DocumentCode :
2440748
Title :
A Routing Table Insertion (RTI) Attack on Freenet
Author :
Baumeister, Todd ; Yingfei Dong ; Zhenhai Duan ; Guanyu Tian
Author_Institution :
Univ. of Hawaii, Honolulu, HI, USA
fYear :
2012
fDate :
14-16 Dec. 2012
Firstpage :
8
Lastpage :
15
Abstract :
Very little work has been conducted on quantitatively evaluating the basic design and implementation choices in common p2p anonymous systems. In this paper, we focus on this issue and use Freenet as an example to investigate quantitative measures for anonymous systems. We have conducted extensive analysis of Freenet, and identified several practical attacks that seriously damage the anonymity strength of Freenet. These attacks exploit several fundamental performance improvement schemes in p2p systems, and can be easily extended to other popular DHT-like p2p anonymous systems using similar mechanisms. In particular, we are able to find the network topology, perform a routing table insertion (RTI) attack, and trace back queries. In this paper, we focus on the RTI attack to make a malicious node a direct peer of a victim node. As a result, many other attacks can be launched to break the anonymity promise. To facilitate the RTI attack, we have also developed a route prediction model based on Freenet routing mechanisms. Our experimental results show the effectiveness of the proposed attack. Our goal is not to attack Freenet. Instead, we hope that the lessons learned here help us improve Freenet, develop new design guidelines for p2p anonymous systems, and generalize quantitative measures to evaluate their strength.
Keywords :
computer network security; peer-to-peer computing; telecommunication network routing; DHT-like p2p anonymous systems; Freenet routing mechanisms; RTI; anonymity strength; direct peer; malicious node; routing table insertion attack; victim node; anonymity; anonymous communication; p2p;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cyber Security (CyberSecurity), 2012 International Conference on
Conference_Location :
Washington, DC
Print_ISBN :
978-1-4799-0219-4
Type :
conf
DOI :
10.1109/CyberSecurity.2012.8
Filename :
6542520
Link To Document :
بازگشت