Random Visitor : Defense against Identity Attacks in P2P Networks
スポンサーリンク
概要
- 論文の詳細を見る
Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attackers ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.
- (社)電子情報通信学会の論文
- 2008-04-01
著者
-
Nah Jaehoon
Electronics And Telecommunications Research Institute (etri)
-
Gu Jabeom
Electronics And Telecommunications Research Institute (etri)
-
Park Sehyun
Faculty Of Chung-ang University
-
KWON Hyeokchan
Electronics and Telecommunications Research Institute (ETRI)
-
JANG Jongsoo
Electronics and Telecommunications Research Institute (ETRI)
関連論文
- Random Visitor : Defense against Identity Attacks in P2P Networks
- Tracing Stored Program Counter to Detect Polymorphic Shellcode
- Executable Code Recognition in Network Flows Using Instruction Transition Probabilities