首页> 外文学位 >Defending against Malicious Behaviors in BitTorrent Systems.
【24h】

Defending against Malicious Behaviors in BitTorrent Systems.

机译:防御BitTorrent系统中的恶意行为。

获取原文
获取原文并翻译 | 示例

摘要

Peer-to-Peer (P2P) systems are a promising and cooperative model for the recent Internet applications, such as content (file) sharing, multimedia streaming, and distributed computing. Unlike traditional client server models, P2P systems are based on participants' active cooperation. This cooperative nature is helping to develop various applications, and contributing toward common goals for their participants. P2P systems can accommodate a great number of participants. Despite scalable service, mutual benefits among participants are achievable through cooperation, without dedicated servers in the systems. In particular, BitTorrent systems, a typical P2P approach, maximize peer cooperation with simple and scalable operations. The BitTorrent systems have not only attracted a great number of users through efficient content distribution, but also have contributed a major portion of the Internet traffic by the scalable users.;Unfortunately, the lack of security mechanisms in P2P systems makes compliant peers vulnerable when achieving peer cooperation. From the early stages of P2P systems, there was little concern about security issues guarding against strategic attackers. Most P2P systems including BitTorrent have optimistically expected users to follow the protocol descriptions, and mainly concentrated on various functions of management for applications. As a direct effect of such conditions, selfish users (freeriders) can take advantage of protocol weakness for their own profits violating the regulated standards. Moreover, malicious users can launch various attacks on compliant users, which will eventually lead to system collapse.;In this dissertation, we investigate vulnerabilities of BitTorrent systems, and propose general solutions to address the problems, such as Sybil attacks, Free-riding, and Byzantine attacks (cheating attacks). These attacks are difficult to prevent due to the typical P2P paradigm with no central authority. Therefore, our solutions are fully decentralized against malicious or selfish participants in P2P systems. Each user makes its own decision without an authority's intervention. Although a peer's decision depends on directly connected neighbors, cooperation with them can improve detection through extension of the local view, and prevention against the malicious attacks. Based on peer cooperation, the proposed approaches defeat selfish behaviors, cheating attacks, and malicious attacks triggered by fake identities. They also help participants achieve performance enhancement in spite of the seriously unfavorable conditions in which various attacks are.;First, we propose GOLF with locality filtering against threats from Sybil attackers in file-sharing systems. GOLF scheme fosters peer cooperation to exclude potential attackers, and locality filtering tentatively identifies Sybil attackers based on patterns in IP addresses. Under the proposed scheme, the effect of Sybil attackers sharply decreases. GOLF effectively detects and blocks potential attackers, despite false accusation.;Second, we present CoVoD, a novel cooperative P2P VoD streaming approach, to penalize uncooperative peers. CoVoD adopts a referral based neighbor management scheme. Each peer expands its local view through referral information, and rewards the source of the referral. Such referral incentives can achieve direct cooperation among peers with asymmetric interests. Experimental results demonstrate that CoVoD improves service quality over alternatives, and strongly penalizes freeriders (peers who do not contribute resources).;Third, we address a defense mechanism, called AntiLiar, against cheating attacks in mesh based streaming systems. It provides participants with a practical authentication and informational integrity based on a secure progress log and a verifiable evidence. A consistent neighbor management improves peer cooperation and blacklists malicious liars. Experimental results show that AntiLiar improves costs to defeat cheating attacks, and achieves a good service quality in a mesh based streaming system.
机译:对等(P2P)系统是用于最近的Internet应用程序的有希望的合作模型,例如内容(文件)共享,多媒体流和分布式计算。与传统的客户端服务器模型不同,P2P系统基于参与者的积极合作。这种合作性质有助于开发各种应用程序,并为参与者实现共同的目标做出贡献。 P2P系统可以容纳大量参与者。尽管服务具有可扩展性,但在系统中没有专用服务器的情况下,可以通过合作实现参与者之间的互惠互利。特别是,BitTorrent系统(一种典型的P2P方法)通过简单且可扩展的操作最大化了对等方的协作。 BitTorrent系统不仅通过有效的内容分发吸引了大量用户,而且还为可伸缩用户贡献了很大一部分Internet流量。不幸的是,P2P系统缺乏安全性机制使合规的对等方在实现同行合作。从P2P系统的早期阶段开始,很少有人担心防御战略攻击者的安全问题。包括BitTorrent在内的大多数P2P系统都乐观地期望用户遵循协议描述,并且主要集中在应用程序管理的各种功能上。由于这种情况的直接影响,自私的用户(搭便车者)可以利用协议薄弱环节,因为自己的利益违反了受监管的标准。此外,恶意用户可以对合规用户发起各种攻击,最终导致系统崩溃。本文研究了BitTorrent系统的漏洞,并提出了解决问题的通用解决方案,例如Sybil攻击,搭便车,和拜占庭式攻击(作弊攻击)。由于没有中心权限的典型P2P范例很难阻止这些攻击。因此,我们的解决方案完全分散了P2P系统中针对恶意或自私参与者的权限。每个用户都可以在没有权限干预的情况下做出自己的决定。尽管对等方的决定取决于直接连接的邻居,但与他们的合作可以通过扩展本地视图来改进检测,并防止恶意攻击。在同伴合作的基础上,提出的方法可以克服自私行为,欺诈攻击和由假身份触发的恶意攻击。尽管存在各种严重的不利条件,但它们还可以帮助参与者提高性能。首先,我们建议对GOLF进行局部过滤,以防止文件共享系统中Sybil攻击者的威胁。 GOLF方案促进了对等方的合作,以排除潜在的攻击者,而位置过滤则根据IP地址中的模式初步确定Sybil攻击者。在提出的方案下,Sybil攻击者的影响急剧下降。 GOLF有效地检测和阻止了潜在的攻击者,尽管提出了错误的指控。其次,我们提出了CoVoD,一种新颖的合作式P2P VoD流媒体方法,以惩罚不合作的同伴。 CoVoD采用基于引用的邻居管理方案。每个对等方都通过引荐信息扩展其本地视图,并奖励引荐来源。这种推荐激励可以在利益不对称的同伴之间实现直接合作。实验结果表明,CoVoD可以提高服务质量,并严厉惩罚搭便车者(不贡献资源的同伴)。第三,我们提出了一种防御机制,称为AntiLiar,可以防御基于网格的流系统中的作弊攻击。它基于安全的进度日志和可验证的证据为参与者提供实用的身份验证和信息完整性。一致的邻居管理可改善对等方的合作,并将恶意骗子列入黑名单。实验结果表明,AntiLiar在基于网格的流系统中提高了抵御作弊攻击的成本,并获得了良好的服务质量。

著录项

  • 作者

    So, Jung Ki.;

  • 作者单位

    North Carolina State University.;

  • 授予单位 North Carolina State University.;
  • 学科 Engineering Computer.;Computer Science.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 129 p.
  • 总页数 129
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号