Professional Documents
Culture Documents
Mobiqw 2006 361758
Mobiqw 2006 361758
Mobiqw 2006 361758
Computing
Abstract - Security problems in P2P environment become more Analyzing this list of possible threats and attacks we can
complicated with the growing number of P2P networks and note that some of them (such as viruses, malware and
applications. Hence, it is very important to find reliable defection attacks) can take place in all types of P2P networks,
mechanisms of detection and elimination of various threats, while others are exploitable only with specific P2P networks
attack sources, and malicious nodes. In this paper we consider with a certain type of architecture (centralized or
how it is possible to apply some classical solutions for Byzantine
Generals Problem (BGP), originally described by Lamport and
Shostak, in a P2P environment to solve such problems.
decenized) or resource-sering a ndesource-sharing
mechanisms. So, for instance, it is easy to understand that
threats such as denial of service or filtering are more likely to
Keywords-component: P2P, DHT networks, security, attacks, happen in P2P networks with a centralized architecture based
Byzantine agreement, traitors, malicious node on the principles of client-server technology. It's clear, as in
this type of networks there is a single point of failure - a
I. INTRODUCTION central server, who represents a visible target for legal attacks.
The number of peer-to-peer network users grows In the case of decentralized P2P networks (or pure P2P
exponentially every day. Today P2P networks can offer us the networks) we can avoid these kinds of problems but meet
possibility of sharing different resources and services such as others.
distributed (collaborative) calculations, instant messaging, P2P networks based on the principles of Kademlia
pervasive devices communicating, CPU and storage resources, protocol [1], or any P2P system that uses mechanisms of
etc. With the growing number of P2P networks and Distributed Hash Tables (DHT) can be more subject of some
applications many types of problems appear, and the most other specific attacks, including: routing attacks, storage and
important of them is security. retrieval attacks, inconsistent behavior of some nodes [2].
As other networks, peer-to-peer networks are subject of In our paer we consider the possibility of application of
many types of threats and attacks. The list of attacks that very some solutions developed for distributed computer systems to
often take place in P2P networks includes:.lI
cope with some types of such attacks. More precisely, we try
* poisoning, consisting of providing resources with content, to apply Byzantine generals problem (BGP) conception and its
which is different from its description, mathematical model to solve some security problems of P2P
*denial of service, systems based on the principles of DHT.
The paper is structured as follows: section 2 describes the
* defectioncreatedbypeers thatusethenetworkwithout main types of attacks taking place in DHT based-P2P
contributing resources, networks; section 3 formulates the problem of Byzantine
* viruses, i.e. some peers can contribute for sharing generals agreement and describes a brief history of its
infected resources, investigation; in section 4 we explain our vision of possible
applications of some approaches and solutions of BGP in P2P
* malware the us o are that may contain environment and give an example of how these approaches
spyware or other malicious programs, work in the case of incorrect routing updates; section 5
* filtering, i.e. preventing some resources from being contains conclusions.
carried on the network by network operators, . MH YE FATCSH H AE-2
* masquerading, ENVIRONMENT
* spamming. A particular class of attacks that take place in P2P systems
using DHT-mechanisms are those that involve routing
REFERENCES
[1] Petar Maymounkov, David Mazieres "Kademlia: A
Peer-to-Peer Information System Based on the XOR
Metric", 1 St International Workshop on Peer-to-Peer
Systems, MIT, March 2002,
http://ademia.scs.csn
[2] Emil Sit, Robert Morris "Security Considerations for
Peer-to-Peer Distributed Hash Tables", 1 st
International Workshop on Peer-to-Peer Systems
(IPTPS'02), Cambridge, Massachusetts, March 2002