首页> 外文OA文献 >Detection and mitigation of the eclipse attack in chord overlays
【2h】

Detection and mitigation of the eclipse attack in chord overlays

机译:检测和缓解和弦叠加中的日食攻击

摘要

Distributed hash table-based overlays are widely used to support efficient informationudrouting and storage in structured peer-to-peer networks, but they are also subject to numerousudattacks aimed at disrupting their correct functioning. In this paper, we analyse the impact of theudeclipse attack on a chord-based overlay in terms of number of key lookups intercepted by audcollusion of malicious nodes. We propose a detection algorithm for the individuation of ongoingudattacks to the chord overlay, relying on features that can be independently estimated by eachudnetwork peer, which are given as input to a C4.5-based binary classifier. Moreover, we proposeudsome modifications to the chord routing protocol in order to mitigate the effects of such attacks.udThe countermeasures introduce a limited traffic overhead and can operate either in a distributedudfashion or assuming the presence of a centralised trusted entity. Numerical results show theudeffectiveness of the proposed mitigation techniques.
机译:基于分布式哈希表的覆盖被广泛用于支持结构化对等网络中的有效信息路由和存储,但它们也受到众多旨在破坏其正确功能的攻击。在本文中,我们通过恶意节点的 udcollusion拦截的关键查找次数分析了 declipse攻击对基于和弦的覆盖的影响。我们提出了一种检测算法,用于根据每个 udnetwork对等体可以独立估计的特征将进行中的 udatta个性化为和弦叠加,这些特征作为输入给基于C4.5的二进制分类器。此外,我们提议对和弦路由协议进行一些过大的修改,以减轻此类攻击的影响。对策提出了有限的流量开销,并且可以在分布式 udfashion中运行,也可以假定存在集中式受信实体。数值结果表明了所提出的缓解技术的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号