Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Secure routing for structured peer-to-peer overlay networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
PKI-Based Security for Peer-to-Peer Information Sharing
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
Authenticated group key agreement with admission control
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Sybilproof reputation mechanisms
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Performance Modeling of P2P File Sharing Applications
FIRB-PERF '05 Proceedings of the 2005 Workshop on Techniques, Methodologies and Tools for Performance Evaluation of Complex Systems
Impeding attrition attacks in P2P systems
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Simulating non-scanning worms on peer-to-peer networks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Exploiting P2P systems for DDoS attacks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
A survey of peer-to-peer security issues
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A first look at peer-to-peer worms: threats and defenses
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Hi-index | 0.00 |
Peer-to-peer (P2P) networks are vulnerable from malicious attacks by anonymous users. By populating unprotected peers with poisoned file indices, the attacker can launch a poisoning DDoS (distributed denial-of-service) attacks on any host in the network. We solve this security problem with identity-based signatures contained in file indexes to establish peer accountability. We prove that index accountability can effectively block index-poisoning DDoS attacks in any open P2P environment. A new Accountable Indexing Protocol (AIP) is proposed to enforce peer accountability. This protocol is applicable to all P2P file-sharing networks, either structured or unstructured. The system allows gradual transition of peers to become AIP-enabled. We develop an analytical model to characterize the poison propagation patterns. The poisoning model is validated by simulated AIP experiments on large-scale P2P networks over one million of peer nodes.