The standard Byzantine attack model assumes no more than some fixed fraction of the participants are faulty. This assumption does not accurately apply to peer-to-peer settings, where Sybil attacks and botnets are realistic threats. We propose an attack model that permits an arbitrary number of malicious nodes under the assumption that each node can be classified based on some of its attributes, such as autonomous system number or operating system, and that the number of classes with malicious nodes is bounded (e.g., an attacker may exploit at most a few operating systems at a time). In this model, we present a secure DHT, evilTwin, which replaces a single, large DHT with sufficiently many smaller instances such that it is impossib...
Awerbuch and Scheideler have shown that peer-to-peer overlays networks can survive Byzantine attacks...
Awerbuch and Scheideler have shown that peer-to-peer overlays networks can survive Byzantine attacks...
P2P systems are inherently vulnerable to Sybil attacks, in which an attacker can have a large number...
The standard Byzantine attack model assumes no more than some xed fraction of the participants are f...
Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to d...
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robus...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
19International audienceAwerbuch and Scheideler have shown that peer-to-peer overlay networks can su...
19International audienceAwerbuch and Scheideler have shown that peer-to-peer overlay networks can su...
International audienceScheideler has shown that peer-to-peer overlays networks can only survive Byza...
Abstract. We consider the problem of designing scalable and robust information systems based on mult...
International audienceScheideler has shown that peer-to-peer overlays networks can only survive Byza...
International audienceScheideler has shown that peer-to-peer overlays networks can only survive Byza...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
Distributed Hash Tables (DHTs) are a popular and natural choice when dealing with dynamic resource l...
Awerbuch and Scheideler have shown that peer-to-peer overlays networks can survive Byzantine attacks...
Awerbuch and Scheideler have shown that peer-to-peer overlays networks can survive Byzantine attacks...
P2P systems are inherently vulnerable to Sybil attacks, in which an attacker can have a large number...
The standard Byzantine attack model assumes no more than some xed fraction of the participants are f...
Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to d...
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robus...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
19International audienceAwerbuch and Scheideler have shown that peer-to-peer overlay networks can su...
19International audienceAwerbuch and Scheideler have shown that peer-to-peer overlay networks can su...
International audienceScheideler has shown that peer-to-peer overlays networks can only survive Byza...
Abstract. We consider the problem of designing scalable and robust information systems based on mult...
International audienceScheideler has shown that peer-to-peer overlays networks can only survive Byza...
International audienceScheideler has shown that peer-to-peer overlays networks can only survive Byza...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
Distributed Hash Tables (DHTs) are a popular and natural choice when dealing with dynamic resource l...
Awerbuch and Scheideler have shown that peer-to-peer overlays networks can survive Byzantine attacks...
Awerbuch and Scheideler have shown that peer-to-peer overlays networks can survive Byzantine attacks...
P2P systems are inherently vulnerable to Sybil attacks, in which an attacker can have a large number...