Analytical Study of Adversarial Strategies in Cluster-based Overlays

  • Authors:
  • E. Anceaume;F. Brasileiro;R. Ludinard;B. Sericola;F. Tronel

  • Affiliations:
  • -;-;-;-;-

  • Venue:
  • PDCAT '09 Proceedings of the 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

Awerbuch and Scheideler have shown that peer-to-peer overlays networks can survive Byzantine attacks only if malicious nodes are not able to predict what will be the topology of the network for a given sequence of join and leave operations. In this paper we investigate adversarial strategies by following specific protocols. Our analysis demonstrates first that an adversary can very quickly subvert DHT-based overlays by simply never triggering leave operations. We then show that when all nodes (honest and malicious ones) are imposed on a limited lifetime, the system eventually reaches a stationary regime where the ratio of polluted clusters is bounded, independently from the initial amount of corruption in the system.