Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Detection and mitigation of localized attacks in a widely deployed P2P network

Identifieur interne : 001C14 ( Hal/Corpus ); précédent : 001C13; suivant : 001C15

Detection and mitigation of localized attacks in a widely deployed P2P network

Auteurs : Thibault Cholez ; Isabelle Chrisment ; Olivier Festor ; Guillaume Doyen

Source :

RBID : Hal:hal-00786438

English descriptors

Abstract

Several large scale P2P networks operating on the Internet are based on a Distributed Hash Table. These networks offer valuable services, but they all suffer from a critical issue allowing malicious nodes to be inserted in specific places on the DHT for undesirable purposes (monitoring, distributed denial of service, pollution, etc.). While several attacks and attack scenarios have been documented, few studies have measured the actual deployment of such attacks and none of the documented countermeasures have been tested for compatibility with an already deployed network. In this article, we focus on the KAD network. Based on large scale monitoring campaigns, we show that the world-wide deployed KAD network suffers large number of suspicious insertions around shared contents and we quantify them. To cope with these peers, we propose a new efficient protection algorithm based on analyzing the distribution of the peers' ID found around an entry after a DHT lookup. We evaluate our solution and show that it detects the most efficient configurations of inserted peers with a very small false-negative rate, and that the countermeasures successfully filter almost all the suspicious peers. We demonstrate the direct applicability of our approach by implementing and testing our solution in real P2P networks.

Url:
DOI: 10.1007/s12083-012-0137-7

Links to Exploration step

Hal:hal-00786438

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Detection and mitigation of localized attacks in a widely deployed P2P network</title>
<author>
<name sortKey="Cholez, Thibault" sort="Cholez, Thibault" uniqKey="Cholez T" first="Thibault" last="Cholez">Thibault Cholez</name>
<affiliation>
<hal:affiliation type="researchteam" xml:id="struct-394891" status="INCOMING">
<orgName>ERA</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
</desc>
<listRelation>
<relation active="#struct-93484" type="direct"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-93484" type="direct">
<org type="institution" xml:id="struct-93484" status="VALID">
<orgName>Université de Technologie Troyes [Troyes]</orgName>
<orgName type="acronym">UTT</orgName>
<desc>
<address>
<addrLine>12 rue Marie CurieCS 4206010004 TROYES CEDEX</addrLine>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Chrisment, Isabelle" sort="Chrisment, Isabelle" uniqKey="Chrisment I" first="Isabelle" last="Chrisment">Isabelle Chrisment</name>
<affiliation>
<hal:affiliation type="researchteam" xml:id="struct-205122" status="VALID">
<idno type="RNSR">200418297A</idno>
<orgName>Management of dynamic networks and services</orgName>
<orgName type="acronym">MADYNES</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/equipes/madynes</ref>
</desc>
<listRelation>
<relation active="#struct-129671" type="direct"></relation>
<relation active="#struct-300009" type="indirect"></relation>
<relation active="#struct-423085" type="direct"></relation>
<relation active="#struct-206040" type="indirect"></relation>
<relation active="#struct-413289" type="indirect"></relation>
<relation name="UMR7503" active="#struct-441569" type="indirect"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-129671" type="direct">
<org type="laboratory" xml:id="struct-129671" status="VALID">
<idno type="RNSR">198618246Y</idno>
<orgName>INRIA Nancy - Grand Est</orgName>
<desc>
<address>
<addrLine>615 rue du Jardin Botanique 54600 Villers-lès-Nancy</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/nancy</ref>
</desc>
<listRelation>
<relation active="#struct-300009" type="direct"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-300009" type="indirect">
<org type="institution" xml:id="struct-300009" status="VALID">
<orgName>Institut National de Recherche en Informatique et en Automatique</orgName>
<orgName type="acronym">Inria</orgName>
<desc>
<address>
<addrLine>Domaine de VoluceauRocquencourt - BP 10578153 Le Chesnay Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/en/</ref>
</desc>
</org>
</tutelle>
<tutelle active="#struct-423085" type="direct">
<org type="department" xml:id="struct-423085" status="VALID">
<orgName>Department of Networks, Systems and Services</orgName>
<orgName type="acronym">LORIA - NSS</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.loria.fr/la-recherche-en/departements/networks-systems-and-services</ref>
</desc>
<listRelation>
<relation active="#struct-206040" type="direct"></relation>
<relation active="#struct-300009" type="indirect"></relation>
<relation active="#struct-413289" type="indirect"></relation>
<relation name="UMR7503" active="#struct-441569" type="indirect"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-206040" type="indirect">
<org type="laboratory" xml:id="struct-206040" status="VALID">
<idno type="IdRef">067077927</idno>
<idno type="RNSR">198912571S</idno>
<idno type="IdUnivLorraine">[UL]RSI--</idno>
<orgName>Laboratoire Lorrain de Recherche en Informatique et ses Applications</orgName>
<orgName type="acronym">LORIA</orgName>
<date type="start">2012-01-01</date>
<desc>
<address>
<addrLine>Campus Scientifique BP 239 54506 Vandoeuvre-lès-Nancy Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.loria.fr</ref>
</desc>
<listRelation>
<relation active="#struct-300009" type="direct"></relation>
<relation active="#struct-413289" type="direct"></relation>
<relation name="UMR7503" active="#struct-441569" type="direct"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-413289" type="indirect">
<org type="institution" xml:id="struct-413289" status="VALID">
<idno type="IdRef">157040569</idno>
<idno type="IdUnivLorraine">[UL]100--</idno>
<orgName>Université de Lorraine</orgName>
<orgName type="acronym">UL</orgName>
<date type="start">2012-01-01</date>
<desc>
<address>
<addrLine>34 cours Léopold - CS 25233 - 54052 Nancy cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.univ-lorraine.fr/</ref>
</desc>
</org>
</tutelle>
<tutelle name="UMR7503" active="#struct-441569" type="indirect">
<org type="institution" xml:id="struct-441569" status="VALID">
<idno type="IdRef">02636817X</idno>
<idno type="ISNI">0000000122597504</idno>
<orgName>Centre National de la Recherche Scientifique</orgName>
<orgName type="acronym">CNRS</orgName>
<date type="start">1939-10-19</date>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.cnrs.fr/</ref>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Festor, Olivier" sort="Festor, Olivier" uniqKey="Festor O" first="Olivier" last="Festor">Olivier Festor</name>
<affiliation>
<hal:affiliation type="researchteam" xml:id="struct-205122" status="VALID">
<idno type="RNSR">200418297A</idno>
<orgName>Management of dynamic networks and services</orgName>
<orgName type="acronym">MADYNES</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/equipes/madynes</ref>
</desc>
<listRelation>
<relation active="#struct-129671" type="direct"></relation>
<relation active="#struct-300009" type="indirect"></relation>
<relation active="#struct-423085" type="direct"></relation>
<relation active="#struct-206040" type="indirect"></relation>
<relation active="#struct-413289" type="indirect"></relation>
<relation name="UMR7503" active="#struct-441569" type="indirect"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-129671" type="direct">
<org type="laboratory" xml:id="struct-129671" status="VALID">
<idno type="RNSR">198618246Y</idno>
<orgName>INRIA Nancy - Grand Est</orgName>
<desc>
<address>
<addrLine>615 rue du Jardin Botanique 54600 Villers-lès-Nancy</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/nancy</ref>
</desc>
<listRelation>
<relation active="#struct-300009" type="direct"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-300009" type="indirect">
<org type="institution" xml:id="struct-300009" status="VALID">
<orgName>Institut National de Recherche en Informatique et en Automatique</orgName>
<orgName type="acronym">Inria</orgName>
<desc>
<address>
<addrLine>Domaine de VoluceauRocquencourt - BP 10578153 Le Chesnay Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/en/</ref>
</desc>
</org>
</tutelle>
<tutelle active="#struct-423085" type="direct">
<org type="department" xml:id="struct-423085" status="VALID">
<orgName>Department of Networks, Systems and Services</orgName>
<orgName type="acronym">LORIA - NSS</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.loria.fr/la-recherche-en/departements/networks-systems-and-services</ref>
</desc>
<listRelation>
<relation active="#struct-206040" type="direct"></relation>
<relation active="#struct-300009" type="indirect"></relation>
<relation active="#struct-413289" type="indirect"></relation>
<relation name="UMR7503" active="#struct-441569" type="indirect"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-206040" type="indirect">
<org type="laboratory" xml:id="struct-206040" status="VALID">
<idno type="IdRef">067077927</idno>
<idno type="RNSR">198912571S</idno>
<idno type="IdUnivLorraine">[UL]RSI--</idno>
<orgName>Laboratoire Lorrain de Recherche en Informatique et ses Applications</orgName>
<orgName type="acronym">LORIA</orgName>
<date type="start">2012-01-01</date>
<desc>
<address>
<addrLine>Campus Scientifique BP 239 54506 Vandoeuvre-lès-Nancy Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.loria.fr</ref>
</desc>
<listRelation>
<relation active="#struct-300009" type="direct"></relation>
<relation active="#struct-413289" type="direct"></relation>
<relation name="UMR7503" active="#struct-441569" type="direct"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-413289" type="indirect">
<org type="institution" xml:id="struct-413289" status="VALID">
<idno type="IdRef">157040569</idno>
<idno type="IdUnivLorraine">[UL]100--</idno>
<orgName>Université de Lorraine</orgName>
<orgName type="acronym">UL</orgName>
<date type="start">2012-01-01</date>
<desc>
<address>
<addrLine>34 cours Léopold - CS 25233 - 54052 Nancy cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.univ-lorraine.fr/</ref>
</desc>
</org>
</tutelle>
<tutelle name="UMR7503" active="#struct-441569" type="indirect">
<org type="institution" xml:id="struct-441569" status="VALID">
<idno type="IdRef">02636817X</idno>
<idno type="ISNI">0000000122597504</idno>
<orgName>Centre National de la Recherche Scientifique</orgName>
<orgName type="acronym">CNRS</orgName>
<date type="start">1939-10-19</date>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.cnrs.fr/</ref>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Doyen, Guillaume" sort="Doyen, Guillaume" uniqKey="Doyen G" first="Guillaume" last="Doyen">Guillaume Doyen</name>
<affiliation>
<hal:affiliation type="researchteam" xml:id="struct-394891" status="INCOMING">
<orgName>ERA</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
</desc>
<listRelation>
<relation active="#struct-93484" type="direct"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-93484" type="direct">
<org type="institution" xml:id="struct-93484" status="VALID">
<orgName>Université de Technologie Troyes [Troyes]</orgName>
<orgName type="acronym">UTT</orgName>
<desc>
<address>
<addrLine>12 rue Marie CurieCS 4206010004 TROYES CEDEX</addrLine>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">HAL</idno>
<idno type="RBID">Hal:hal-00786438</idno>
<idno type="halId">hal-00786438</idno>
<idno type="halUri">https://hal.inria.fr/hal-00786438</idno>
<idno type="url">https://hal.inria.fr/hal-00786438</idno>
<idno type="doi">10.1007/s12083-012-0137-7</idno>
<date when="2012-05-10">2012-05-10</date>
<idno type="wicri:Area/Hal/Corpus">001C14</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en">Detection and mitigation of localized attacks in a widely deployed P2P network</title>
<author>
<name sortKey="Cholez, Thibault" sort="Cholez, Thibault" uniqKey="Cholez T" first="Thibault" last="Cholez">Thibault Cholez</name>
<affiliation>
<hal:affiliation type="researchteam" xml:id="struct-394891" status="INCOMING">
<orgName>ERA</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
</desc>
<listRelation>
<relation active="#struct-93484" type="direct"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-93484" type="direct">
<org type="institution" xml:id="struct-93484" status="VALID">
<orgName>Université de Technologie Troyes [Troyes]</orgName>
<orgName type="acronym">UTT</orgName>
<desc>
<address>
<addrLine>12 rue Marie CurieCS 4206010004 TROYES CEDEX</addrLine>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Chrisment, Isabelle" sort="Chrisment, Isabelle" uniqKey="Chrisment I" first="Isabelle" last="Chrisment">Isabelle Chrisment</name>
<affiliation>
<hal:affiliation type="researchteam" xml:id="struct-205122" status="VALID">
<idno type="RNSR">200418297A</idno>
<orgName>Management of dynamic networks and services</orgName>
<orgName type="acronym">MADYNES</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/equipes/madynes</ref>
</desc>
<listRelation>
<relation active="#struct-129671" type="direct"></relation>
<relation active="#struct-300009" type="indirect"></relation>
<relation active="#struct-423085" type="direct"></relation>
<relation active="#struct-206040" type="indirect"></relation>
<relation active="#struct-413289" type="indirect"></relation>
<relation name="UMR7503" active="#struct-441569" type="indirect"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-129671" type="direct">
<org type="laboratory" xml:id="struct-129671" status="VALID">
<idno type="RNSR">198618246Y</idno>
<orgName>INRIA Nancy - Grand Est</orgName>
<desc>
<address>
<addrLine>615 rue du Jardin Botanique 54600 Villers-lès-Nancy</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/nancy</ref>
</desc>
<listRelation>
<relation active="#struct-300009" type="direct"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-300009" type="indirect">
<org type="institution" xml:id="struct-300009" status="VALID">
<orgName>Institut National de Recherche en Informatique et en Automatique</orgName>
<orgName type="acronym">Inria</orgName>
<desc>
<address>
<addrLine>Domaine de VoluceauRocquencourt - BP 10578153 Le Chesnay Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/en/</ref>
</desc>
</org>
</tutelle>
<tutelle active="#struct-423085" type="direct">
<org type="department" xml:id="struct-423085" status="VALID">
<orgName>Department of Networks, Systems and Services</orgName>
<orgName type="acronym">LORIA - NSS</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.loria.fr/la-recherche-en/departements/networks-systems-and-services</ref>
</desc>
<listRelation>
<relation active="#struct-206040" type="direct"></relation>
<relation active="#struct-300009" type="indirect"></relation>
<relation active="#struct-413289" type="indirect"></relation>
<relation name="UMR7503" active="#struct-441569" type="indirect"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-206040" type="indirect">
<org type="laboratory" xml:id="struct-206040" status="VALID">
<idno type="IdRef">067077927</idno>
<idno type="RNSR">198912571S</idno>
<idno type="IdUnivLorraine">[UL]RSI--</idno>
<orgName>Laboratoire Lorrain de Recherche en Informatique et ses Applications</orgName>
<orgName type="acronym">LORIA</orgName>
<date type="start">2012-01-01</date>
<desc>
<address>
<addrLine>Campus Scientifique BP 239 54506 Vandoeuvre-lès-Nancy Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.loria.fr</ref>
</desc>
<listRelation>
<relation active="#struct-300009" type="direct"></relation>
<relation active="#struct-413289" type="direct"></relation>
<relation name="UMR7503" active="#struct-441569" type="direct"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-413289" type="indirect">
<org type="institution" xml:id="struct-413289" status="VALID">
<idno type="IdRef">157040569</idno>
<idno type="IdUnivLorraine">[UL]100--</idno>
<orgName>Université de Lorraine</orgName>
<orgName type="acronym">UL</orgName>
<date type="start">2012-01-01</date>
<desc>
<address>
<addrLine>34 cours Léopold - CS 25233 - 54052 Nancy cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.univ-lorraine.fr/</ref>
</desc>
</org>
</tutelle>
<tutelle name="UMR7503" active="#struct-441569" type="indirect">
<org type="institution" xml:id="struct-441569" status="VALID">
<idno type="IdRef">02636817X</idno>
<idno type="ISNI">0000000122597504</idno>
<orgName>Centre National de la Recherche Scientifique</orgName>
<orgName type="acronym">CNRS</orgName>
<date type="start">1939-10-19</date>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.cnrs.fr/</ref>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Festor, Olivier" sort="Festor, Olivier" uniqKey="Festor O" first="Olivier" last="Festor">Olivier Festor</name>
<affiliation>
<hal:affiliation type="researchteam" xml:id="struct-205122" status="VALID">
<idno type="RNSR">200418297A</idno>
<orgName>Management of dynamic networks and services</orgName>
<orgName type="acronym">MADYNES</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/equipes/madynes</ref>
</desc>
<listRelation>
<relation active="#struct-129671" type="direct"></relation>
<relation active="#struct-300009" type="indirect"></relation>
<relation active="#struct-423085" type="direct"></relation>
<relation active="#struct-206040" type="indirect"></relation>
<relation active="#struct-413289" type="indirect"></relation>
<relation name="UMR7503" active="#struct-441569" type="indirect"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-129671" type="direct">
<org type="laboratory" xml:id="struct-129671" status="VALID">
<idno type="RNSR">198618246Y</idno>
<orgName>INRIA Nancy - Grand Est</orgName>
<desc>
<address>
<addrLine>615 rue du Jardin Botanique 54600 Villers-lès-Nancy</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/nancy</ref>
</desc>
<listRelation>
<relation active="#struct-300009" type="direct"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-300009" type="indirect">
<org type="institution" xml:id="struct-300009" status="VALID">
<orgName>Institut National de Recherche en Informatique et en Automatique</orgName>
<orgName type="acronym">Inria</orgName>
<desc>
<address>
<addrLine>Domaine de VoluceauRocquencourt - BP 10578153 Le Chesnay Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/en/</ref>
</desc>
</org>
</tutelle>
<tutelle active="#struct-423085" type="direct">
<org type="department" xml:id="struct-423085" status="VALID">
<orgName>Department of Networks, Systems and Services</orgName>
<orgName type="acronym">LORIA - NSS</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.loria.fr/la-recherche-en/departements/networks-systems-and-services</ref>
</desc>
<listRelation>
<relation active="#struct-206040" type="direct"></relation>
<relation active="#struct-300009" type="indirect"></relation>
<relation active="#struct-413289" type="indirect"></relation>
<relation name="UMR7503" active="#struct-441569" type="indirect"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-206040" type="indirect">
<org type="laboratory" xml:id="struct-206040" status="VALID">
<idno type="IdRef">067077927</idno>
<idno type="RNSR">198912571S</idno>
<idno type="IdUnivLorraine">[UL]RSI--</idno>
<orgName>Laboratoire Lorrain de Recherche en Informatique et ses Applications</orgName>
<orgName type="acronym">LORIA</orgName>
<date type="start">2012-01-01</date>
<desc>
<address>
<addrLine>Campus Scientifique BP 239 54506 Vandoeuvre-lès-Nancy Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.loria.fr</ref>
</desc>
<listRelation>
<relation active="#struct-300009" type="direct"></relation>
<relation active="#struct-413289" type="direct"></relation>
<relation name="UMR7503" active="#struct-441569" type="direct"></relation>
</listRelation>
</org>
</tutelle>
<tutelle active="#struct-413289" type="indirect">
<org type="institution" xml:id="struct-413289" status="VALID">
<idno type="IdRef">157040569</idno>
<idno type="IdUnivLorraine">[UL]100--</idno>
<orgName>Université de Lorraine</orgName>
<orgName type="acronym">UL</orgName>
<date type="start">2012-01-01</date>
<desc>
<address>
<addrLine>34 cours Léopold - CS 25233 - 54052 Nancy cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.univ-lorraine.fr/</ref>
</desc>
</org>
</tutelle>
<tutelle name="UMR7503" active="#struct-441569" type="indirect">
<org type="institution" xml:id="struct-441569" status="VALID">
<idno type="IdRef">02636817X</idno>
<idno type="ISNI">0000000122597504</idno>
<orgName>Centre National de la Recherche Scientifique</orgName>
<orgName type="acronym">CNRS</orgName>
<date type="start">1939-10-19</date>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.cnrs.fr/</ref>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Doyen, Guillaume" sort="Doyen, Guillaume" uniqKey="Doyen G" first="Guillaume" last="Doyen">Guillaume Doyen</name>
<affiliation>
<hal:affiliation type="researchteam" xml:id="struct-394891" status="INCOMING">
<orgName>ERA</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
</desc>
<listRelation>
<relation active="#struct-93484" type="direct"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-93484" type="direct">
<org type="institution" xml:id="struct-93484" status="VALID">
<orgName>Université de Technologie Troyes [Troyes]</orgName>
<orgName type="acronym">UTT</orgName>
<desc>
<address>
<addrLine>12 rue Marie CurieCS 4206010004 TROYES CEDEX</addrLine>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
</affiliation>
</author>
</analytic>
<idno type="DOI">10.1007/s12083-012-0137-7</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="mix" xml:lang="en">
<term>Distributed Hash Table</term>
<term>KAD</term>
<term>P2P networks</term>
<term>Sybil attack</term>
<term>attack detection</term>
<term>defense</term>
<term>monitoring</term>
<term>security</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Several large scale P2P networks operating on the Internet are based on a Distributed Hash Table. These networks offer valuable services, but they all suffer from a critical issue allowing malicious nodes to be inserted in specific places on the DHT for undesirable purposes (monitoring, distributed denial of service, pollution, etc.). While several attacks and attack scenarios have been documented, few studies have measured the actual deployment of such attacks and none of the documented countermeasures have been tested for compatibility with an already deployed network. In this article, we focus on the KAD network. Based on large scale monitoring campaigns, we show that the world-wide deployed KAD network suffers large number of suspicious insertions around shared contents and we quantify them. To cope with these peers, we propose a new efficient protection algorithm based on analyzing the distribution of the peers' ID found around an entry after a DHT lookup. We evaluate our solution and show that it detects the most efficient configurations of inserted peers with a very small false-negative rate, and that the countermeasures successfully filter almost all the suspicious peers. We demonstrate the direct applicability of our approach by implementing and testing our solution in real P2P networks.</div>
</front>
</TEI>
<hal api="V3">
<titleStmt>
<title xml:lang="en">Detection and mitigation of localized attacks in a widely deployed P2P network</title>
<author role="aut">
<persName>
<forename type="first">Thibault</forename>
<surname>Cholez</surname>
</persName>
<email>thibault.cholez@utt.fr</email>
<ptr type="url" target="http://thibault.cholez.free.fr"></ptr>
<idno type="idhal">cholez</idno>
<idno type="halauthor">662040</idno>
<affiliation ref="#struct-394891"></affiliation>
</author>
<author role="aut">
<persName>
<forename type="first">Isabelle</forename>
<surname>Chrisment</surname>
</persName>
<email>isabelle.chrisment@loria.fr</email>
<idno type="halauthor">661989</idno>
<orgName ref="#struct-206040"></orgName>
<affiliation ref="#struct-205122"></affiliation>
</author>
<author role="aut">
<persName>
<forename type="first">Olivier</forename>
<surname>Festor</surname>
</persName>
<email>Olivier.Festor@loria.fr</email>
<idno type="halauthor">98455</idno>
<orgName ref="#struct-300009"></orgName>
<affiliation ref="#struct-205122"></affiliation>
</author>
<author role="aut">
<persName>
<forename type="first">Guillaume</forename>
<surname>Doyen</surname>
</persName>
<email>guillaume.doyen@utt.fr</email>
<idno type="halauthor">542869</idno>
<affiliation ref="#struct-394891"></affiliation>
</author>
<editor role="depositor">
<persName>
<forename>Thibault</forename>
<surname>Cholez</surname>
</persName>
<email>thibault.cholez@loria.fr</email>
</editor>
<funder>GIS 3SGS ACDAP2P</funder>
</titleStmt>
<editionStmt>
<edition n="v1" type="current">
<date type="whenSubmitted">2013-02-08 15:48:46</date>
<date type="whenWritten">2011-07-20</date>
<date type="whenModified">2015-09-21 11:16:19</date>
<date type="whenReleased">2013-02-08 15:57:35</date>
<date type="whenProduced">2012-05-10</date>
<date type="whenEndEmbargoed">2013-02-08</date>
<ref type="file" target="https://hal.inria.fr/hal-00786438/document">
<date notBefore="2013-02-08"></date>
</ref>
<ref type="file" subtype="author" n="1" target="https://hal.inria.fr/hal-00786438/file/detection_mitigation_sybil_attacks.pdf">
<date notBefore="2013-02-08"></date>
</ref>
</edition>
<respStmt>
<resp>contributor</resp>
<name key="131698">
<persName>
<forename>Thibault</forename>
<surname>Cholez</surname>
</persName>
<email>thibault.cholez@loria.fr</email>
</name>
</respStmt>
</editionStmt>
<publicationStmt>
<distributor>CCSD</distributor>
<idno type="halId">hal-00786438</idno>
<idno type="halUri">https://hal.inria.fr/hal-00786438</idno>
<idno type="halBibtex">cholez:hal-00786438</idno>
<idno type="halRefHtml">Peer-to-Peer Networking and Applications, Springer, 2012, Special Issue on Experimental Evaluation of Peer-to-Peer Applications, 6 (2), pp.155-174. <http://link.springer.com/article/10.1007%2Fs12083-012-0137-7>. <10.1007/s12083-012-0137-7></idno>
<idno type="halRef">Peer-to-Peer Networking and Applications, Springer, 2012, Special Issue on Experimental Evaluation of Peer-to-Peer Applications, 6 (2), pp.155-174. <http://link.springer.com/article/10.1007%2Fs12083-012-0137-7>. <10.1007/s12083-012-0137-7></idno>
</publicationStmt>
<seriesStmt>
<idno type="stamp" n="CNRS">CNRS - Centre national de la recherche scientifique</idno>
<idno type="stamp" n="INRIA">INRIA - Institut National de Recherche en Informatique et en Automatique</idno>
<idno type="stamp" n="INRIA-LORRAINE">INRIA Nancy - Grand Est</idno>
<idno type="stamp" n="LORIA2">Publications du LORIA</idno>
<idno type="stamp" n="INRIA-NANCY-GRAND-EST">INRIA Nancy - Grand Est</idno>
<idno type="stamp" n="LORIA">LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications</idno>
<idno type="stamp" n="LORIA-NSS" p="LORIA">Réseaux, systèmes et services</idno>
<idno type="stamp" n="INRIA_TEST">INRIA - Institut National de Recherche en Informatique et en Automatique</idno>
<idno type="stamp" n="UNIV-LORRAINE">Université de Lorraine</idno>
</seriesStmt>
<notesStmt>
<note type="audience" n="2">International</note>
<note type="popular" n="0">No</note>
<note type="peer" n="1">Yes</note>
</notesStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en">Detection and mitigation of localized attacks in a widely deployed P2P network</title>
<author role="aut">
<persName>
<forename type="first">Thibault</forename>
<surname>Cholez</surname>
</persName>
<email>thibault.cholez@utt.fr</email>
<ptr type="url" target="http://thibault.cholez.free.fr"></ptr>
<idno type="idHal">cholez</idno>
<idno type="halAuthorId">662040</idno>
<affiliation ref="#struct-394891"></affiliation>
</author>
<author role="aut">
<persName>
<forename type="first">Isabelle</forename>
<surname>Chrisment</surname>
</persName>
<email>isabelle.chrisment@loria.fr</email>
<idno type="halAuthorId">661989</idno>
<orgName ref="#struct-206040"></orgName>
<affiliation ref="#struct-205122"></affiliation>
</author>
<author role="aut">
<persName>
<forename type="first">Olivier</forename>
<surname>Festor</surname>
</persName>
<email>Olivier.Festor@loria.fr</email>
<idno type="halAuthorId">98455</idno>
<orgName ref="#struct-300009"></orgName>
<affiliation ref="#struct-205122"></affiliation>
</author>
<author role="aut">
<persName>
<forename type="first">Guillaume</forename>
<surname>Doyen</surname>
</persName>
<email>guillaume.doyen@utt.fr</email>
<idno type="halAuthorId">542869</idno>
<affiliation ref="#struct-394891"></affiliation>
</author>
</analytic>
<monogr>
<idno type="halJournalId" status="INCOMING">71444</idno>
<title level="j">Peer-to-Peer Networking and Applications</title>
<imprint>
<publisher>Springer</publisher>
<biblScope unit="serie">Special Issue on Experimental Evaluation of Peer-to-Peer Applications</biblScope>
<biblScope unit="volume">6</biblScope>
<biblScope unit="issue">2</biblScope>
<biblScope unit="pp">155-174</biblScope>
<date type="datePub">2012-05-10</date>
</imprint>
</monogr>
<idno type="doi">10.1007/s12083-012-0137-7</idno>
<ref type="publisher">http://link.springer.com/article/10.1007%2Fs12083-012-0137-7</ref>
</biblStruct>
</sourceDesc>
<profileDesc>
<langUsage>
<language ident="en">English</language>
</langUsage>
<textClass>
<keywords scheme="author">
<term xml:lang="en">P2P networks</term>
<term xml:lang="en">Distributed Hash Table</term>
<term xml:lang="en">KAD</term>
<term xml:lang="en">monitoring</term>
<term xml:lang="en">security</term>
<term xml:lang="en">Sybil attack</term>
<term xml:lang="en">attack detection</term>
<term xml:lang="en">defense</term>
</keywords>
<classCode scheme="halDomain" n="info.info-ni">Computer Science [cs]/Networking and Internet Architecture [cs.NI]</classCode>
<classCode scheme="halTypology" n="ART">Journal articles</classCode>
</textClass>
<abstract xml:lang="en">Several large scale P2P networks operating on the Internet are based on a Distributed Hash Table. These networks offer valuable services, but they all suffer from a critical issue allowing malicious nodes to be inserted in specific places on the DHT for undesirable purposes (monitoring, distributed denial of service, pollution, etc.). While several attacks and attack scenarios have been documented, few studies have measured the actual deployment of such attacks and none of the documented countermeasures have been tested for compatibility with an already deployed network. In this article, we focus on the KAD network. Based on large scale monitoring campaigns, we show that the world-wide deployed KAD network suffers large number of suspicious insertions around shared contents and we quantify them. To cope with these peers, we propose a new efficient protection algorithm based on analyzing the distribution of the peers' ID found around an entry after a DHT lookup. We evaluate our solution and show that it detects the most efficient configurations of inserted peers with a very small false-negative rate, and that the countermeasures successfully filter almost all the suspicious peers. We demonstrate the direct applicability of our approach by implementing and testing our solution in real P2P networks.</abstract>
<particDesc>
<org type="consortium">INRIA MADYNES / UTT</org>
</particDesc>
</profileDesc>
</hal>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Hal/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001C14 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Hal/Corpus/biblio.hfd -nk 001C14 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Hal
   |étape=   Corpus
   |type=    RBID
   |clé=     Hal:hal-00786438
   |texte=   Detection and mitigation of localized attacks in a widely deployed P2P network
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022