaluate different options for the key decisions that nodes need to make.We propose an ID smearing algorithm (IDSA) and a dynamic network partitioning (DNP) scheme that can be used together to reduce the impact of malicious nodes. We also propose adding an introduction protocol (IP) as a basic mechanism to GUESS to ensure liveness. We suggest using a most-recently-used (MRU) cache replacement policy to slow down the rate of poisoning. Finally, we determine the marginal utility of using a malicious node detector (MND) to further limit poisoning, and the level of accuracy required of the detector.

References

[1]
H. Garcia-Molina B. Yang, P. Vinograd. Evaluating guess and non-forwarding peer-to-peer search. In 24th International Conference on Distributed Computing Systems (ICDCS 2004), Tokyo, Japan, 2004.]]
[2]
P. Biddle, P. England, M. Peinado, and B. Willman. The darknet and the future of content distribution. Digital Rights Management Workshop 2002, http://crypto.stanford.edu/DRM2002/ darknet5.doc.]]
[3]
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Security for peer-to-peer routing overlays. In Fifth Symposium on Operating Systems Design and Implementation (OSDI '02) (Boston, Massachusetts), 2002.]]
[4]
I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Workshop on Design Issues in Anonymity and Unobservability, pages 46--66, 2000.]]
[5]
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proc. of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, November 2002.]]
[6]
N. Daswani and H. Garcia-Molina. Pong-cache poisoning in guess (extended version). http://dbpubs.stanford.edu/pub/2003-51.]]
[7]
N. Daswani and H. Garcia-Molina. Query-flood dos attacks in gnutella networks. In Proc. of the 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002.]]
[8]
S. Daswani and A. Fisk. Guess protocol specification. http://groups.yahoo.com/group/the gdf/files/ Proposals/ GUESS/ guess 01.txt.]]
[9]
J. Douceur. The sybil attack. IPTPS, 2002.]]
[10]
Gnutella development forum (gdf). http://groups.yahoo.com/ group/ the gdf/.]]
[11]
S. Kamvar, M. Schlosser, and H. Garcia-Molina. Eigenrep: Reputation management in p2p systems. In Proceedings of the 12th International WorldWide Web Conference, 2003.]]
[12]
A. Keromytis, V. Misra, and D. Rubenstein. Sos: Secure overlay services. In Proceedings of ACM SIGCOMM'02, Pittsburgh, PA, August 2002.]]
[13]
C. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker. Search and replication in unstructured peer-to-peer networks. In Proceedings of the 16th International Conference on Supercomputing, pages 84--95. ACM Press, 2002.]]
[14]
B. Yang. N. Daswani, H. Garcia-Molina. Open problems in data-sharing peer-to-peer systems. In International Conference on Database Theory. Siena, Italy., 2003.]]
[15]
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In Proceedings of ACM SIGCOMM, San Diego, CA, August 2001.]]
[16]
M. Reiter and A. Rubin. Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security, 1(1):66--92, 1998.]]
[17]
E. Sit and R. Morris. Security considerations for peer-to-peer distributed hash tables. In IPTPS, Cambridge, MA, USA, March 2002.]]
[18]
I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In ACM SIGCOMM, pages 149--160, San Diego, CA, August 2001.]]
[19]
D. Tsoumakos and N. Roussopoulos. Adaptive probabilistic search (aps) for peer-to-peer networks. http://citeseer.nj.nec.com/568292.html.]]

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
October 2004
376 pages
ISBN:1581139616
DOI:10.1145/1030083
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 October 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. denial-of-service
  2. peer-to-peer
  3. security

Qualifiers

  • Article

Conference

CCS04
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Resource discovery mechanisms in pure unstructured peer-to-peer systems: a comprehensive surveyPeer-to-Peer Networking and Applications10.1007/s12083-020-01027-9Online publication date: 26-Nov-2020
  • (2009)Autonomic Peer-to-Peer Systems: Incentive and Security IssuesAutonomic Computing and Networking10.1007/978-0-387-89828-5_9(205-236)Online publication date: 30-Apr-2009
  • (2008)ISRLInternational Journal of Parallel, Emergent and Distributed Systems10.1080/1744576070144217623:1(17-44)Online publication date: 1-Feb-2008
  • (2007)A hybrid searching scheme in unstructured P2P networksInternational Journal of Parallel, Emergent and Distributed Systems10.1080/1744576060102941222:1(15-38)Online publication date: 1-Jan-2007
  • (2006)Taxonomy of trustComputer Networks: The International Journal of Computer and Telecommunications Networking10.5555/1139711.164867650:4(472-484)Online publication date: 15-Mar-2006
  • (2006)A Protocol for Secure Content Distribution in Pure P2P NetworksProceedings of the 17th International Conference on Database and Expert Systems Applications10.1109/DEXA.2006.17(712-716)Online publication date: 4-Sep-2006
  • (2006)Taxonomy of trust: Categorizing P2P reputation systemsComputer Networks10.1016/j.comnet.2005.07.01150:4(472-484)Online publication date: Mar-2006
  • (2006)Breaking the collusion detection mechanism of morphmixProceedings of the 6th international conference on Privacy Enhancing Technologies10.1007/11957454_21(368-383)Online publication date: 28-Jun-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media