期刊文献+

针对P2P直播系统的Eclipse延迟攻击方法研究

Defense of P2P live video systems facing Eclipse-delay attack
原文传递
导出
摘要 P2P直播系统在当今互联网上的应用越来越广泛,相对于P2P文件共享系统,其对数据传输的实时性要求更高,因此对该类系统实时性的破坏,即延迟攻击,产生的危害极大。通过分析相关理论模型,该文指出P2P直播系统在实时性方面存在安全脆弱性,基于Eclipse攻击提出了No-Offer、Delay-Chunk和No-Chunk延迟攻击方法,并提出了基于信誉机制的路由表清洗防御策略。在PlanetLab平台上基于PeerStreamer实施了真实的互联网实验,证明了Eclipse延迟攻击对当前系统的危害和该文防御策略的有效性。 P2P live video systems are widely used in today's Internet. Compared with eMule/BitTorrent and other traditional P2P file-sharing systems, a P2P live video system has higher requirements on real time data, which becomes vulnerable weakness. Delay attack, with strong concealment, is potentially lethal for large P2P video broadcasting systems. Theoretical security threats of popular P2P live video systems were analyzed to propose three types of delay attack based on Eclipse attack, No-Offer attack, Delay-Chunk attack, and No-Chunk attack, with a high-availability defense strategy against delay attack being developed. Experiments were made on PlanetLab based on PeerStreamer, which proves the impact of delay attack and the effectiveness of the developed defense strategy.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2016年第1期58-65,共8页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(61572149)
关键词 Eclipse攻击 P2P 直播系统 延迟攻击 Eclipse attack P2P live video system delay attack
  • 相关文献

参考文献28

  • 1Deshpande H, Bawa M, Gareia-Molina H. Streaming live media over a peer-to-peer network [R]. 2001.
  • 2Jannotti J, Gifford D K, Johnson K L, et al. Overcast: Reliable multicastlng with on overlay network [C]// Proceedings of the 4th Conference on Symposium on Operating System Design & Implementation Volume 4. Berkeley: USENIX Association, 2000: 14- 14.
  • 3Rejaie R, Ortega A. PALS: Peer-to-peer adaptive layered streaming [C]// Proceedings of the 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video. New York: ACM, 2003: 153-161.
  • 4Tran D A, Hun K A, Do T. Zigzag: An efficient peer-to-peer scheme for media streaming [C]// INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. Piscataway: IEEE Societies, 2003, 2: 1283-1292.
  • 5Castro M, Druschel P, Kermarrec A M, et al. SplitStream: High-bandwidth multicast in cooperative environments [J]. ACM SIGOPS Operating Systems Review, 2003, 37(5): 298 - 313.
  • 6Horvath A, Telek M, Rossi D, et al. Dissecting pplive, sopcast, tvants [J]. submitted to ACM Conext, 2008.
  • 7Vu L, Gupta I, Liang J, et al. Mapping the PPLive network: Studying the impacts of media streaming on P2P overlays [Z]. 2006.
  • 8Jia J, Li C, Chen C. Characterizing PPStream across internet [C]// Network and Parallel Computing Workshops, IFIP International Conference on. Piscataway: IEEE, 2007: 413- 418.
  • 9Su X, Chang L. A measurement study of PPStream [C]// Communications and Networking in China, Third International Conference on. Piscataway: IEEE, 2008: 1162 - 1166.
  • 10Douceur J R. The sybil attack [M]// Peerto-Peer Systems. Springer Berlin Heidelberg, 2002 : 251 - 260.

二级参考文献16

  • 1Urdaneta G, Pierre G, Steen M. A survey of DHT security techniques [J]. ACM Computing Surveys, 2009, 43(2):8.
  • 2Castro M, Druschel P, Ganesh A, et al. Secure routing for structured Peer-to-Peer overlay networks [C]// Proceedings of the 5th Symposium on Operating Systems Design and Implementation. New York: Association for Computing Machinery, 2002:299 - 314.
  • 3Douceur J. The Sybil attack [C]// Proceedings of the 1st International Workshop on Peer to-Peer Systems. London, UK: Springer Verlag, 2002: 251-260.
  • 4Dinger J, Hartenstein H. Defending the Sybil attack in P2P networks: Taxonomy, challenges, and a proposal for selbregistration [C]// Proceedings of the 1st International Conference on Availability, Reliability and Security. Washington DC, USA: IEEE Computer Society Press, 2006 : 756 -763.
  • 5Awerbuch B, Scheideler C. Towards a scalable and robust DHT [C]// Proceedings of the 18th Annual ACM Symposium on Parallelism in Algorithms and Architecture. New York, USA: Association for Computing Machinery, 2006: 318-327.
  • 6Condie T, Kacholia V, Sankararaman S, et al. Induced churn as shelter from routing table poisoning[C]// Proceedings of the 13th Annual Network and Distributed System Security Symposium. San Diego, USA: The Internet Society, 2006.
  • 7Hildrum K, Kubiatowicz J. Asymptotically efficient approaches to fault tolerance in Peer to Peer networks [C]// Proceedings of the 17th International Symposium on Distributed Computing Lecture. Berlin, Germany: Springer-Verlag, 2003:321-336.
  • 8Maccari L, Rosi M, Fantacci R, et al. Avoiding eclipse attacks on Kad/Kademlia: An identity based approach [C]// Proceedings of the IEEE Communications. Piscataway International Conference USA: IEEE Press, 2009:.
  • 9Singh A, Ngan T, Drushel P, et al. Eclipse attacks on overlay networks: Threats and defenses [C]//Proceedings of the 25th International Conference on Computer Communications. Barcelona, Spain: IEEE Press, 2006: 1 -12.
  • 10Rhea S, Geels D, Roscoe T, et al. Handling churn in a DHT [C]// Proceedings of the Annual Conference on USENIX Annual Technical Conference. Berkeley, USA: USENIX Association, 2004 : 127 - 140.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部