Research on the P2P Sybil attack and the detection mechanism

Qiang Li, Hui Li, Zhongling Wen, Pengfei Yuan
{"title":"Research on the P2P Sybil attack and the detection mechanism","authors":"Qiang Li, Hui Li, Zhongling Wen, Pengfei Yuan","doi":"10.1109/ICSESS.2017.8343002","DOIUrl":null,"url":null,"abstract":"P2P is a full distributed network and Kad is the most popular P2P file-share system. Each node could join and leave dynamically in Kad. The S ybil attack means that any attacker could disguise as a normal node and join in the Kad network arbitrarily. By analyzing Kad protocol and its source codes, we found that Kad has several Sybil vulnerabilities. Based on this analysis, this paper designed a Sybil attack detection algorithm, DetectSybil which could performed well in Kad. It uses cluster algorithm to distinguish Sybil nodes from the whole p2p network. The experiments show that DetectSybil could detect Sybil attacks in Kad network effectively.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2017.8343002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

P2P is a full distributed network and Kad is the most popular P2P file-share system. Each node could join and leave dynamically in Kad. The S ybil attack means that any attacker could disguise as a normal node and join in the Kad network arbitrarily. By analyzing Kad protocol and its source codes, we found that Kad has several Sybil vulnerabilities. Based on this analysis, this paper designed a Sybil attack detection algorithm, DetectSybil which could performed well in Kad. It uses cluster algorithm to distinguish Sybil nodes from the whole p2p network. The experiments show that DetectSybil could detect Sybil attacks in Kad network effectively.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
P2P Sybil攻击及其检测机制研究
P2P是一个完全分布式的网络,Kad是目前最流行的P2P文件共享系统。每个节点都可以在Kad中动态地加入和离开。这种攻击意味着任何攻击者都可以伪装成一个正常的节点,任意地加入到Kad网络中。通过分析Kad协议及其源代码,我们发现Kad存在多个Sybil漏洞。在此基础上,本文设计了一种能够在Kad中表现良好的Sybil攻击检测算法DetectSybil。它使用聚类算法将Sybil节点与整个p2p网络区分开来。实验表明,DetectSybil能够有效地检测到Kad网络中的Sybil攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Critical analysis of feature model evolution A key technology survey and summary of dynamic network visualization Soft decision strategy design for signal demodulation in IEEE 802.11 protocol suite based wireless communication process A prediction method based on improved ridge regression SuperedgeRank algorithm and its application for core technology identification
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1