Title
Induced Churn as Shelter from Routing-Table Poisoning
Abstract
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving millions of user-managed machines on the Internet. In this paper we address routing-table poisoning attacks against structured overlays, in which adversaries attempt to inter- cept trafc and control the system by convincing other nodes to use compromised nodes as their overlay network neigh- bors. In keeping with the fully-decentralized goals of struc- tured overlay design, we propose a defense mechanism that makes minimal use of centralized infrastructure. Our ap- proach, induced churn, utilizes periodic routing-table re- sets, unpredictable identier changes, and a rate limit on routing-table updates. Induced churn leaves adversaries at the mercy of chance: they have little opportunity to strate- gize their positions in the overlay, and cannot entrench themselves in any position that they do acquire. We im- plement induced churn in Maelstrom, an extension to the broadly used Bamboo distributed hash table. Our Mael- strom experiments over a simulated network demonstrate robust routing with very modest costs in bandwidth and la- tency, at levels of adversarial activity where unprotected overlays are rendered almost completely useless.
Year
Venue
Keywords
2006
NDSS
distributed hash table,rate limiting,overlay network,defense mechanism
Field
DocType
Citations 
Internet privacy,Identifier,Computer security,Computer science,Computer network,Bandwidth (signal processing),Routing table,Overlay,Rate limiting,Overlay network,Distributed hash table,The Internet
Conference
30
PageRank 
References 
Authors
1.50
26
5
Name
Order
Citations
PageRank
Tyson Condie1116264.84
Varun Kacholia236012.20
Sriram Sank3301.50
Joseph M. Hellerstein4140931651.14
Petros Maniatis52541150.03