资源描述:
《peer pressure distributed recovery from attacks in peer-to-peer systems》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、PeerPressure:DistributedRecoveryfromAttacksinPeer-to-PeerSystemsPedramKeyaniBrianLarsonMuthukumarSenthilComputerScienceDepartmentStanfordUniversityStanford,CA94305{pkeyani,balarson,msenthil}@stanford.eduKeywords.Peer-to-peersystems,overlaynetworks,scale-freenetworks,faultrecovery
2、,maliciousattackAbstract.Peer-to-peersystemssuchasGnutellaareresilienttofailuresatasinglepointinthenetworkbecauseoftheirdecentralizednature.Howeveranattackresultingintheremovalofasmallpercentageofhighlyconnectednodescouldcripplesuchsystems.Webelievethatdistributedattackrecoveryis
3、notsimplyareactiveprocessbutrequiresproactivemeasuresbythenodesinthesystem.Weproposeadistributedrecoverymethod,whereclientsproactivelydetectattacksbymonitoringtherateatwhichtheirfirstandsecond-degreeneighborsleavethenetworkandreconfigurethemselvestoformatopologythatismoreresilien
4、ttoattackswhenonehasbeendetected.Thistopologyiscreatedandmaintainedthroughanewtypeofnodediscoverymechanismthatisusedduringnormalnetworkoperations.Therecoverymethodisabletoreconnectthenetworkanddealwithanyongoingattacksonceonehasstarted.1.IntroductionP2Psystemsarebecomingmorepreva
5、lentinourlivesastheInternethasgainedwidespreadacceptance.Clearly,beforewebecomemorereliantonsuchsystems,theymustbeshowntobesecure,andthenextgenerationofP2Papplicationsmustbeabletosurvivemaliciousattackstothenetwork.Currently,P2Psystemsarenotthesubjectofwidespreadattacks,butitisno
6、tdifficulttoenvisionscenarioswhereattackscouldoccur.Asanexample,itwouldnotbeoutoflineforamajorrecordlabeltoattackGnutellabecauseoneoftheirsongsbecomesfreelyavailable.Gnutellaisoneofthemostwidelyusedpeer-to-peer(P2P)protocolsforfilesharingontheInternet.Itisasimpleprotocolforcommun
7、icationbetweenpeers(servantsinGnutella)toformanoverlaynetworkontopoftheInternettopology.Thisprotocoldoesnotspecifyarecoverymechanism,onlyaformatforclientstocommunicate[7,9].ThecurrenttopologyofGnutellaadherestoapowerlawdistributioninwhichmostnodeshavefewconnections,whileasmallfra
8、ctionofthenodeshavemanyconnectionsandhol