Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Early measurements of a cluster-based architecture for P2P systems
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
SCRIBE: The Design of a Large-Scale Event Notification Infrastructure
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Fast and secure distributed read-only file system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Open Problems in Data-Sharing Peer-to-Peer Systems
ICDT '03 Proceedings of the 9th International Conference on Database Theory
Anonymizing Censorship Resistant Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Secure routing for structured peer-to-peer overlay networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
On the Security of Polling Protocols in Peer-to-Peer Systems
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
P2P Scrabble. Can P2P Games Commence?
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Proceedings of the 11th ACM conference on Computer and communications security
Defending a P2P Digital Preservation System
IEEE Transactions on Dependable and Secure Computing
A Peer-to-Peer Replica Location Service Based on a Distributed Hash Table
Proceedings of the 2004 ACM/IEEE conference on Supercomputing
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
How to spread adversarial nodes?: rotate!
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
Stealth distributed hash table: unleashing the real potential of peer-to-peer
CoNEXT '05 Proceedings of the 2005 ACM conference on Emerging network experiment and technology
A Novel Methodology for Constructing Secure Multipath Overlays
IEEE Internet Computing
The design of a robust peer-to-peer system
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Towards a scalable and robust DHT
Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures
Fireflies: scalable support for intrusion-tolerant network overlays
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Survey of research towards robust peer-to-peer networks: search methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mayday: distributed filtering for internet services
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation
IEEE Transactions on Dependable and Secure Computing
Exploiting KAD: possible uses and misuses
ACM SIGCOMM Computer Communication Review
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing
Computer Networks: The International Journal of Computer and Telecommunications Networking
A distributed content independent method for spam detection
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
A cooperative SIP infrastructure for highly reliable telecommunication services
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
Attribute-based access to distributed data over P2P networks
International Journal of Computational Science and Engineering
Authentication in stealth distributed hash tables
Journal of Systems Architecture: the EUROMICRO Journal
Securing user-controlled routing infrastructures
IEEE/ACM Transactions on Networking (TON)
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
The Exclusion of Malicious Routing Peers in Structured P2P Systems
Agents and Peer-to-Peer Computing
Efficient Content Authentication in Peer-to-Peer Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Proceedings of the 1st Workshop on Social Network Systems
Information leaks in structured peer-to-peer anonymous communication systems
Proceedings of the 15th ACM conference on Computer and communications security
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Computer Communications
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Reputation and audits for self-organizing storage
Proceedings of the workshop on Security in Opportunistic and SOCial networks
A resilient architecture for DHT-based distributed collaborative environments
Proceedings of the 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems
Our Brothers' Keepers: Secure Routing with High Performance
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Robust random number generation for peer-to-peer systems
Theoretical Computer Science
A Framework for Secure End-to-End Delivery of Messages in Publish/Subscribe Systems
GRID '06 Proceedings of the 7th IEEE/ACM International Conference on Grid Computing
IEEE/ACM Transactions on Networking (TON)
Random Visitor: Defense against Identity Attacks in P2P Networks
IEICE - Transactions on Information and Systems
Secure routing in peer-to-peer distributed hash tables
Proceedings of the 2009 ACM symposium on Applied Computing
Reputation management algorithms for DHT-based peer-to-peer environment
Computer Communications
A survey on security in JXTA applications
Journal of Systems and Software
PeerTIS: a peer-to-peer traffic information system
Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Proceedings of the 16th ACM conference on Computer and communications security
Hashing it out in public: common failure modes of DHT-based anonymity schemes
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Long-term data resilience using opinion polls
Long-term data resilience using opinion polls
Researches on secure proximity distance defending attack of finger table based on chord
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
P2P attack taxonomy and relationship analysis
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Random visitor: a defense against identity attacks in P2P overlay networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A survey of peer-to-peer security issues
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
EC-Web'07 Proceedings of the 8th international conference on E-commerce and web technologies
A novel overlay network for a secure global home agent dynamic discovery
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Symmetric replication for structured peer-to-peer systems
DBISP2P'05/06 Proceedings of the 2005/2006 international conference on Databases, information systems, and peer-to-peer computing
Topology-aware routing in structured peer-to-peer overlay networks
Future directions in distributed computing
A survey on the design, applications, and enhancements of application-layer overlay networks
ACM Computing Surveys (CSUR)
Whanau: a sybil-proof distributed hash table
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Census: location-aware membership management for large-scale distributed systems
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Preventing DDoS attacks on internet servers exploiting P2P systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
A free-rider aware reputation system for peer-to-peer file-sharing networks
Expert Systems with Applications: An International Journal
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
Secure routing strategies in DHT-based systems
Globe'10 Proceedings of the Third international conference on Data management in grid and peer-to-peer systems
Verifying security property of peer-to-peer systems using CSP
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Phyllo: a peer-to-peer overlay security framework
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Identity theft protection in structured overlays
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Trust overlay networks for global reputation aggregation in P2P grid computing
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Comet: an active distributed key-value store
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Towards a secure rendezvous network for future publish/subscribe architectures
FIS'10 Proceedings of the Third future internet conference on Future internet
Uniform and ergodic sampling in unstructured peer-to-peer systems with malicious nodes
OPODIS'10 Proceedings of the 14th international conference on Principles of distributed systems
Securing P2P storage with a self-organizing payment scheme
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Spam filtering using signed and trust reputation management
ACACOS'11 Proceedings of the 10th WSEAS international conference on Applied computer and applied computational science
CR-Chord: Improving lookup availability in the presence of malicious DHT nodes
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the feasibility of unstructured peer-to-peer information retrieval
ICTIR'11 Proceedings of the Third international conference on Advances in information retrieval theory
An anti-collusion trust model in P2P networks
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
Robust random number generation for peer-to-peer systems
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Chord-PKI: A distributed trust infrastructure based on P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Attribute-Based access to distributed data over p2p networks
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
On mitigating network partitioning in peer-to-peer massively multiplayer games
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
iTrust'05 Proceedings of the Third international conference on Trust Management
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Performance evaluation of large-scale dynamic systems
ACM SIGMETRICS Performance Evaluation Review
Chord-PKI: embedding a public key infrastructure into the chord overlay network
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
ID-replication for structured peer-to-peer systems
Euro-Par'12 Proceedings of the 18th international conference on Parallel Processing
Towards practical communication in Byzantine-resistant DHTs
IEEE/ACM Transactions on Networking (TON)
An authentication framework for peer-to-peer cloud
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
Recent peer-to-peer research has focused on providing efficient hash lookup systems that can be used to build more complex systems. These systems have good properties when their algorithms are executed correctly but have not generally considered how to handle misbehaving nodes. This paper looks at what sorts of security problems are inherent in large peer-to-peer systems based on distributed hash lookup systems. We examine the types of problems that such systems might face, drawing examples from existing systems, and propose some design principles for detecting and preventing these problems.