Abstract
Peer-to-Peer (p2p) networks are common in several areas by now. Besides the well-known file sharing platforms, p2p overlays also emerge as a basis for decentralized social networks. In these, the overlay is used as robust storage for several kinds of social information. With gaining relevance, attackers might have an interest in tampering the functionality of the overlay. In this paper we investigate the routing attacks on the distributed hash table Pastry that we use as basis in our p2p social network LifeSocial. We determine through simulations the impact of routing attacks on the performance of the overlay.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Buragohain, C., Agrawal, D., Suri, S.: A Game Theoretic Framework for Incentives in P2P Systems. In: IEEE P2P 2003: Proc of the Int. Conf. on Peer-to-Peer Computing, pp. 48–56 (September 2003)
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev. 36(SI), 299–314 (2002)
Cornelli, F., Damiani, E., di Vimercati, S., Paraboschi, S., Samarati, P.: Choosing reputable servents in a p2p network. In: ACM WWW 2002: Proc. of the Int. Conf. on World Wide Web, pp. 376–386 (2002)
Dabek, F., Zhao, B.Y., Druschel, P., Kubiatowicz, J., Stoica, I.: Towards a Common API for Structured Peer-to-Peer Overlays. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, Springer, Heidelberg (2003)
Daswani, N., Garcia-Molina, H., Yang, B.: Open problems in data-sharing peer-to-peer systems. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol. 2572, pp. 1–15. Springer, Heidelberg (2002)
Rowstron, A.I.T., Druschel, P.: Storage Management and Caching in PAST, A Large-scale, Persistent Peer-to-peer Storage Utility. In: IEEE HotOS 2001: Proc. of the Workshop on Hot Topics in Operating Systems (2001)
Feldman, M., Lai, K., Stoica, I., Chuang, J.: Robust Incentive Techniques for Peer-to-Peer Networks. In: ACM EC 2004: Proc. of the ACM Conf. on Electronic Commerce, pp. 102–111 (2004)
Feldotto, M., Graffi, K.: Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM. In: IEEE HPCS 2013: Proc. of the Int. Conf. on High Performance Computing and Simulation (2013)
Gottron, C., König, A., Steinmetz, R.: A Survey on Security in Mobile Peer-to-Peer Architectures - Overlay-Based vs. Underlay-Based Approaches. Future Internet 2(4), 505–532 (2010)
Graffi, K.: PeerfactSim.KOM: A P2P System Simulator Experiences and Lessons Learned. In: IEEE P2P 2011: Proc. of the Int. Conf. on Peer-to-Peer Computing (2011)
Graffi, K., Groß, C., Mukherjee, P., Kovacevic, A., Steinmetz, R.: LifeSocial.KOM: A P2P-based Platform for Secure Online Social Networks. In: IEEE P2P 2010: Proceedings of the International Conference on Peer-to-Peer Computing (2010)
Graffi, K., Groß, C., Stingl, D., Hartung, D., Kovacevic, A., Steinmetz, R.: LifeSocial.KOM: A Secure and P2P-based Solution for Online Social Networks. In: Proc. of IEEE CCNC (2011)
Graffi, K., Kovacevic, A., Xiao, S., Steinmetz, R.: SkyEye.KOM: An Information Management Over-Overlay for Getting the Oracle View on Structured P2P Systems. In: IEEE ICPADS 2008: Proc. of the Int. Conf. on Parallel and Distributed Systems, IEEE (2008)
Graffi, K., Mogre, P.S., Hollick, M., Steinmetz, R.: Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks. In: IEEE Global Telecommunications Conference (GLOBECOM). IEEE (2007)
Graffi, K., Mukherjee, P., Menges, B., Hartung, D., Kovacevic, A., Steinmetz, R.: Practical Security in P2P-based Social Networks. In: IEEE LCN 2009: Proceedings of the International Conference on Local Computer Networks (2009)
Graffi, K., Podrajanski, S., Mukherjee, P., Kovacevic, A., Steinmetz, R.: A Distributed Platform for Multimedia Communities. In: IEEE ISM 2008: Proceedings of the International Symposium on Multimedia (2008)
Graffi, K., Stingl, D., Rückert, J., others: Monitoring and Management of Structured Peer-to-Peer Systems. In: IEEE P2P 2009: Proceedings of the International Conference on Peer-to-Peer Computing (2009)
Klerx, T., Graffi, K.: Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks. In: IEEE P2P 2013: Proceedings of the International Conference on Peer-to-Peer Computing (2013)
Kovacevic, A., Kaune, S., Heckel, H., Mink, A., Graffi, K., Heckmann, O., Steinmetz, R.: PeerfactSim.KOM - A Simulator for Large-Scale Peer-to-Peer Networks. Tech. Rep. Tr-2006-06, Technische Universität Darmstadt, Germany (2006)
Liang, J., Naoumov, N., Ross, K.W.: The Index Poisoning Attack in P2P File Sharing Systems. In: IEEE INFOCOM 2006: Proceedings of the International Conference on Computer Communications, vol. 6 (2006)
Liebau, N., Pussep, K., Graffi, K., Kaune, S., Jahn, E., Beyer, A., Steinmetz, R.: The Impact Of The P2P Paradigm. In: AMCIS 2007: Proceedings of Americas Conference on Information Systems (2007)
Mogre, P., Graffi, K., Hollick, M., Steinmetz, R.: A Security Framework for Wireless Mesh Networks. Wireless Communications and Mobile Computing Special Issue: Architectures and Protocols for Wireless Mesh, Ad Hoc, and Sensor Networks (2010)
Mogre, P.S., Graffi, K., Hollick, M., Steinmetz, R.: AntSec, WatchAnt, and AntRep: Innovative Security Mechanisms for Wireless Mesh Networks. In: IEEE LCN 2007: Proc. of the Annual Conf. on Local Computer Networks. IEEE (2007)
Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)
Rowstron, A., Kermarrec, A.-M., Druschel, P.: SCRIBE: The Design of a Large-Scale Event Notification Infrastructure. In: Crowcroft, J., Hofmann, M. (eds.) NGC 2001. LNCS, vol. 2233, p. 30. Springer, Heidelberg (2001)
Schoder, D., Fischbach, K.: Peer-to-Peer Prospects. Communications of the ACM 46(2), 27–29 (2003)
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: SIGCOMM 2001: Proceedings of the International Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM (2001)
Villanueva, R., Villamil, M.-D.-P., Arnedo, M.: Secure routing strategies in dht-based systems. In: Globe 2010: Int. Conf. on Data Management in Grid and Peer-to-Peer Systmes (Globe), pp. 62–74 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Eichert, F.A., Monhof, M., Graffi, K. (2014). The Impact of Routing Attacks on Pastry-Based P2P Online Social Networks. In: Lopes, L., et al. Euro-Par 2014: Parallel Processing Workshops. Euro-Par 2014. Lecture Notes in Computer Science, vol 8805. Springer, Cham. https://doi.org/10.1007/978-3-319-14325-5_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-14325-5_30
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14324-8
Online ISBN: 978-3-319-14325-5
eBook Packages: Computer ScienceComputer Science (R0)