Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be rendered inoperable by simple flooding attacks generated from insider nodes. In this paper, we study detection and containment mechanisms against insider Denial of Service (DoS) attacks for overlay networks. To counter such attacks, we introduce novel mechanisms for protecting overlay networks that exhibit well defined properties due to their structure against non-conforming (abnormal) behavior of participating nodes. We use a lightweight distributed detection mechanism that exploits inherent structural invariants of DHTs to ferret out anomalous flow behavior. We evaluat...
Abstract — Overlay networks are widely used to deploy functionality at edge nodes without changing n...
Abstract 1 A number of recent applications have been built on distributed hash tables (DHTs) based o...
International audienceScheideler has shown that peer-to-peer overlays networks can only survive Byza...
Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to d...
Denial of service (DoS) attacks continue to threaten the reliability of networking systems. Previous...
Protection against Denial of Service (DoS) attacks is a challenging and ongoing problem. Current ove...
As we increase our dependency upon networked communication, the incentive to compromise and degrade ...
Every peer-to-peer system is based on some overlay network connecting its peers. Many of the overlay...
We show that malicious nodes in a peer-to-peer system may impact the external Internet environment, ...
Abstract — Distributed denial-of-service attacks on public servers have recently become more serious...
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-bas...
Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial...
Overlay networks are widely used to deploy functionality at edge nodes without changing network rout...
Distributed hash table-based overlays are widely used to support efficient information routing and ...
Denial of service (DoS) attacks continue to threaten the reliability of networking systems. Previous...
Abstract — Overlay networks are widely used to deploy functionality at edge nodes without changing n...
Abstract 1 A number of recent applications have been built on distributed hash tables (DHTs) based o...
International audienceScheideler has shown that peer-to-peer overlays networks can only survive Byza...
Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to d...
Denial of service (DoS) attacks continue to threaten the reliability of networking systems. Previous...
Protection against Denial of Service (DoS) attacks is a challenging and ongoing problem. Current ove...
As we increase our dependency upon networked communication, the incentive to compromise and degrade ...
Every peer-to-peer system is based on some overlay network connecting its peers. Many of the overlay...
We show that malicious nodes in a peer-to-peer system may impact the external Internet environment, ...
Abstract — Distributed denial-of-service attacks on public servers have recently become more serious...
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-bas...
Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial...
Overlay networks are widely used to deploy functionality at edge nodes without changing network rout...
Distributed hash table-based overlays are widely used to support efficient information routing and ...
Denial of service (DoS) attacks continue to threaten the reliability of networking systems. Previous...
Abstract — Overlay networks are widely used to deploy functionality at edge nodes without changing n...
Abstract 1 A number of recent applications have been built on distributed hash tables (DHTs) based o...
International audienceScheideler has shown that peer-to-peer overlays networks can only survive Byza...