Distributed hash table-based overlays are widely used to support efficient informationudrouting and storage in structured peer-to-peer networks, but they are also subject to numerousudattacks aimed at disrupting their correct functioning. In this paper, we analyse the impact of theudeclipse attack on a chord-based overlay in terms of number of key lookups intercepted by audcollusion of malicious nodes. We propose a detection algorithm for the individuation of ongoingudattacks to the chord overlay, relying on features that can be independently estimated by eachudnetwork peer, which are given as input to a C4.5-based binary classifier. Moreover, we proposeudsome modifications to the chord routing protocol in order to mitigate the effects of such attacks.udThe countermeasures introduce a limited traffic overhead and can operate either in a distributedudfashion or assuming the presence of a centralised trusted entity. Numerical results show theudeffectiveness of the proposed mitigation techniques.
展开▼