Phagocytes: A Holistic Defense and Protection Against Active P2P Worms
Authors:
Ruichuan Chen,
Eng Keong Lua,
Jon Crowcroft,
Liyong Tang,
Zhong Chen
Abstract:
Active Peer-to-Peer (P2P) worms present serious threats to the global Internet by exploiting popular P2P applications to perform rapid topological self-propagation. Active P2P worms pose more deadly threats than normal scanning worms because they do not exhibit easily detectable anomalies, thus many existing defenses are no longer effective.
We propose an immunity system with Phagocytes --- a sm…
▽ More
Active Peer-to-Peer (P2P) worms present serious threats to the global Internet by exploiting popular P2P applications to perform rapid topological self-propagation. Active P2P worms pose more deadly threats than normal scanning worms because they do not exhibit easily detectable anomalies, thus many existing defenses are no longer effective.
We propose an immunity system with Phagocytes --- a small subset of elected P2P hosts that are immune with high probability and specialized in finding and "eating" worms in the P2P overlay. The Phagocytes will monitor their managed P2P hosts' connection patterns and traffic volume in an attempt to detect active P2P worm attacks. Once detected, local isolation, alert propagation and software patching will take place for containment. The Phagocytes further provide the access control and filtering mechanisms for communication establishment between the internal P2P overlay and the external hosts. We design a novel adaptive and interaction-based computational puzzle scheme at the Phagocytes to restrain external worms attacking the P2P overlay, without influencing legitimate hosts' experiences significantly. We implement a prototype system, and evaluate its performance based on realistic massive-scale P2P network traces. The evaluation results illustrate that our Phagocytes are capable of achieving a total defense against active P2P worms.
△ Less
Submitted 5 August, 2011;
originally announced August 2011.
Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service
Authors:
Ruichuan Chen,
Eng Keong Lua,
Zhuhua Cai,
Jon Crowcroft,
Zhong Chen
Abstract:
Peer-to-Peer (P2P) content sharing systems are susceptible to the content pollution attack, in which attackers aggressively inject polluted contents into the systems to reduce the availability of authentic contents, thus decreasing the confidence of participating users.
In this paper, we design a pollution-free P2P content sharing system, Green, by exploiting the inherent content-based informati…
▽ More
Peer-to-Peer (P2P) content sharing systems are susceptible to the content pollution attack, in which attackers aggressively inject polluted contents into the systems to reduce the availability of authentic contents, thus decreasing the confidence of participating users.
In this paper, we design a pollution-free P2P content sharing system, Green, by exploiting the inherent content-based information and the social-based reputation. In Green, a content provider (i.e., creator or sharer) publishes the information of his shared contents to a group of content maintainers self-organized in a security overlay for providing the mechanisms of redundancy and reliability, so that a content requestor can obtain and filter the information of his requested content from the associated maintainers. We employ a reputation model to help the requestor better identify the polluted contents, and then utilize the social (friend-related) information to enhance the effectiveness and efficiency of our reputation model. Now, the requestor could easily select an authentic content version for downloading. While downloading, each requestor performs a realtime integrity verification and takes prompt protection to handle the content pollution. To further improve the system performance, we devise a scalable probabilistic verification scheme.
Green is broadly applicable for both structured and unstructured overlay applications, and moreover, it is able to defeat various kinds of content pollution attacks without incurring significant overhead on the participating users. The evaluation in massive-scale networks validates the success of Green against the content pollution.
△ Less
Submitted 5 August, 2011;
originally announced August 2011.