Induced Churn as Shelter from Routing-Table Poisoning
نویسندگان
چکیده
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving millions of user-managed machines on the Internet. In this paper we address routing-table poisoning attacks against structured overlays, in which adversaries attempt to intercept traffic and control the system by convincing other nodes to use compromised nodes as their overlay network neighbors. In keeping with the fully-decentralized goals of structured overlay design, we propose a defense mechanism that makes minimal use of centralized infrastructure. Our approach, induced churn, utilizes periodic routing-table resets, unpredictable identifier changes, and a rate limit on routing-table updates. Induced churn leaves adversaries at the mercy of chance: they have little opportunity to strategize their positions in the overlay, and cannot entrench themselves in any position that they do acquire. We implement induced churn in Maelstrom, an extension to the broadly used Bamboo distributed hash table. Our Maelstrom experiments over a simulated network demonstrate robust routing with very modest costs in bandwidth and latency, at levels of adversarial activity where unprotected overlays are rendered almost completely useless1.
منابع مشابه
Maelstrom: Churn as Shelter
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving millions of user-managed machines on the Internet. In this paper we address routing-table poisoning attacks against structured overlays, in which adversaries attempt to intercept traffic and control the system by convinci...
متن کاملA Hybrid Peer-to-Peer Lookup Service Algorithm on Distributed Hash Table
An application using a distributed hash table (DHT) with N nodes must choose a DHT protocol from the spectrum between O(1) lookup protocols and O(logN). However, various applications under different network churns require that an idea DHT would be adaptive in according with the churn rates. ROAD (routing on active and demand), a new lookup algorithm, adjusts itself to provide the best performan...
متن کاملAnalytical Study on Improving Lookup Performance of Distributed Hash Table Systems under Churn
Distributed hash table (DHT) systems can provide infrastructure supports for a wide variety of Internet-scale applications. However, the phenomenon of system churn (i.e., system dynamics) degrades the lookup performance of DHT systems and adversely impact the performance of applications built on top of them. To date, a number of approaches have been proposed to handle the churn from both the sy...
متن کاملAn analytical study on optimizing the lookup performance of distributed hash table systems under churn
The phenomenon of system churn degrades the lookup performance of distributed hash table (DHT) systems greatly. To handle the churn, a number of approaches have been proposed to date. However, there is a lack of theoretical analysis to direct how to make design choices under different churn rates and how to configure their parameters optimally. In this paper, we analytically study three importa...
متن کاملRouting tradeoffs in dynamic peer-to-peer networks
Distributed Hash Tables (DHTs) are useful tools for building large scale distributed systems. DHTs provide a hash-table-like interface to applications by routing a key to its responsible node among the current set of participating nodes. DHT deployments are characterized by churn, a continuous process of nodes joining and leaving the network. Lookup latency is important to applications that use...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006