CORC  > 北京大学  > 计算机科学技术研究所
Making eclipse attacks computationally infeasible in large-scale DHTs
Zhang, Ren ; Zhang, Jianyu ; Chen, Yu ; Qin, Nanhao ; Liu, Bingshuang ; Zhang, Yuan
2011
英文摘要The security aspect of Distributed Hash Tables (DHT-s), the principal model for structured P2P networks, has received considerable attention from research community, and the eclipse attack is one of the most severe threats targeting DHTs. Most of currently effective defense mechanisms suffer from significant communication cost. In this paper we present a novel approach to address eclipse attacks - making such attacks computationally infeasible. The backbone of our approach is a scheme for generating node IDs, which requires a user to solve a computational puzzle generated by her network parameters together with time-related information, in order for him to obtain a valid ID. Such procedure normally should be completed within a couple seconds of CPU time, and an ID can be easily verified for its validity. However, carrying out an eclipse attack on a specific key demands massive computing resources. We have evaluated our method by analyzing the cost of an attacker, using real-world data from BitTorrent, and the result is that it takes thousands of processors running day and night to find sufficient number of IDs. We also have simulated the computing cost of both benign users and attackers, and the outcome also supports the above claim. Unlike most existing defense mechanisms, for our method the induced communication cost and churn is negligible, and no centralized service is required. ? 2011 IEEE.; EI; 0
语种英语
DOI标识10.1109/PCCC.2011.6108091
内容类型其他
源URL[http://ir.pku.edu.cn/handle/20.500.11897/321453]  
专题计算机科学技术研究所
推荐引用方式
GB/T 7714
Zhang, Ren,Zhang, Jianyu,Chen, Yu,et al. Making eclipse attacks computationally infeasible in large-scale DHTs. 2011-01-01.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace