Abstract
The test of a peer-to-peer file sharing network is how efficiently the objects are discovered and retrieved. One of the most important factors that contribute towards this is optimal replication of the objects across the network. One of the security threats to replication model is Sybil attack. In this paper we propose an approach that aims at detecting sybil identities in peer-to-peer file sharing networks. The sybils can corrupt, hide or destroy the replicas in file sharing network. This approach makes use of the fact that sybil doesn’t scale its storage to the factor of its identities. The approach safeguards the availability and accessibility of objects in a peer-to-peer network from sybil attack. Experimental evaluations have shown that our approach works very efficiently in detecting sybils. More than 50% of the sybils were detected in first few seconds of the simulation and loss or damage of objects is reduced to less than .0001%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gnutella Protocol Specification Version 0.4, http://www9.limewire.com/developer/gnutella_protocol_0.4.pdf
Kazaa, http://www.kazaa.com
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content Addressable Network. In: Proceedings of the 2001 ACM Annual Conference of the Special Interest Group on Data Communication (SIGCOMM), pp. 161–172. ACM Press, New York (2001)
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. IEEE/ACM Transactions on Networking 11, 17–32 (2003)
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)
Haiying, S., Brodie, A.S., Xu, C., Shi, W.: Scalable and Secure P2P Overlay Networks. In: Wu, J. (ed.) Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks. CRC Press, London (2005)
Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Wallach, D.S.: A Survey of Peer-to-Peer Security Issues. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 253–258. Springer, Heidelberg (2003)
Dinger, J., Hartenstein, H.: Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration. In: Proceedings of the First International Conference on Availability, Reliability and Security (ARES 2006), pp. 756–763. IEEE Computer Society, Los Alamitos (2006)
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation, pp. 299–314. ACM Press, New York (2003)
Bianchini, M., Gori, M., Scarselli, F.: Inside page rank. ACM Transactions on Internet Technology 5(1), 92–128 (2005)
Viglucci, A., Tanfani, J., Getter, L.: Herald special report: Dubious tactics tilted mayoral votes. Miami Herald, February 8 (1998)
Anderson, D.: SETI@home in Peer-to-Peer: Harnessing the Benefit of a Disruptive Technology. O’Reilly & Associates, CA (2001)
Larson, S.M., Snow, C.D., Shirts, M., Pande, V.S.: FOLDING@home and GENOME@home: Using distributed computing to tackle previously intractable problems in computational biology. Computational Genomics (2002)
Miller, J.: Jabber: Conversational technologies in Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology. O’Reilly & Associates, CA (2001)
Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R.: Sybil-resistant DHT routing. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 305–318. Springer, Heidelberg (2005)
Fiat, A., Saia, J., Young, M.: Making Chord Robust to Byzantine Attacks. In: Brodal, G.S., Leonardi, S. (eds.) ESA 2005. LNCS, vol. 3669, pp. 803–814. Springer, Heidelberg (2005)
Liang, J., Kumar, R., Xi, Y., Ross, K.: Pollution in P2P file sharing systems. In: Proceedings of. IEEE INFOCOM 2005, vol. 2, pp. 1174–1185. IEEE Computer Society, Washington (2005)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: Defending against sybil attacks via social networks. In: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 267–278. ACM Press, New York (2006)
Borisov, N.: Computational Puzzles as Sybil Defenses. In: Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing, pp. 171–176. IEEE Computer Society, Washington (2006)
Aspnes, J., Jackson, C., Krishnamurthy, A.: Exposing computationally challenged Byzantine impostors. Technical Report, Yale University Department of Computer Science (July 2005)
Karger, D., Lehman, E., Leighton, F., Levine, M., Lewin, D., Panigrahy, R.: Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web. In: Proceedings of the 29th Annual ACM Symposium on Theory of Computing, pp. 654–663. ACM Press, New York (1997)
GarcĂa, P., Pairot, C., Mondejar, R., Pujol, J., Tejedor, H., Rallo, R.: PlanetSim: A New Overlay Network Simulation Framework. In: Proceedings of 19th IEEE International Conference on Automated Software Engineering, pp. 123–136. IEEE Computer Society, Los Alamitos (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Haribabu, K., Hota, C., Saravana (2010). Detecting Sybils in Peer-to-Peer File Replication Systems. In: Weerasinghe, D. (eds) Information Security and Digital Forensics. ISDF 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 41. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11530-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-11530-1_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11529-5
Online ISBN: 978-3-642-11530-1
eBook Packages: Computer ScienceComputer Science (R0)